Security
Headlines
HeadlinesLatestCVEs

Headline

GYM Management System 1.0 Insecure Settings

GYM Management System version 1.0 suffers from an ignored default credential vulnerability.

Packet Storm
#sql#xss#csrf#vulnerability#web#ios#mac#windows#apple#google#ubuntu#linux#debian#cisco#java#php#perl#auth#ruby#firefox

GYM Management System 1.0 Insecure Settings

Posted Sep 16, 2024

Authored by indoushka

GYM Management System version 1.0 suffers from an ignored default credential vulnerability.

tags | exploit

SHA-256 | 5ee11f413d4f6dbbb71c2d782424145f8284d96790518d7c0e3923c5bd409844

Download | Favorite | View

GYM Management System 1.0 Insecure Settings

====================================================================================================================================| # Title     : GYM Management System 1.0 Insecure Settings Vulnerability                                                          || # Author    : indoushka                                                                                                          || # Tested on : windows 10 Fr(Pro) / browser : Mozilla firefox 130.0.0 (64 bits)                                                   || # Vendor    : https://phpgurukul.com/gym-management-system-using-php-and-mysql/                                                  |====================================================================================================================================poc :[+] Dorking İn Google Or Other Search Enggine.[+] Insecure Settings : appears to leave a default administrative account in place post installation.[+] use payload :     Username: [email protected]      Password: Test@123[+] http://127.0.0.1/agms/admin/dashboard.phpGreetings to :==================================================jericho * Larry W. Cashdollar * LiquidWorm * Hussin-X * D4NB4R |================================================================

File Tags

  • ActiveX (933)
  • Advisory (86,759)
  • Arbitrary (17,063)
  • BBS (2,859)
  • Bypass (1,915)
  • CGI (1,047)
  • Code Execution (7,895)
  • Conference (692)
  • Cracker (844)
  • CSRF (3,423)
  • DoS (25,236)
  • Encryption (2,394)
  • Exploit (54,214)
  • File Inclusion (4,273)
  • File Upload (1,012)
  • Firewall (822)
  • Info Disclosure (2,913)
  • Intrusion Detection (918)
  • Java (3,156)
  • JavaScript (908)
  • Kernel (7,272)
  • Local (14,848)
  • Magazine (587)
  • Overflow (13,212)
  • Perl (1,435)
  • PHP (5,262)
  • Proof of Concept (2,409)
  • Protocol (3,749)
  • Python (1,656)
  • Remote (31,860)
  • Root (3,671)
  • Rootkit (529)
  • Ruby (640)
  • Scanner (1,657)
  • Security Tool (8,046)
  • Shell (3,303)
  • Shellcode (1,219)
  • Sniffer (904)
  • Spoof (2,292)
  • SQL Injection (16,716)
  • TCP (2,463)
  • Trojan (690)
  • UDP (919)
  • Virus (673)
  • Vulnerability (33,064)
  • Web (10,136)
  • Whitepaper (3,784)
  • x86 (970)
  • XSS (18,290)
  • Other

File Archives

  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • Older

Systems

  • AIX (430)
  • Apple (2,104)
  • BSD (378)
  • CentOS (61)
  • Cisco (1,954)
  • Debian (7,120)
  • Fedora (1,693)
  • FreeBSD (1,247)
  • Gentoo (4,567)
  • HPUX (881)
  • iOS (387)
  • iPhone (108)
  • IRIX (220)
  • Juniper (71)
  • Linux (51,142)
  • Mac OS X (696)
  • Mandriva (3,105)
  • NetBSD (256)
  • OpenBSD (489)
  • RedHat (16,780)
  • Slackware (941)
  • Solaris (1,615)
  • SUSE (1,444)
  • Ubuntu (9,828)
  • UNIX (9,454)
  • UnixWare (188)
  • Windows (6,766)
  • Other

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution