
Google Search Dork: inurl:"/vam/index_vam_op.php"
# Google Dork: inurl:"/vam/index_vam_op.php" # Virtual Airlines Manager 2.6.2 - Persistent Cross-Site Scripting. This dork is linked to the following existing exploit: # Date: 27/07/2020 # Exploit Author: Alexandros Pappas
inurl:"/vam/index_vam_op.php" Google Dork Source : inurl:"/vam/index_vam_op.php"