Security
Headlines
HeadlinesLatestCVEs

Headline

Online Sports Complex Booking System 1.0 Insecure Settings

Online Sports Complex Booking System version 1.0 suffers from an ignored default credential vulnerability.

Packet Storm
#sql#xss#csrf#vulnerability#web#ios#mac#windows#apple#google#ubuntu#linux#debian#cisco#java#php#perl#auth#ruby#firefox

Online Sports Complex Booking System 1.0 Insecure Settings

Posted Sep 6, 2024

Authored by indoushka

Online Sports Complex Booking System version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit

SHA-256 | 7ef39718e1694996d6c3234f87defd525659e7cde8353fa86e03c43c5fd1bf04

Download | Favorite | View

Online Sports Complex Booking System 1.0 Insecure Settings

====================================================================================================================================| # Title     : Online Sports Complex Booking System v1.0 Insecure Settings Vulnerability                                          || # Author    : indoushka                                                                                                          || # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 125.0.1 (64 bits)                                                   || # Vendor    : https://www.sourcecodester.com/php/15236/online-sports-complex-booking-system-phpmysql-free-source-code.html       |====================================================================================================================================poc :[+] Dorking İn Google Or Other Search Enggine.[+] Insecure Settings : appears to leave a default administrative account in place post installation.[+] use payload : user =  admin & pass = admin123[+] https://www/127.0.0.1/yorubanwitness000webhostappcom/admin/Greetings to :==================================================jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R |================================================================

File Tags

  • ActiveX (933)
  • Advisory (86,685)
  • Arbitrary (17,036)
  • BBS (2,859)
  • Bypass (1,902)
  • CGI (1,047)
  • Code Execution (7,875)
  • Conference (692)
  • Cracker (844)
  • CSRF (3,421)
  • DoS (25,203)
  • Encryption (2,393)
  • Exploit (54,137)
  • File Inclusion (4,271)
  • File Upload (1,009)
  • Firewall (822)
  • Info Disclosure (2,912)
  • Intrusion Detection (917)
  • Java (3,155)
  • JavaScript (907)
  • Kernel (7,258)
  • Local (14,836)
  • Magazine (587)
  • Overflow (13,207)
  • Perl (1,435)
  • PHP (5,253)
  • Proof of Concept (2,401)
  • Protocol (3,749)
  • Python (1,654)
  • Remote (31,825)
  • Root (3,669)
  • Rootkit (529)
  • Ruby (640)
  • Scanner (1,657)
  • Security Tool (8,041)
  • Shell (3,298)
  • Shellcode (1,219)
  • Sniffer (904)
  • Spoof (2,292)
  • SQL Injection (16,700)
  • TCP (2,462)
  • Trojan (690)
  • UDP (919)
  • Virus (672)
  • Vulnerability (33,054)
  • Web (10,130)
  • Whitepaper (3,783)
  • x86 (969)
  • XSS (18,281)
  • Other

File Archives

  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • Older

Systems

  • AIX (429)
  • Apple (2,104)
  • BSD (378)
  • CentOS (61)
  • Cisco (1,954)
  • Debian (7,117)
  • Fedora (1,693)
  • FreeBSD (1,247)
  • Gentoo (4,567)
  • HPUX (880)
  • iOS (387)
  • iPhone (108)
  • IRIX (220)
  • Juniper (71)
  • Linux (51,066)
  • Mac OS X (696)
  • Mandriva (3,105)
  • NetBSD (256)
  • OpenBSD (489)
  • RedHat (16,731)
  • Slackware (941)
  • Solaris (1,614)
  • SUSE (1,444)
  • Ubuntu (9,807)
  • UNIX (9,449)
  • UnixWare (187)
  • Windows (6,762)
  • Other

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution