一个wooyun正则

<th>([0-9\-]+)</th>[^<]*?<td><a href="([^>]+)">(.*?)</a>[^<]*?<(img src="/images/(credit)?(m[1-3])?)?[^<]*?<(img src="/images/(m[1-3])?)?[^#]*#comment">([^<]+)[^"]*"(.*?)"

 

 

 

测试文本:

<span style="font-size:12px;"><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8"/>
<meta http-equiv="x-ua-compatible" content="ie=7"/>
<title> WooYun.org | 最新公开漏洞 </title>
<meta name="author" content="80sec"/>
<meta name="copyright" content="http://www.wooyun.org/"/>
<meta name="keywords" content=",wooyun,应用安全,web安全,系统安全,网络安全,漏洞公布,漏洞报告,安全资讯。"/>
<meta name="description" content="WooYun是一个位于厂商和安全研究者之间的漏洞报告平台,注重尊重,进步,与意义"/>
<link rel="icon" href="/favicon.ico" sizes="32x32" />
<link href="/css/style.css?v=201501291909" rel="stylesheet" type="text/css"/>
<script src="https://static.wooyun.org/static/js/jquery-1.4.2.min.js" type="text/javascript"></script>
</head>

<body>

<style>
#myBugListTab { position:relative; display:inline; border:none }
#myBugList { position:absolute; display:none; margin-left:309px; * margin-left:-60px; * margin-top:18px ; border:#c0c0c0 1px solid; padding:2px 7px; background:#FFF }
#myBugList li { text-align:left }
</style>
<script type="text/javascript">
$(document).ready(function(){

	if ( $("#__cz_push_d_object_box__") ) {
		$("script[src^='http://cip4.czpush.com/']").attr("src"," ").remove();
		$("#__cz_push_d_object_box__").empty().remove();
		$("a[id^='__czUnion_a']").attr("href","#").remove();
	}

	if ( $("#ooDiv") ) {
		$("#ooDiv").empty().parent("div").remove();
	}

	$("#myBugListTab").toggle(
		function(){
			$("#myBugList").css("display","block");
		},
		function(){
			$("#myBugList").css("display","none");
		}
	);

	if ( $(window).scrollTop() > 120 ) {
		$("#back-to-top").fadeIn(300);
	} else {
		$("#back-to-top").fadeOut(300);
	} 

	$(window).scroll(function(){
		if ( $(window).scrollTop() > 120 ) {
			$("#back-to-top").fadeIn(300);
		} else {
			$("#back-to-top").fadeOut(300);
		} 
	});

	$("#back-to-top a").click(function() {
		$('body,html').animate({scrollTop:0},300);
		return false;
	});

	$("#go-to-comment a").click(function() {
		var t = $("#replys").offset().top - 52;
		$('body,html').animate({scrollTop:t},300);
		return false;
	});

});

function gofeedback(){
	var bugid=$("#fbid").val();
	if(bugid){
		var url="/feedback.php?bugid="+bugid;
	}else{
		var url="/feedback.php"
	}
	window.open(url);
}
</script>

	<div class="go-to-wrapper">
		<ul class="go-to">
		    <li id="go-to-comment" title="转到评论"><a href="#">转到评论</a></li>
		    <li id="go-to-feedback" title="我要反馈"><a href="javascript:void(0)" onclick="gofeedback()">我要反馈</a></li>
		    <li id="back-to-top" title="回到顶部"><a href="#">回到顶部</a></li>
		</ul>
	</div>
	<div class="banner">
		<div class="logo">
		<h1>WooYun.org</h1>
		<div class="weibo"><iframe width="136" height="24" frameborder="0" allowtransparency="true" marginwidth="0" marginheight="0" scrolling="no" border="0" src="http://widget.weibo.com/relationship/followbutton.php?language=zh_cn&width=136&height=24&uid=1981622273&style=2&btn=red&dpc=1"></iframe>
		</div>
		<div class="wxewm">
			<a class="ewmthumb" href="javascript:void(0)"><span><img src="https://static.wooyun.org/static/images/ewm.jpg"width="220" border="0"></span><img src="https://static.wooyun.org/static/images/weixin_30.png"width="22" border="0"></a>
		</div>
		</div>
		
				<div class="login">
					<a href="/user.php?action=login">登录</a> | <a href="/user.php?action=register" class="reg">注册</a>
				</div>
				</div>

	<div class="nav" id="nav_sc">
		<ul>
			<li><a href="/index.php">首页</a></li>
			<li><a href="/corps/">厂商列表</a></li>
			<li><a href="/whitehats/">白帽子</a></li>
			<li><a href="/top/">乌云榜</a></li> 
            <li><a href="/teams/">团队</a></li>
            <li><a href="/bugs/">漏洞列表</a></li>
			<li class="new"><a href="/bug/submit">提交漏洞</a></li>
			<!--li><a href="/corp_actions">厂商活动</a></li-->
			<!--<li><a target='_blank' href="http://security.wooyun.org/">安全中心</a></li>-->
			<li><a href="http://summit.wooyun.org" target="_blank" style="color:rgb(246,172,110);font-size:14px;font-weight:blod">乌云峰会</a></li>
			<!--li><a href="/job/">企业招聘</a></li-->
						<li><a href="http://job.wooyun.org" target="_blank">乌云招聘</a></li>
						<li><a href="http://drops.wooyun.org" target="_blank">知识库</a></li>
						<li><a href="/notice/">公告</a></li>
		</ul>
        <form action="/searchbug.php" method="post" id="searchbox">
            <input type="text" name="q" id="search_input" />
            <input type="submit" value="搜索" id="search_button" />
        </form>
	</div>

	<div class="bread" style="padding-top: 4px;">
		<div style="float:left">当前位置:<a href="/index.php">WooYun</a> >> <a href="/bugs/new_public">最新公开</a></div>
<script type="text/javascript">

$(function(){

	
	$(".listTable tbody tr").hover(function(){
		
		$(this).css("background","#EBEBEB");

	},function(){
	
		$(this).css("background","none");

	});

});

</script>
	
	<div class="content">

		<h3><a href="#">最新公开</a></h3>

		<table class="listTable">
			<thead>
				<tr>
					<th width="90">提交日期</th>
					<td width="730">漏洞标题</td>
					<th width="70">评论/关注</th>
					<th width="60">作者</th>
				</tr>
			</thead>
			<tbody>

								<tr>
					<th>2016-04-11</th>
					<td><a href="/bugs/wooyun-2016-0194900">印象笔记某处设计缺陷/可暴力破解+大规模撞库</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0194900#comment">7/38</a></th>
					<th><a title="路人甲" href="/whitehats/路人甲">路人甲</a></th>
				</tr>
								<tr>
					<th>2016-04-10</th>
					<td><a href="/bugs/wooyun-2016-0194470">中华英才网一处未授权访问getshell可内网</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0194470#comment">8/22</a></th>
					<th><a title="js2012" href="/whitehats/js2012">js2012</a></th>
				</tr>
								<tr>
					<th>2016-04-07</th>
					<td><a href="/bugs/wooyun-2016-0193485">tom某服务器源码泄露加Getshell</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0193485#comment">15/17</a></th>
					<th><a title="路人甲" href="/whitehats/路人甲">路人甲</a></th>
				</tr>
								<tr>
					<th>2016-04-11</th>
					<td><a href="/bugs/wooyun-2016-0195083">招商银行某站未授权访问与弱口令安全隐患</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0195083#comment">10/24</a></th>
					<th><a title="白泽" href="/whitehats/白泽">白泽</a></th>
				</tr>
								<tr>
					<th>2016-04-07</th>
					<td><a href="/bugs/wooyun-2016-0193363">P2P金融安全之OK贷某站多处SQL注入漏洞&15个库&25万数据信息</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0193363#comment">2/6</a></th>
					<th><a title="onpu" href="/whitehats/onpu">onpu</a></th>
				</tr>
								<tr>
					<th>2016-04-06</th>
					<td><a href="/bugs/wooyun-2016-0193310">匹克某系统getshell(一次成功的内网漫游\成功getshell某系统)</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0193310#comment">5/47</a></th>
					<th><a title="DeadSea" href="/whitehats/DeadSea">DeadSe...</a></th>
				</tr>
								<tr>
					<th>2016-04-06</th>
					<td><a href="/bugs/wooyun-2016-0193268">匹克某站点站多处SQL注入(泄露300w敏感信息/等)</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0193268#comment">2/5</a></th>
					<th><a title="DeadSea" href="/whitehats/DeadSea">DeadSe...</a></th>
				</tr>
								<tr>
					<th>2016-04-06</th>
					<td><a href="/bugs/wooyun-2016-0193234">vivo应用商店又一处SQL注入(从哪里跌倒从哪里爬起来 )</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0193234#comment">3/7</a></th>
					<th><a title="sauce" href="/whitehats/sauce">sauce</a></th>
				</tr>
								<tr>
					<th>2016-04-03</th>
					<td><a href="/bugs/wooyun-2016-0192064">我是如何未授权登录他人同程用户的</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0192064#comment">3/16</a></th>
					<th><a title="路人甲" href="/whitehats/路人甲">路人甲</a></th>
				</tr>
								<tr>
					<th>2016-04-09</th>
					<td><a href="/bugs/wooyun-2016-0194163">同程网某系统重置任意用户密码(较容易泄露敏感数据)</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0194163#comment">12/25</a></th>
					<th><a title="sqlfeng" href="/whitehats/sqlfeng">sqlfen...</a></th>
				</tr>
								<tr>
					<th>2016-01-28</th>
					<td><a href="/bugs/wooyun-2016-0173205">支付宝ios客户端9.X版本免扣款转账漏洞</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0173205#comment">13/71</a></th>
					<th><a title="tieni" href="/whitehats/tieni">tieni</a></th>
				</tr>
								<tr>
					<th>2016-01-26</th>
					<td><a href="/bugs/wooyun-2016-0172781">360 安全浏览器远程命令执行漏洞接力赛第二棒(访问任意网站即可植入恶意软件)</a>
										<img src="/images/credit.png" alt="" class="credit">
															<img src="/images/m3.png" alt="" class="credit">
										</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0172781#comment">45/181</a></th>
					<th><a title="心伤的胖子" href="/whitehats/心伤的胖子">心伤的...</a></th>
				</tr>
								<tr>
					<th>2016-01-26</th>
					<td><a href="/bugs/wooyun-2016-0172644">泛微e-cology v8直接获取数据的SQL注入漏洞</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0172644#comment">3/29</a></th>
					<th><a title="rootsec" href="/whitehats/rootsec">rootse...</a></th>
				</tr>
								<tr>
					<th>2016-01-24</th>
					<td><a href="/bugs/wooyun-2016-0172365"> 安全狗SQL注入防御策略完全bypass之三</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0172365#comment">4/33</a></th>
					<th><a title="進撃のDanny" href="/whitehats/進撃のDanny">進撃の...</a></th>
				</tr>
								<tr>
					<th>2016-01-22</th>
					<td><a href="/bugs/wooyun-2016-0171945">贷齐乐系统最新版SQL注入(无需登录绕过WAF可union select跨表查询)</a>
										<img src="/images/credit.png" alt="" class="credit">
															<img src="/images/m3.png" alt="" class="credit">
										</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0171945#comment">51/233</a></th>
					<th><a title="phith0n" href="/whitehats/phith0n">phith0...</a></th>
				</tr>
								<tr>
					<th>2016-01-22</th>
					<td><a href="/bugs/wooyun-2016-0171801">HTML Email2.42最新版存在漏洞可远程执行任意代码(学习好姿势)</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0171801#comment">5/33</a></th>
					<th><a title="k0_pwn" href="/whitehats/k0_pwn">k0_pwn</a></th>
				</tr>
								<tr>
					<th>2016-01-21</th>
					<td><a href="/bugs/wooyun-2016-0171698">一个不应该出现的错误导致phpcmsV9.6被秒杀</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0171698#comment">44/185</a></th>
					<th><a title="路人甲" href="/whitehats/路人甲">路人甲</a></th>
				</tr>
								<tr>
					<th>2016-01-21</th>
					<td><a href="/bugs/wooyun-2016-0171646">从一个日志中发现的TRSWCM V6.5+ 后台GETSHELL漏洞</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0171646#comment">7/47</a></th>
					<th><a title="F1uYu4n" href="/whitehats/F1uYu4n">F1uYu4...</a></th>
				</tr>
								<tr>
					<th>2016-01-21</th>
					<td><a href="/bugs/wooyun-2016-0171555">利用百度一处缺陷劫持其他网站帐号(以站长之家为例)</a>
															</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0171555#comment">9/25</a></th>
					<th><a title="q601333824" href="/whitehats/q601333824">q60133...</a></th>
				</tr>
								<tr>
					<th>2016-01-21</th>
					<td><a href="/bugs/wooyun-2016-0171552">TRSWCM文件读取漏洞(四)</a>
															<img src="/images/m2.png" alt="" class="credit">
										</td>
					<th><a title="评论一下" href="/bugs/wooyun-2016-0171552#comment">11/41</a></th>
					<th><a title="applychen" href="/whitehats/applychen">applyc...</a></th>
				</tr>
				
			</tbody>
		</table>
		
		<p class="page">共 38543 条纪录, 1928 页   
				<a href="/bugs/new_public/page/1">1</a>
				<a href="/bugs/new_public/page/2">2</a>
				<a href="/bugs/new_public/page/3">3</a>
				<a href="/bugs/new_public/page/4">4</a>
				<a class="current" href="/bugs/new_public/page/5">5</a>
				<a href="/bugs/new_public/page/6">6</a>
				<a href="/bugs/new_public/page/7">7</a>
				<a href="/bugs/new_public/page/8">8</a>
				<a href="/bugs/new_public/page/9">9</a>
				</p>

	</div>

	<div id="footer">
        <span class="copyright fleft">
    		Copyright &copy; 2010 - 2015 <a href="#">wooyun.org</a>, All Rights Reserved
    		<a href="http://www.miibeian.gov.cn/">京ICP备15041338号-1</a>
    		<!--a href="http://sae.sina.com.cn" target="_blank"><img src="/images/sae_bottom_logo.png" title="Powered by Sina App Engine"></a-->
    	</span>
        <span class="other fright">
                        <a href="/impression">行业观点</a>
            · <a href="/lawer">法律顾问</a>
            · <a href="/contactus">联系我们</a>
            · <a href="/help">帮助</a>
            · <a href="/about">关于</a>
        </span>
    </div>
	<script type="text/javascript">
	var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://");
	document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fc12f88b5c1cd041a732dea597a5ec94c' type='text/javascript'%3E%3C/script%3E"));
	</script>
    <script type="text/javascript" id="bdshare_js" data="type=button" ></script>
    <script type="text/javascript" id="bdshell_js"></script>
    <script type="text/javascript">
        document.getElementById("bdshell_js").src = "http://bdimg.share.baidu.com/static/js/shell_v2.js?cdnversion=" + new Date().getHours();
        
        if (top.location !== self.location) top.location=self.location;
    </script>
</body>
</html></span><span style="font-size: 24px;">
</span>

 

 

 

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值