コード例 #1
0
ファイル: ListExploit.php プロジェクト: rawthang/dbx
require_once 'classes/pCategory.php';
/**Passwörter*/
require_once 'classes/other/phpass-0.3/PasswordHash.php';
require_once 'classes/helper/Login.php';
require_once 'classes/helper/Session.php';
require_once 'classes/helper/Upload.php';
require_once 'classes/helper/Getvars.php';
require_once 'classes/helper/Formgen.php';

$dbh=new PDO(DB_DSN, DB_USR, DB_PASS);
$dbh->setAttribute(PDO::ATTR_ERRMODE, PDO::ERRMODE_WARNING);		//@todo das steht nur zum üben hier

$e=new pExploit();

$e->dbh($dbh);
$exploits=$e->mysqlSelect();
$fgen=new Formgen();
?>

<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<title>list exploit</title>
<link rel="stylesheet" media="all" href="layout.css">
<script>function confirmGo(m,u) {
	if ( confirm(m) ) {
		window.location = u;
		}
		}
		
コード例 #2
0
ファイル: EditExploit.php プロジェクト: rawthang/dbx
			$e->file($upload->upload());
			$e->mysqlUpdate();
			echo "<h4>{$vars->catname()} ge&auml;ndert :)</h4>";
		}else {
		;
		}
		/**Formular erzeugen***/


		$edit=new Getvars();
		$edit->requireVar('edit');
		
		if ($edit->validateVars()){
			$e=new pExploit();
			$e->dbh($dbh);
			$e->mysqlSelect($edit->edit());					
			
			$categories = array($e->category() =>$e->loadCategory()) + $category->mysqlSelect();
			$platforms=array($e->platform() =>$e->loadPlatform()) + $platform->mysqlSelect();
			$languages=array_merge(array($e->codeLanguage()), $languages);
			$path=pathinfo(__FILE__);
			
		
			$form=new Formgen("post", $path['filename'].'.'.$path['extension']);
			$form->addTextField("Name", "catname", $e->title());
			$form->addSelect("kategorie", "category",$categories);
			$form->addSelect("platform", "platform",$platforms);
			$form->addSelect("Spache", "language", $languages);
			$form->addTextArea("beschreibung", "content",$e->content(), 30,65);
			$form->addTextField("upload from url", "url_upload");
			$form->addUpload("upload from pc", "pc_upload");
コード例 #3
0
ファイル: ViewExploit.php プロジェクト: rawthang/dbx
</head>
<body>
	<div id="head">
			<h1><a href="index.php">ue-cr3w exploits</a></h1>
		<img src="img/logo.png" alt="logo" />
	</div>
	<div>
	<?php 
	$varExploit=new Getvars();
	$varExploit->requireVar('view');
	
	if ($varExploit->validateVars()){
		//load 
		$e=new pExploit();
		$e->dbh($dbh);
		$e->mysqlSelect($varExploit->view());			
		$f=new Formgen();

		
		//output		
		$link= $f->getLink("download", $e->file());
		
		
		
		echo $f->getHeading($e->title(), 4);		
		echo "<div class=\"exploit-autor\">author:{$e->autor()}</div>";
		echo "<div class=\"exploit-date\">date:{$e->date()}</div>";
		echo "<div class=\"exploit-hits\">hits:{$e->hits()}</div>";
		echo "<div class=\"exploit-verified\">verified:{$e->verified()}</div>";
		echo '<div class="exploit-category">'.$e->loadCategory().'</div>';
		echo '<div class="exploit-platform">'.$e->loadPlatform().'</div>';