Advertisement


Looking for a fix? Check your Codebase security with multiple scanners from Scanmycode.today


Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2019110070

Below is a copy:

Powered By Komquest Solutions Vulnerability Bypass Admin Default & Register User
-Author : Jenderal92
-Team : Baku Hantam Crew
-Tested By : Android 7.0
-Google Dork : "Powered By Komquest Solutions"

[+]Dorking In Search Engine Use Dork above
[+]Choose One Target or all 
[+] input exploit : site.com/admin
[+] Username : admin
[+] Password : admin
[+] Upload Shell: D
[+]If Failed Try registering in an existing column.
==Greetz : Naskleng45 - _ByME

=> Full Tutorial : https://www.main-inter.net/2019/11/powered-by-komquest-solutions.html?m=1

Copyright ©2019 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.