Internet Explorer 7 ClickJacking Vulnerability (2009-01-23)
#############################################################
# Application Name : İnternet Explorer 7 # Vulnerable Type : Clickjacking # Author : UzmiX ############################################################# < ------------------- header data end of ------------------- > <html> <body> <div id="open" 阅读全文 »Tags: Clickjacking, IE7, Vulnerability
Php168 v2008 权限提升漏洞
by Ryat
http://www.wolvez.org
2009-01-25
简单分析下这个漏洞
common.inc.php
if($_SERVER['HTTP_CLIENT_IP']){
$onlineip=$_SERVER['HTTP_CLIENT_IP'];
}elseif($_SERVER['HTTP_X_FORWARDED_FOR']){
$onlineip=$_SERVER['HTTP_X_FORWARDED_FOR'];
}else{
$onlineip=$_SERVER['REMOTE_ADDR'];
}
$onlineip = preg_replace("/^([\d\.]+).*/", "\\1", filtrate($onlineip));
//这个地方使用preg_replace存在着安全隐患,之前就暴过漏洞,官方修补的方法是用filtrate函数处理了下$onlineip
Tags: PHP168, 提权, 漏洞攻防技术融入IPS 之 协议分析
作者:xushaopei
1 AIM ==== ^(\*[\x01\x02].*\x03\x0b|\*\x01.?.?.?.?\x01)|flapon|toc_signon.*0x
2 Apple Juice ==== ^ajprot\x0d\x0a
3 Ares ==== ^\x03[]Z].?.?\x05$
4 Battlefield 1942 ==== ^\x01\x11\x10\|\xf8\x02\x10\x40\x06
5 Battlefield 2 ==== ^(\x11\x20\x01…?\x11|\xfe\xfd.?.?.?.?.?.?(\x14\x01\x06|\xff\xff\xff))|[]\x01].?battlefield2
6 Battlefield 2142 ==== ^(\x11\x20\x01\x90\x50\x64\x10|\xfe\xfd.?.?.?\x18|[\x01\\].?battlefield2)
7 Border Gateway Protocol ==== ^\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff\xff..?\x01[\x03\x04]
8 Chikka ==== ^CTPv1\.[123] Kamusta.*\x0d\x0a$
阅读全文 »