Skip to content

Instantly share code, notes, and snippets.

View zztczcx's full-sized avatar

Chenxu Zhao zztczcx

  • seek.com.au
  • Melbourne, Australia
View GitHub Profile
@bitsgalore
bitsgalore / namespacesxmllint.md
Created April 13, 2016 15:25
Namespace handling in xmllint

The problem

When used from the command line, the xmllint tool doesn't accept namespaces in xpath expressions. This makes it difficult to process XML documents like the one below (file demo.xml):

<?xml version="1.0" standalone="yes"?>
<svrl:schematron-output xmlns:svrl="http://purl.oclc.org/dsdl/svrl" xmlns:xs="http://www.w3.org/2001/XMLSchema" xmlns:schold="http://www.ascc.net/xml/schematron" xmlns:sch="http://www.ascc.net/xml/schematron" xmlns:iso="http://purl.oclc.org
@uraimo
uraimo / dnsovertls.md
Last active June 2, 2025 03:20
Configure your Mac to use DNS over TLS
@farid007
farid007 / Rconfig File Upload RCE Exploit
Last active April 16, 2025 09:43
Rconfig 3.9.4 File Upload RCE
Remote Code Execution via File Upload (CVE-2020-12255)
The rConfig 3.9.4 is vulnerable to remote code execution due to improper checks/validation via the file upload functionality.
The vendor.crud.php accepts the file upload by checking through content-type and it is not restricting upload by checking the file extension and header.
Due to this flaw, An attacker can exploit this vulnerability by uploading a PHP file that contains arbitrary code (shell) and changing the content-type to `image/gif` in the vendor.crud.php.
since the validation checks are happening through content-type the server would accept the PHP file uploaded ultimately resulting code execution upon the response when invoked.
Steps To Reproduce-:
@ih2502mk
ih2502mk / list.md
Last active July 19, 2025 21:37
Quantopian Lectures Saved