Open Source Medicine Ordering System 1.0 SQL Injection – Torchsec
April 8th, 2024 | 🕒
https://www.ispeech.org/text.to.speech # Exploit Title : Open Source Medicine Ordering System v1.0 - SQLi# Author : Onur Karasalihoğlu# Date : 27/02/2024#
April 8th, 2024 | 🕒
https://www.ispeech.org/text.to.speech # Exploit Title : Open Source Medicine Ordering System v1.0 - SQLi# Author : Onur Karasalihoğlu# Date : 27/02/2024#
September 19th, 2023 | 🕒
iSpeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info={})super(update_info(info,'Name'
August 31st, 2023 | 🕒
Convert Text to Speech ====================================================================================================================================| # Title : Foodiee - Online Food Ordering Web Application V1.0.0 XSS Vulnerability || #
May 5th, 2023 | 🕒
german tts # Exploit Title: Online Pizza Ordering System 1.0 - Unauthenticated File Upload# Date: 03/05/2023# Exploit Author: URGAN #
April 3rd, 2023 | 🕒
https://www.ispeech.org/text.to.speech ## Title: Online-Pizza-Ordering-1.0 File-Inclusion-RCE## Author: nu11secur1ty## Date: 03.30.2023## Vendor: https://github.com/oretnom23## Software: https://www.sourcecodester.com/php/16166/online-pizza-ordering-system-php-free-source-code.html## Reference: https://portswigger.net/web-security/file-upload ## Description:The malicious user can
April 1st, 2023 | 🕒
https://www.ispeech.org/text.to.speech ## Title: Online-Pizza-Ordering-1.0-Multiple-SQLi## Author: nu11secur1ty## Date: 03.31.2023## Vendor: https://github.com/oretnom23## Software: https://www.sourcecodester.com/php/16166/online-pizza-ordering-system-php-free-source-code.html## Reference: https://portswigger.net/web-security/sql-injection ## Description:The `email` parameter appears to
February 25th, 2023 | 🕒
iSpeech # Simple Food Ordering System - Authenticated Reflected Cross Site Scripting ### Date: > 17 February 2023 ### CVE
January 24th, 2023 | 🕒
https://www.ispeech.org/text.to.speech Me&u CEO Katrina Barry says consumers have embraced her company’s at-table food ordering technology, which enables people to place
January 23rd, 2023 | 🕒
https://www.ispeech.org ## Title: Food Ordering System v2 File upload Vulnerability + web-shell upload - RCE## Author: nu11secur1ty## Date: 01.23.2023## Vendor:
January 13th, 2023 | 🕒
https://www.ispeech.org # Exploit Title: Online Food Ordering System v2 - Sql Injection (Time-Based Blind)# Date: 01/11/2023# Exploit Author: Hasan Baskın#
January 12th, 2023 | 🕒
iSpeech # Exploit Title: Online Food Ordering System v2 - Remote Code Execution (RCE) (Unauthenticated)# Date: 01/11/2023# Exploit Author: Onurcan
January 11th, 2023 | 🕒
iSpeech # Exploit Title: Online Food Ordering System v2 - Stored Cross Site Scripting (XSS)# Date: 01/11/2023# Exploit Author: Alaeddin
January 11th, 2023 | 🕒
Text to Speech Demo # Exploit Title: Online Food Ordering System v2 - Remote Code Execution (RCE) (Unauthenticated)# Date: 01/10/2023#
January 11th, 2023 | 🕒
https://www.ispeech.org/text.to.speech # Exploit Title: Online Food Ordering System v2 - Sql Injection (Time-Based Blind)# Date: 01/10/2023# Exploit Author: Anıl Kızıltan#
Gloss