vimarsana.com

Page 11 - Exploit Title News Today : Breaking News, Live Updates & Top Stories | Vimarsana

PHPJabbers Service Booking Script 1 0 Cross Site Scripting

# Exploit Title: PHPJabbers Service Booking Script 1.0 - Reflected XSS# Exploit Author: CraCkEr# Date: 21/07/2023# Vendor: PHPJabbers# Vendor Homepage: https://www.phpjabbers.com/# Software Link: https://www.phpjabbers.com/service-booking-script/# Tested on: Windows 10 Pro# Impact: Manipulate the content of the site# CVE: CVE-2023-4113## GreetingsThe PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushka CryptoJob (Twitter) twitter.com/0x0CryptoJob## DescriptionThe attacker

Joomla JLex Review 6 0 1 Cross Site Scripting

# Exploit Title: Joomla JLex Review 6.0.1 - Reflected XSS# Exploit Author: CraCkEr# Date: 01/08/2023# Vendor: JLexArt# Vendor Homepage: https://jlexart.com/# Software Link: https://extensions.joomla.org/extension/jlex-review/# Demo: https://jlexreview.jlexart.com/# Tested on: Windows 10 Pro# Impact: Manipulate the content of the site ## GreetingsThe PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushka CryptoJob (Twitter) twitter.com/0x0CryptoJob## DescriptionThe attacker

Uvdesk 1 1 3 Shell Upload - KizzMyAnthia com

# Exploit Title: Uvdesk v1.1.3 - File Upload Remote Code Execution (RCE) (Authenticated)# Date: 28/07/2023# Exploit Author: Daniel Barros (@cupc4k3d) - Hakai Offensive Security # Vendor Homepage: https://www.uvdesk.com# Software Link: https://github.com/uvdesk/community-skeleton# Version: 1.1.3# Example: python3 CVE-2023-39147.py -u "http://$ip:8000/" -c "whoami"# CVE : CVE-2023-39147# Tested on: Ubuntu 20.04.6import requestsimport argparsedef get args():parser = argparse.ArgumentParser()parser.add argument('-u', ' url', required=True, action='store',

General Device Manager 2 5 2 2 Buffer Overflow

# Exploit Title: General Device Manager 2.5.2.2 - Buffer Overflow (SEH)# Date: 30.07.2023# Software Link: https://download.xm030.cn/d/MDAwMDA2NTQ=# Software Link 2:https://www.maxiguvenlik.com/uploads/importfiles/General DeviceManager.zip# Exploit Author: Ahmet Ümit BAYRAM# Tested Version: 2.5.2.2# Tested on: Windows 10 64bit# 1.- Run python code : exploit.py# 2.- Open pwned.txt and copy all content to clipboard# 3.- Open Device Manage and press Add Device#

Joomla iProperty Real Estate 4 1 1 Cross Site Scripting

# Exploit Title: Joomla iProperty Real Estate 4.1.1 - Reflected XSS# Exploit Author: CraCkEr# Date: 29/07/2023# Vendor: The Thinkery LLC# Vendor Homepage: http://thethinkery.net# Software Link: https://extensions.joomla.org/extension/vertical-markets/real-estate/iproperty/# Demo: https://iproperty.thethinkery.net/# Tested on: Windows 10 Pro# Impact: Manipulate the content of the site ## GreetingsThe PitBull, Raz0r, iNs, SadsouL, His0k4, Hussin X, Mr. SQL , MoizSid09, indoushka CryptoJob (Twitter)

© 2025 Vimarsana

vimarsana © 2020. All Rights Reserved.