b2evolution 7.2.2 Cross Site Request Forgery – Torchsec
July 3rd, 2021 | 🕒
iSpeech # Exploit Title: b2evolution 7.2.2 - 'edit account details' Cross-Site Request Forgery (CSRF)# Exploit Author: Alperen Ergel (@alpernae)# Vendor
July 3rd, 2021 | 🕒
iSpeech # Exploit Title: b2evolution 7.2.2 - 'edit account details' Cross-Site Request Forgery (CSRF)# Exploit Author: Alperen Ergel (@alpernae)# Vendor
February 11th, 2021 | 🕒
iSpeech.org # Exploit Title: b2evolution 6.11.6 - 'tab3' Reflected XSS # CVE: CVE-2020-22839 # Date: 10/02/2021 # Exploit Author: Nakul Ratti,
February 11th, 2021 | 🕒
iSpeech.org # Exploit Title: b2evolution 6.11.6 - 'redirect_to' Open Redirect # Date: 10/02/2021 # Exploit Author: Soham Bakore, Nakul Ratti
February 11th, 2021 | 🕒
iSpeech.org # Exploit Title: *Open redirect in b2evolution CMS 6.11.6 redirect_toparameter in email_passthrough.php*# Google Dork: N/A# Date: 10/02/2021# Exploit Author:
February 10th, 2021 | 🕒
https://www.ispeech.org # Exploit Title: *Reflected XSS in b2evolution CMS 6.11.6 via tab3parameter in evoadm.php*# CVE : *CVE-2020-22839*# Date: 10/02/2021# Exploit
February 10th, 2021 | 🕒
https://www.ispeech.org # Exploit Title: b2evolution 6.11.6 - 'plugin name' Stored XSS # Date: 09/02/2021 # Exploit Author: Soham Bakore, Nakul
Gloss