Ulicms 2023.1 Create Administrator – Torchsec
May 26th, 2023 | ๐
Powered by iSpeech #Exploit Title: Ulicms 2023.1 - create admin user via mass assignment#Application: Ulicms#Version: 2023.1-sniffing-vicuna#Bugs: create admin user via
May 26th, 2023 | ๐
Powered by iSpeech #Exploit Title: Ulicms 2023.1 - create admin user via mass assignment#Application: Ulicms#Version: 2023.1-sniffing-vicuna#Bugs: create admin user via
May 6th, 2023 | ๐
iSpeech.org #Exploit Title: Ulicms-2023.1 sniffing-vicuna - Stored Cross-Site Scripting (XSS)#Application: Ulicms#Version: 2023.1-sniffing-vicuna#Bugs: Stored Xss#Technology: PHP#Vendor URL: https://en.ulicms.de/#Software Link: https://www.ulicms.de/content/files/Releases/2023.1/ulicms-2023.1-sniffing-vicuna-full.zip#Date of
May 6th, 2023 | ๐
iSpeech #Exploit Title: Ulicms-2023.1 sniffing-vicuna - Remote Code Execution (RCE)#Application: Ulicms#Version: 2023.1-sniffing-vicuna#Bugs: RCE#Technology: PHP#Vendor URL: https://en.ulicms.de/#Software Link: https://www.ulicms.de/content/files/Releases/2023.1/ulicms-2023.1-sniffing-vicuna-full.zip#Date of found:
March 24th, 2020 | ๐
https://www.ispeech.org # Exploit Title: UliCMS 2020.1 - Persistent Cross-Site Scripting# Google Dork: N/A# Date: 2019-03-24# Exploit Author: SunCSR# Vendor Homepage:
March 24th, 2020 | ๐
iSpeech # Exploit Title: UliCMS 2020.1 - Persistent Cross-Site Scripting # Google Dork: N/A # Date: 2019-03-24 # Exploit Author:
June 10th, 2019 | ๐
iSpeech.org # Exploit Title: UliCMS 2019.1 "Spitting Lama" - Stored Cross-Site Scripting # Google Dork: intext:"by UliCMS" # Date: 2019-05-12
April 23rd, 2019 | ๐
https://www.ispeech.org # Exploit Title: UliCMS - 2019.2 , 2019.1 - Multiple Cross-Site Scripting # Google Dork: intext:"by UliCMS" # Exploit
Gloss