Gibbon 26.0.00 Server-Side Template Injection / Remote Code Execution – Torchsec
April 2nd, 2024 | ๐
Text to Voice # Exploit Title: Gibbon LMS has an SSTI vulnerability on the v26.0.00 version# Date: 21.01.2024# Exploit Author:
April 2nd, 2024 | ๐
Text to Voice # Exploit Title: Gibbon LMS has an SSTI vulnerability on the v26.0.00 version# Date: 21.01.2024# Exploit Author:
March 30th, 2024 | ๐
https://www.ispeech.org/text.to.speech Exploit Title: FoF Pretty Mail 1.1.2 Extension for Flarum Command InjectionDate: 03/28/2024Exploit Author: Chokri HammediVendor Homepage: https://flarum.org/Software Link: https://github.com/FriendsOfFlarum/pretty-mailVersion:
March 30th, 2024 | ๐
iSpeech.org Exploit Title: FoF Pretty Mail 1.1.2 Extension for Flarum Server-SideTemplate Injection (SSTI)Date: 03/28/2024Exploit Author: Chokri HammediVendor Homepage: https://flarum.org/Software Link:
March 29th, 2024 | ๐
iSpeech.org ## Title: LMS-PHP-byoretnom23-v1.0 Multiple-SQLi## Author: nu11secur1ty## Date: 03/28/2024## Vendor: https://github.com/oretnom23## Software: https://www.sourcecodester.com/php/17268/computer-laboratory-management-system-using-php-and-mysql.html#comment-104400## Reference: https://portswigger.net/web-security/sql-injection ## Description:The id parameter appears
March 29th, 2024 | ๐
iSpeech.org # Exploit Title: Purei CMS 1.0 - SQL Injection# Date: 27-03-2024]# Exploit Author: Number 7]# Vendor Homepage: purei.com]# Version:
March 28th, 2024 | ๐
https://www.ispeech.orgThe server in Circontrol Raption versions through 5.11.2 has a pre-authentication stack-based buffer overflow that can be exploited to gain
March 28th, 2024 | ๐
Text to Speech Voices Wall-Escape (CVE-2024-28085) Skyler Ferrante: Escape sequence injection in util-linux wall =================================================================Summary================================================================= The util-linux wall command does
March 28th, 2024 | ๐
https://www.ispeech.org/text.to.speech # Exploit Title: Event Management - SQL Injection# Application: Event Management# Date: 19.02.2024# Bugs: SQL Injection # Exploit Author:
March 27th, 2024 | ๐
iSpeech + Exploit Title: MobileShop master v1.0 - SQL Injection Vuln.+ Date: 2024-13-03+ Exploit Author: "HAZIM ARBAล" from EMA Security
March 27th, 2024 | ๐
iSpeech.org # Exploit Title: NAGIOS XI SQLI# Google Dork: if applicable]# Date: 02/26/2024# Exploit Author: Jarod Jaslow (MAWK) https://www.linkedin.com/in/jarod-jaslow-codename-mawk-265144201/# Vendor
March 22nd, 2024 | ๐
Text to Speech Voices # Exploit Title: SourceCodester PHP Task Management System 1.0 (update-employee.php) - SQL Injection# Date: 22 March
March 21st, 2024 | ๐
https://www.ispeech.org # Exploit Title: Teacher Subject Allocation Management System 1.0 - 'searchdata' SQLi# Date: 2023-11-15# Exploit Author: Ersin Erenler# Vendor
March 20th, 2024 | ๐
https://www.ispeech.org/text.to.speech # Exploit Title: Simple Task List 1.0 - 'status' SQLi# Date: 2023-11-15# Exploit Author: Ersin Erenler# Vendor Homepage: https://code-projects.org/simple-task-list-in-php-with-source-code#
March 20th, 2024 | ๐
Text to Speech # Exploit Title: Blood Bank 1.0 - 'bid' SQLi# Date: 2023-11-15# Exploit Author: Ersin Erenler# Vendor Homepage:
Gloss