February 20th, 2024 | 🕒
iSpeech # Author: prodigiousMind# Exploit: Wondercms 4.3.2 XSS to RCE import sysimport requestsimport osimport bs4 if (len(sys.argv)<4): print("usage: python3 exploit.py
July 27th, 2023 | 🕒
https://www.ispeech.org/text.to.speech WonderCMS 0.6-Beta Password Disclosure Posted Jul 27, 2023 Authored by indoushka WonderCMS version 0.6-Beta suffers from a password disclosure
November 20th, 2020 | 🕒
iSpeech # Exploit Title: WonderCMS 3.1.3 - 'content' Persistent Cross-Site Scripting # Date: 20-11-2020 # Exploit Author: Hemant Patidar (HemantSolo)
July 17th, 2020 | 🕒
https://www.ispeech.org/text.to.speech SEC Consult Vulnerability Lab Security Advisory < 20200717-0 >=======================================================================title: Multiple Vulnerabilitiesproduct: WonderCMSvulnerable version: < =3.1.0fixed version: -CVE number: -impact:
September 13th, 2019 | 🕒
iSpeech.org CVSS Meta Temp Score Current Exploit Price (≈) 5.4 $0-$5k A vulnerability classified as critical was found in WonderCMS
Gloss