iranianitc
Member
سلام
آخرين Patch امنيتي براي 7.3 ميخوام... ( phpnuke 7.3 farsi ) :roll:
آخرين Patch امنيتي براي 7.3 ميخوام... ( phpnuke 7.3 farsi ) :roll:
irandescco گفت:سلام
آخرين Patch امنيتي براي 7.3 ميخوام... ( phpnuke 7.3 farsi ) :roll:
http://localhost/nuke73/modules.php?name=Statistics&op=convert_month
http://localhost/nuke73/modules.php?name=Journal&file=friend&jid=2&yun=[xss code here]
http://localhost/nuke73/modules.php?name=Journal&file=friend&jid=2&ye=[xss code here]
http://localhost/nuke73/modules.php?name=Journal&file=commentsave&rid=[xss code here]
<script>alert("hello")</script>
body onload=alert("hello");>
index.php?user=MTo8c2NyaXB0PmFsZXJ0KGRvY3VtZW50LmNvb2tpZSk7PC9zY3JpcHQ+Zm9vYmFy
die("YOU ARE SLAPPED BY <a href=\"http://nukecops.com\">NUKECOPS</a> BY USING '$matches[1]' INSIDE '$loc'.");
die("YOU ARE SLAPPED BY <a href=\"http://nukecops.com\">NUKECOPS</a> BY USING '$matches[1]' INSIDE '" . htmlentities($loc) . "'");
//Union Tap Code (UTC)
//Copyright Zhen-Xjell 2004 http://nukecops.com
//Beta 4 Code to prevent UNION SQL Injections
unset($matches);
unset($loc);
$loc=rawurldecode($_SERVER["QUERY_STRING"]);
//This if block catches C-like comment code within all SQL Injections, not just Union.
//White paper available here: http://www.securiteam.com/securityreviews/5FP0O0KCKM.html
if (strstr($loc,"*")) {
die("YOU ARE SLAPPED BY <a href=\"http://nukecops.com\">NUKECOPS</a> BY USING '$loc'.");
}
//This catches plaintext and base64 version of the Union SQL Injection code.
if (preg_match("/([OdWo5NIbpuU4V2iJT0n]{5}) /", $loc, $matches)) {
die("YOU ARE SLAPPED BY <a href=\"http://nukecops.com\">NUKECOPS</a> BY USING '$matches[1]' INSIDE '$loc'.");
}