comparemela.com

Latest Breaking News On - Vendor homepage - Page 3 : comparemela.com

Free And Open Source Inventory Management System 1 0 SQL Injection

# Exploit Title: Free and Open Source Inventory Management System 1.0 - Unauthenticated SQL Injection# Exploit Author: Sefa Ozan# Date: 16/09/2023# Vendor: MAYURIK# Vendor Homepage: https://mayurik.com/# Software Link: https://www.sourcecodester.com/php/16741/free-and-open-source-inventory-management-system-php-source-code.html# Tested on: Windows 10 Pro & Ubuntu 22.04## Description:The `pid[]` parameter is vulnerable to Time Based SQL injection attacks. To prove the existence of the vulnerability,

Academy LMS 6 2 Cross Site Scripting - KizzMyAnthia com

# Exploit Title: Academy LMS 6.2 - Reflected XSS# Exploit Author: CraCkEr# Date: 29/08/2023# Vendor: Creativeitem# Vendor Homepage: https://creativeitem.com/# Software Link: https://demo.creativeitem.com/academy/# Tested on: Windows 10 Pro# Impact: Manipulate the content of the site# CVE: CVE-2023-4973# CWE: CWE-79 - CWE-74 - CWE-707## GreetingsThe PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushkaCryptoJob (Twitter)

Academy LMS 6 2 SQL Injection - KizzMyAnthia com

# Exploit Title: Academy LMS 6.2 - SQL Injection# Exploit Author: CraCkEr# Date: 29/08/2023# Vendor: Creativeitem# Vendor Homepage: https://creativeitem.com/# Software Link: https://demo.creativeitem.com/academy/# Tested on: Windows 10 Pro# Impact: Database Access# CVE: CVE-2023-4974# CWE: CWE-89 / CWE-74 / CWE-707## GreetingsThe PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushkaCryptoJob (Twitter) twitter.com/0x0CryptoJob## DescriptionSQL injection attacks

Kingo ROOT 1 5 8 Unquoted Service Path - KizzMyAnthia com

#Exploit Title: Kingo ROOT 1.5.8 - Unquoted Service Path#Date: 8/22/2023#Exploit Author: Anish Feroz (ZEROXINN)#Vendor Homepage: https://www.kingoapp.com/#Software Link: https://www.kingoapp.com/android-root/download.htm#Version: 1.5.8.3353#Tested on: Windows 10 Pro -Discovering Unquoted Path C:UsersAnish>sc qc KingoSoftService[SC] QueryServiceConfig SUCCESSSERVICE NAME: KingoSoftServiceTYPE : 110 WIN32 OWN PROCESS (interactive)START TYPE : 2 AUTO STARTERROR CONTROL : 1 NORMALBINARY PATH NAME : C:UsersUsmanAppDataLocalKingosoftKingo Rootupdate 27205binKingoSoftService.exeLOAD ORDER GROUP :TAG : 0DISPLAY NAME : KingoSoftServiceDEPENDENCIES :SERVICE START NAME : LocalSystemC:UsersAnish>systeminfoHost Name: DESKTOP-UT7E7CFOS Name: Microsoft

FileMage Gateway 1 10 9 Local File Inclusion - KizzMyAnthia com

# Exploit Title: FileMage Gateway 1.10.9 - Local File Inclusion# Date: 8/22/2023# Exploit Author: Bryce "Raindayzz" Harty # Vendor Homepage: https://www.filemage.io/# Version: Azure Versions < 1.10.9# Tested on: All Azure deployments < 1.10.9 # CVE : CVE-2023-39026# Technical Blog - https://raindayzz.com/technicalblog/2023/08/20/FileMage-Vulnerability.html# Patch from vendor - https://www.filemage.io/docs/updates.htmlimport requestsimport warningswarnings.filterwarnings("ignore")def worker(url):response = requests.get(url, verify=False, timeout=.5)return responsedef main():listIP

© 2024 Vimarsana

vimarsana © 2020. All Rights Reserved.