<th>([0-9\-]+)</th>[^<]*?<td><a href="([^>]+)">(.*?)</a>[^<]*?<(img src="/images/(credit)?(m[1-3])?)?[^<]*?<(img src="/images/(m[1-3])?)?[^#]*#comment">([^<]+)[^"]*"(.*?)"
测试文本:
<span style="font-size:12px;"><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <head> <Meta http-equiv="Content-Type" content="text/html; charset=utf-8"/> <Meta http-equiv="x-ua-compatible" content="ie=7"/> <title> WooYun.org | 最新公开漏洞 </title> <Meta name="author" content="80sec"/> <Meta name="copyright" content="http://www.wooyun.org/"/> <Meta name="keywords" content=",wooyun,应用安全,web安全,系统安全,网络安全,漏洞公布,漏洞报告,安全资讯。"/> <Meta name="description" content="WooYun是一个位于厂商和安全研究者之间的漏洞报告平台,注重尊重,进步,与意义"/> <link rel="icon" href="/favicon.ico" sizes="32x32" /> <link href="/css/style.css?v=201501291909" rel="stylesheet" type="text/css"/> <script src="https://static.wooyun.org/static/js/jquery-1.4.2.min.js" type="text/javascript"></script> </head> <body> <style> #myBugListTab { position:relative; display:inline; border:none } #myBugList { position:absolute; display:none; margin-left:309px; * margin-left:-60px; * margin-top:18px ; border:#c0c0c0 1px solid; padding:2px 7px; background:#FFF } #myBugList li { text-align:left } </style> <script type="text/javascript"> $(document).ready(function(){ if ( $("#__cz_push_d_object_Box__") ) { $("script[src^='http://cip4.czpush.com/']").attr("src"," ").remove(); $("#__cz_push_d_object_Box__").empty().remove(); $("a[id^='__czUnion_a']").attr("href","#").remove(); } if ( $("#ooDiv") ) { $("#ooDiv").empty().parent("div").remove(); } $("#myBugListTab").toggle( function(){ $("#myBugList").css("display","block"); },function(){ $("#myBugList").css("display","none"); } ); if ( $(window).scrollTop() > 120 ) { $("#back-to-top").fadeIn(300); } else { $("#back-to-top").fadeOut(300); } $(window).scroll(function(){ if ( $(window).scrollTop() > 120 ) { $("#back-to-top").fadeIn(300); } else { $("#back-to-top").fadeOut(300); } }); $("#back-to-top a").click(function() { $('body,html').animate({scrollTop:0},300); return false; }); $("#go-to-comment a").click(function() { var t = $("#replys").offset().top - 52; $('body,html').animate({scrollTop:t},300); return false; }); }); function goFeedback(){ var bugid=$("#fbid").val(); if(bugid){ var url="/Feedback.PHP?bugid="+bugid; }else{ var url="/Feedback.PHP" } window.open(url); } </script> <div class="go-to-wrapper"> <ul class="go-to"> <li id="go-to-comment" title="转到评论"><a href="#">转到评论</a></li> <li id="go-to-Feedback" title="我要反馈"><a href="javascript:void(0)" onclick="goFeedback()">我要反馈</a></li> <li id="back-to-top" title="回到顶部"><a href="#">回到顶部</a></li> </ul> </div> <div class="banner"> <div class="logo"> <h1>WooYun.org</h1> <div class="weibo"><iframe width="136" height="24" frameborder="0" allowtransparency="true" marginwidth="0" marginheight="0" scrolling="no" border="0" src="http://widget.weibo.com/relationship/followbutton.PHP?language=zh_cn&width=136&height=24&uid=1981622273&style=2&btn=red&dpc=1"></iframe> </div> <div class="wxewm"> <a class="ewmthumb" href="javascript:void(0)"><span><img src="https://static.wooyun.org/static/images/ewm.jpg"width="220" border="0"></span><img src="https://static.wooyun.org/static/images/weixin_30.png"width="22" border="0"></a> </div> </div> <div class="login"> <a href="/user.PHP?action=login">登录</a> | <a href="/user.PHP?action=register" class="reg">注册</a> </div> </div> <div class="nav" id="nav_sc"> <ul> <li><a href="/index.PHP">首页</a></li> <li><a href="/corps/">厂商列表</a></li> <li><a href="/whitehats/">白帽子</a></li> <li><a href="/top/">乌云榜</a></li> <li><a href="/teams/">团队</a></li> <li><a href="/bugs/">漏洞列表</a></li> <li class="new"><a href="/bug/submit">提交漏洞</a></li> <!--li><a href="/corp_actions">厂商活动</a></li--> <!--<li><a target='_blank' href="http://security.wooyun.org/">安全中心</a></li>--> <li><a href="http://summit.wooyun.org" target="_blank" style="color:rgb(246,172,110);font-size:14px;font-weight:blod">乌云峰会</a></li> <!--li><a href="/job/">企业招聘</a></li--> <li><a href="http://job.wooyun.org" target="_blank">乌云招聘</a></li> <li><a href="http://drops.wooyun.org" target="_blank">知识库</a></li> <li><a href="/notice/">公告</a></li> </ul> <form action="/searchbug.PHP" method="post" id="searchBox"> <input type="text" name="q" id="search_input" /> <input type="submit" value="搜索" id="search_button" /> </form> </div> <div class="bread" style="padding-top: 4px;"> <div style="float:left">当前位置:<a href="/index.PHP">WooYun</a> >> <a href="/bugs/new_public">最新公开</a></div> <script type="text/javascript"> $(function(){ $(".listTable tbody tr").hover(function(){ $(this).css("background","#EBEBEB"); },function(){ $(this).css("background","none"); }); }); </script> <div class="content"> <h3><a href="#">最新公开</a></h3> <table class="listTable"> <thead> <tr> <th width="90">提交日期</th> <td width="730">漏洞标题</td> <th width="70">评论/关注</th> <th width="60">作者</th> </tr> </thead> <tbody> <tr> <th>2016-04-11</th> <td><a href="/bugs/wooyun-2016-0194900">印象笔记某处设计缺陷/可暴力破解+大规模撞库</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0194900#comment">7/38</a></th> <th><a title="路人甲" href="/whitehats/路人甲">路人甲</a></th> </tr> <tr> <th>2016-04-10</th> <td><a href="/bugs/wooyun-2016-0194470">中华英才网一处未授权访问getshell可内网</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0194470#comment">8/22</a></th> <th><a title="js2012" href="/whitehats/js2012">js2012</a></th> </tr> <tr> <th>2016-04-07</th> <td><a href="/bugs/wooyun-2016-0193485">tom某服务器源码泄露加Getshell</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0193485#comment">15/17</a></th> <th><a title="路人甲" href="/whitehats/路人甲">路人甲</a></th> </tr> <tr> <th>2016-04-11</th> <td><a href="/bugs/wooyun-2016-0195083">招商银行某站未授权访问与弱口令安全隐患</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0195083#comment">10/24</a></th> <th><a title="白泽" href="/whitehats/白泽">白泽</a></th> </tr> <tr> <th>2016-04-07</th> <td><a href="/bugs/wooyun-2016-0193363">P2P金融安全之OK贷某站多处sql注入漏洞&15个库&25万数据信息</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0193363#comment">2/6</a></th> <th><a title="onpu" href="/whitehats/onpu">onpu</a></th> </tr> <tr> <th>2016-04-06</th> <td><a href="/bugs/wooyun-2016-0193310">匹克某系统getshell(一次成功的内网漫游\成功getshell某系统)</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0193310#comment">5/47</a></th> <th><a title="DeadSea" href="/whitehats/DeadSea">DeadSe...</a></th> </tr> <tr> <th>2016-04-06</th> <td><a href="/bugs/wooyun-2016-0193268">匹克某站点站多处sql注入(泄露300w敏感信息/等)</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0193268#comment">2/5</a></th> <th><a title="DeadSea" href="/whitehats/DeadSea">DeadSe...</a></th> </tr> <tr> <th>2016-04-06</th> <td><a href="/bugs/wooyun-2016-0193234">vivo应用商店又一处sql注入(从哪里跌倒从哪里爬起来 )</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0193234#comment">3/7</a></th> <th><a title="sauce" href="/whitehats/sauce">sauce</a></th> </tr> <tr> <th>2016-04-03</th> <td><a href="/bugs/wooyun-2016-0192064">我是如何未授权登录他人同程用户的</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0192064#comment">3/16</a></th> <th><a title="路人甲" href="/whitehats/路人甲">路人甲</a></th> </tr> <tr> <th>2016-04-09</th> <td><a href="/bugs/wooyun-2016-0194163">同程网某系统重置任意用户密码(较容易泄露敏感数据)</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0194163#comment">12/25</a></th> <th><a title="sqlfeng" href="/whitehats/sqlfeng">sqlfen...</a></th> </tr> <tr> <th>2016-01-28</th> <td><a href="/bugs/wooyun-2016-0173205">支付宝ios客户端9.X版本免扣款转账漏洞</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0173205#comment">13/71</a></th> <th><a title="tieni" href="/whitehats/tieni">tieni</a></th> </tr> <tr> <th>2016-01-26</th> <td><a href="/bugs/wooyun-2016-0172781">360 安全浏览器远程命令执行漏洞接力赛第二棒(访问任意网站即可植入恶意软件)</a> <img src="/images/credit.png" alt="" class="credit"> <img src="/images/m3.png" alt="" class="credit"> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0172781#comment">45/181</a></th> <th><a title="心伤的胖子" href="/whitehats/心伤的胖子">心伤的...</a></th> </tr> <tr> <th>2016-01-26</th> <td><a href="/bugs/wooyun-2016-0172644">泛微e-cology v8直接获取数据的sql注入漏洞</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0172644#comment">3/29</a></th> <th><a title="rootsec" href="/whitehats/rootsec">rootse...</a></th> </tr> <tr> <th>2016-01-24</th> <td><a href="/bugs/wooyun-2016-0172365"> 安全狗sql注入防御策略完全bypass之三</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0172365#comment">4/33</a></th> <th><a title="進撃のDanny" href="/whitehats/進撃のDanny">進撃の...</a></th> </tr> <tr> <th>2016-01-22</th> <td><a href="/bugs/wooyun-2016-0171945">贷齐乐系统最新版sql注入(无需登录绕过WAF可union select跨表查询)</a> <img src="/images/credit.png" alt="" class="credit"> <img src="/images/m3.png" alt="" class="credit"> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0171945#comment">51/233</a></th> <th><a title="phith0n" href="/whitehats/phith0n">phith0...</a></th> </tr> <tr> <th>2016-01-22</th> <td><a href="/bugs/wooyun-2016-0171801">HTML Email2.42最新版存在漏洞可远程执行任意代码(学习好姿势)</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0171801#comment">5/33</a></th> <th><a title="k0_pwn" href="/whitehats/k0_pwn">k0_pwn</a></th> </tr> <tr> <th>2016-01-21</th> <td><a href="/bugs/wooyun-2016-0171698">一个不应该出现的错误导致PHPcmsV9.6被秒杀</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0171698#comment">44/185</a></th> <th><a title="路人甲" href="/whitehats/路人甲">路人甲</a></th> </tr> <tr> <th>2016-01-21</th> <td><a href="/bugs/wooyun-2016-0171646">从一个日志中发现的TRSWCM V6.5+ 后台GETSHELL漏洞</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0171646#comment">7/47</a></th> <th><a title="F1uYu4n" href="/whitehats/F1uYu4n">F1uYu4...</a></th> </tr> <tr> <th>2016-01-21</th> <td><a href="/bugs/wooyun-2016-0171555">利用百度一处缺陷劫持其他网站帐号(以站长之家为例)</a> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0171555#comment">9/25</a></th> <th><a title="q601333824" href="/whitehats/q601333824">q60133...</a></th> </tr> <tr> <th>2016-01-21</th> <td><a href="/bugs/wooyun-2016-0171552">TRSWCM文件读取漏洞(四)</a> <img src="/images/m2.png" alt="" class="credit"> </td> <th><a title="评论一下" href="/bugs/wooyun-2016-0171552#comment">11/41</a></th> <th><a title="applychen" href="/whitehats/applychen">applyc...</a></th> </tr> </tbody> </table> <p class="page">共 38543 条纪录,1928 页 <a href="/bugs/new_public/page/1">1</a> <a href="/bugs/new_public/page/2">2</a> <a href="/bugs/new_public/page/3">3</a> <a href="/bugs/new_public/page/4">4</a> <a class="current" href="/bugs/new_public/page/5">5</a> <a href="/bugs/new_public/page/6">6</a> <a href="/bugs/new_public/page/7">7</a> <a href="/bugs/new_public/page/8">8</a> <a href="/bugs/new_public/page/9">9</a> </p> </div> <div id="footer"> <span class="copyright fleft"> Copyright © 2010 - 2015 <a href="#">wooyun.org</a>,All Rights Reserved <a href="http://www.miibeian.gov.cn/">京ICP备15041338号-1</a> <!--a href="http://SAE.sina.com.cn" target="_blank"><img src="/images/SAE_bottom_logo.png" title="Powered by Sina App Engine"></a--> </span> <span class="other fright"> <a href="/impression">行业观点</a> · <a href="/lawer">法律顾问</a> · <a href="/contactus">联系我们</a> · <a href="/help">帮助</a> · <a href="/about">关于</a> </span> </div> <script type="text/javascript"> var _bdhmProtocol = (("https:" == document.location.protocol) ? " https://" : " http://"); document.write(unescape("%3Cscript src='" + _bdhmProtocol + "hm.baidu.com/h.js%3Fc12f88b5c1cd041a732dea597a5ec94c' type='text/javascript'%3E%3C/script%3E")); </script> <script type="text/javascript" id="bdshare_js" data="type=button" ></script> <script type="text/javascript" id="bdshell_js"></script> <script type="text/javascript"> document.getElementById("bdshell_js").src = "http://bdimg.share.baidu.com/static/js/shell_v2.js?cdnversion=" + new Date().getHours(); if (top.location !== self.location) top.location=self.location; </script> </body> </html></span><span style="font-size: 24px;"> </span>原文链接:https://www.f2er.com/regex/359281.html