Lanse Host admin page Default Password Vulnerability

2015.12.20
Credit: Darkcrew.Org
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

###################### # Exploit Title : Lanse Host admin page Default Password Vulnerability # Exploit Author : Darkcrew.Org # Vendor Homepage : http://www.lansehost.com/ # Google Dork : "web tasarım : Lanse Host" # Date: 2015/12/19 # Version : All # ###################### # PoC: # User: admin or lanse # Password: 123 # # #Demo: # #http://www.akoXnreklam.com.tr/admin/login.php #http://ozbasakXdegirmen.com.tr/admin/login.php #http://agapakX.com.tr/admin/login.php #http://ucelmutfak.cXom.tr/admin/login.php #http://www.modeXmfiltre.com/admin/login.php #http://www.halikXlinik.net/admin/login.php #http://www.umXut-osgb.com/admin/login.php #http://www.oXzhonsan.com.tr/admin/login.php #http://www.Xkonyalux.com/admin/login.php # ###################### # Discovered by : # Batur-ı Mir Sultan (https://www.facebook.com/BaturMirSultan) # DarkCrew.Org (https://www.facebook.com/Istiklal.Official) ###################### Tnx : All My Friend And DarkCrew.Org Family ######################


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top