Security
Headlines
HeadlinesLatestCVEs

Headline

CMS Nexin Adminisztracios Kozpont 1.2 Insecure Settings

CMS Nexin Adminisztracios Kozpont version 1.2 appears to leave default credentials installed after installation.

Packet Storm
#sql#xss#csrf#vulnerability#web#ios#mac#windows#apple#google#ubuntu#linux#debian#cisco#java#php#perl#auth#ruby#firefox

CMS Nexin Adminisztracios Kozpont 1.2 Insecure Settings

Posted Jul 20, 2023

Authored by indoushka

CMS Nexin Adminisztracios Kozpont version 1.2 appears to leave default credentials installed after installation.

tags | exploit

SHA-256 | e614477d10fc119020f0bb6bfcef55d3cf59f2217502dd441fe065c9b47251c1

Download | Favorite | View

CMS Nexin Adminisztracios Kozpont 1.2 Insecure Settings

====================================================================================================================================| # Title     : CMS Nexin Adminisztrációs Központ v1.2 Insecure Settings Vulnerability                                             || # Author    : indoushka                                                                                                          || # Tested on : windows 10 Français V.(Pro) / browser : Mozilla firefox 68.0(32-bit)                                               || # Vendor    : http://www.composeit.hu/                                                                                           |  | # Dork      : Nexin Adminisztrációs Központ v1.2                                                                                 |====================================================================================================================================poc :[+] Dorking İn Google Or Other Search Enggine.[+] appears to leave a default administrative account in place post installation.[+] Panel : http://discocenterhu/admin/[+] User : root & pass : job314Greetings to :=================================================================jericho * Larry W. Cashdollar * shadow_00715 * LiquidWorm * Hussin-X * D4NB4R |===============================================================================

File Tags

  • ActiveX (932)
  • Advisory (81,726)
  • Arbitrary (16,152)
  • BBS (2,859)
  • Bypass (1,733)
  • CGI (1,025)
  • Code Execution (7,236)
  • Conference (679)
  • Cracker (841)
  • CSRF (3,333)
  • DoS (23,360)
  • Encryption (2,365)
  • Exploit (51,612)
  • File Inclusion (4,208)
  • File Upload (965)
  • Firewall (821)
  • Info Disclosure (2,755)
  • Intrusion Detection (890)
  • Java (3,032)
  • JavaScript (851)
  • Kernel (6,641)
  • Local (14,428)
  • Magazine (586)
  • Overflow (12,661)
  • Perl (1,423)
  • PHP (5,138)
  • Proof of Concept (2,337)
  • Protocol (3,583)
  • Python (1,531)
  • Remote (30,661)
  • Root (3,575)
  • Rootkit (508)
  • Ruby (612)
  • Scanner (1,636)
  • Security Tool (7,874)
  • Shell (3,176)
  • Shellcode (1,212)
  • Sniffer (894)
  • Spoof (2,196)
  • SQL Injection (16,303)
  • TCP (2,397)
  • Trojan (687)
  • UDP (885)
  • Virus (664)
  • Vulnerability (31,709)
  • Web (9,621)
  • Whitepaper (3,748)
  • x86 (961)
  • XSS (17,857)
  • Other

File Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • Older

Systems

  • AIX (428)
  • Apple (1,993)
  • BSD (373)
  • CentOS (57)
  • Cisco (1,922)
  • Debian (6,793)
  • Fedora (1,691)
  • FreeBSD (1,244)
  • Gentoo (4,322)
  • HPUX (879)
  • iOS (349)
  • iPhone (108)
  • IRIX (220)
  • Juniper (67)
  • Linux (46,229)
  • Mac OS X (685)
  • Mandriva (3,105)
  • NetBSD (256)
  • OpenBSD (484)
  • RedHat (13,590)
  • Slackware (941)
  • Solaris (1,610)
  • SUSE (1,444)
  • Ubuntu (8,754)
  • UNIX (9,267)
  • UnixWare (186)
  • Windows (6,565)
  • Other

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution