Browsing the "injection" Tag

Hirschmann (Belden) BAT-C2 8.8.1.0R8 Command Injection – Torchsec

December 1st, 2022 | 🕒

https://www.ispeech.org CyberDanube Security Research 20221124-0-------------------------------------------------------------------------------title| Authenticated Command Injectionproduct| Hirschmann (Belden) BAT-C2vulnerable version| 8.8.1.0R8fixed version| 09.13.01.00R04CVE number| CVE-2022-40282impact| Highhomepage| https://hirschmann.com/| https://beldensolutions.comfound|


Concrete CMS 9.1.3 XPATH Injection – Torchsec

November 29th, 2022 | 🕒

Powered by iSpeech ## Title: concretecms-9.1.3 Xpath injection## Author: nu11secur1ty## Date: 11.28.2022## Vendor: https://www.concretecms.org/## Software: https://www.concretecms.org/download## Reference: https://github.com/nu11secur1ty/CVE-nu11secur1ty/tree/main/vendors/concretecms.org/2022/concretecms-9.1.3 ## Description:The


Sanitization Management System 1.0 SQL Injection – Torchsec

November 26th, 2022 | 🕒

https://www.ispeech.org ## Title: SMS - PHP (by: oretnom23 ) v1.0 SQLi## Author: nu11secur1ty## Date: 11.25.2022## Vendor: https://github.com/oretnom23,https://www.sourcecodester.com/users/tips23## Software: https://www.sourcecodester.com/download-code?nid=15770&title=Sanitization+Management+System+Project+in+PHP+and+MySQL+Free+Source+Code## Reference:


FLIR AX8 1.46.16 Remote Command Injection – Torchsec

November 2nd, 2022 | 🕒

iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require 'rex/stopwatch' class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude