俏微博多处鸡肋漏洞

from:http://t00ls.net/thread-20220-1-1.html 大概看了下。。感觉太蛋疼了 就没继续看了。。 index.php 本地包含 $url = $_GET; //获取所有被解析过的url jeffxie <[email]jeffxie@gmail.com[/email]> 2011-09-17 $mod = $url["view"]; if($mod) {                if($mod == 'uid'){        //好友微

cutecms 注入漏洞

From:http://t00ls.net/thread-20189-1-1.html search.php 略。。 $c = strval($_GET['c']); $s = strval(trim($_GET['s'])); $hit = intval($hit); 略 if($c) { $bullet = "<img src='".DOMAINPATH."template/".$GLOBALS['cfg']['template']."/images/nav_bullet.gif' width=\"4\" height=\"7\" alt=\"bullet\" />"; $channelPath = $ch->getChannelPath($channelArr); //栏目页导航路径 if($c==15) { //都是引号惹的祸。。没引号就是蛋疼 $channelType = 100; $searchTable = 'product'; $condition = " AND (name LIKE '%$s%'

Dede Cms All Versions Sql Vulnerability Exploit

# Dede Cms All Versions Sql Vulnerability Exploit # </ No Priv8 , Everything is Public > # Date: 30/12/2011 - 13:00 # Author: [ CWH ] | Finded By : Nafsh # We Are : Mr.M4st3r , Nafsh , Skote_Vahshat , HijaX # Support: Cyberwh.org # Mail: [email]Nafsh@live.com[/email] # Software Website: [url]http://www.dedecms.com[/url] # Security Risk: High # Platform: Php   >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>   [$] Dorks:&nbsp;&nbsp;inurl:"id" "DedeCMS Error Warning!"   [#]

srcds.exe 命令行参数、启动参数大全

示例参数: srcds.exe -console -game "left4dead2" -port 27015 +map c5m1_waterfront +rcon_password "123456" srcds.exe -game "left4dead2" -insecure +maxplayers 32 +sv_lan 1 +map c1m1_hotel +sv_gametypes coop srcds.exe -console -game "left4dead2" -insecure +maxplayers 32 +sv_lan 1 +map c1m1_hotel +sv_gametypes coop 下面为可用启动参数: -console //以控制台模式启动服务器。 -autoupdate //开启