Froxlor 2.0.3 Stable Remote Code Execution – Torchsec
April 8th, 2023 | ๐
iSpeech.org #!/usr/bin/python3 # Exploit Title: Froxlor 2.0.3 Stable - Remote Code Execution (RCE)# Date: 2023-01-08# Exploit Author: Askar (@mohammadaskar2)# CVE:
April 8th, 2023 | ๐
iSpeech.org #!/usr/bin/python3 # Exploit Title: Froxlor 2.0.3 Stable - Remote Code Execution (RCE)# Date: 2023-01-08# Exploit Author: Askar (@mohammadaskar2)# CVE:
February 26th, 2023 | ๐
Speech Synthesis ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStagerprepend
November 9th, 2021 | ๐
iSpeech # Exploit Title: Froxlor 0.10.29.1 - SQL Injection (Authenticated)# Exploit Author: Martin Cernac# Date: 2021-11-05# Vendor: Froxlor (https://froxlor.org/)# Software
November 21st, 2020 | ๐
https://www.ispeech.org # Exploit Title: Froxlor Froxlor Server Management Panel 0.10.16 - Persistent Cross-Site Scripting # Exploit Author: Vulnerability-Lab # Date:
November 17th, 2020 | ๐
iSpeech Document Title:===============Froxlor v0.10.16 CP - (Customer) Persistent Vulnerability References (Source):====================https://www.vulnerability-lab.com/get_content.php?id=2241 Release Date:=============2020-11-12 Vulnerability Laboratory ID (VL-ID):====================================2241 Common Vulnerability Scoring
Gloss