ham3d.net cms Adminpage default password

2019.12.29
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

################################################################### # Exploit Title : ham3d.net cms Adminpage default password # Author [ Discovered By ] : EbRaHiM-VaKeR # Team : www.Iran-Sec.net Iran Security Group # Date : 2019/08/30 # Vendor Homepage : http://www.ham3d.net/ # Tested On : Windows and Linux # Category : WebApps # Exploit Risk : High ################################################################### #Google Dork: intext:برنامه نویسی شده توسط شرکت حامد پردازش ایرانیان (Use Your brain :v) ################################################################### # Example Vulnerable Sites : ************************* [+] http://setareganzamin.com/ADMIN123654789SETAREGANEZAMIN/index.php?login [+] http://assc.ir/admin/?forgot_password#?login [+] User & Password:admin ################################################################### # Discovered By EbRaHiM-VaKeR from Iran Security Group #Mojtaba Mobham / Kaveh Turk / Mr JxRoot / 0P3N3R ###################################################################


Vote for this issue:
33%
67%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top