Treativa script admin page Default Password Vulnerability

2015.11.21
Risk: High
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

###################### # Exploit Title : Treativa script admin page Default Password Vulnerability # Exploit Author : Persian Hack Team # Vendor Homepage : http://treativa.com/ # Google Dork : "Design by: Treativa" # Date: 2015/11/18 # Version : All # ###################### # PoC: # User: treativa # Password: treativa123 # # #Demo: # #http://www.hikXo.it/admin.php #http://www.sXkan.it/admin.php #http://www.Xmusig.eu/design/admin.php #http://wwwX.albergocavallino.it/admin.php #http://wwXw.sedilux.it/admin.php #http://wXww.trattoriadarochet.it/admin.php #http://Xwww.albateo.it/admin.php #http://www.acitur.itX/admin.php #http://www.alberoXmagico.it/admin.php #http://www.albosXerramenti.it/admin.php #http://www.almaX-tec.it/admin.php #http://www.casXaledegliulivi.eu/admin.php #http://ristorantXeaitrecanai.com/admin/pages/index.php #http://www.mXansrlmanzano.com/admin.php # ###################### # Discovered by : # Mojtaba MobhaM (kazemimojtaba@live.com) # T3NZOG4N (t3nz0g4n@yahoo.com) ###################### Tnx : All My Friend And Spt Milad Hacking ######################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top