Page 16 - Exploit Author News Today : Breaking News, Live Updates & Top Stories | Vimarsana

Stay updated with breaking news from Exploit author. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.

Top News In Exploit Author Today - Breaking & Trending Today

Alkacon OpenCMS 15.0 Cross Site Scripting - KizzMyAnthia.com

# Exploit Title: Alkacon OpenCMS 15.0 - Multiple Cross-Site Scripting# Date: 1/07/2023# Exploit Author: tmrswrr# Vendor Homepage: http://www.opencms.org# Software Link: https://github.com/alkacon/opencms-core# Version: v15.0POC:1 ) Login in demo page , go to this urlhttps://demo.opencms.org/workplace#!explorer/8b72b2fe-180f-11ee-b326-0242ac11002b!!/sites/livedemo!!/.galleries/livedemo/!!2 ) Click /.galleries/ , after right click any png file , open gallery, write in search button this payload3 ) You will ....

Alkacon Open , Software Link , Exploit Title , Multiple Cross Site , Exploit Author , Vendor Homepage ,

PrestaShop Winbiz Payment Improper Limitation

# Exploit Title: PrestaShop Winbiz Payment module - Improper Limitation of a Pathname to a Restricted Directory# Date: 2023-06-20# Dork: /modules/winbizpayment/downloads/download.php# country: Iran# Exploit Author: Amirhossein Bahramizadeh# Category : webapps# Vendor Homepage: https://shop.webbax.ch/modules-pour-winbiz/153-module-prestashop-winbiz-payment-reverse.html# Version: 17.1.3 (REQUIRED)# Tested on: Windows/Linux# CVE : CVE-2023-30198import requestsimport stringimport random# The base URL of the vulnerable sitebase url = "http://example.com"# The ....

Amirhossein Bahramizadeh , Exploit Title , Prestashop Winbiz Payment , Improper Limitation , Exploit Author , Vendor Homepage ,

Microsoft SharePoint Enterprise Server 2016 Spoofing

// Exploit Title: Microsoft SharePoint Enterprise Server 2016 - Spoofing// Date: 2023-06-20// country: Iran// Exploit Author: Amirhossein Bahramizadeh// Category : Remote// Vendor Homepage:// Microsoft SharePoint Foundation 2013 Service Pack 1// Microsoft SharePoint Server Subscription Edition// Microsoft SharePoint Enterprise Server 2013 Service Pack 1// Microsoft SharePoint Server 2019// Microsoft SharePoint Enterprise Server 2016// Tested on: Windows/Linux// ....

Internetopen Mozilla , Amirhossein Bahramizadeh , Microsoft Sharepoint Foundation , Service Pack , Exploit Title , Microsoft Sharepoint Enterprise Server , Exploit Author , Vendor Homepage , Microsoft Sharepoint Server Subscription , Microsoft Sharepoint Server ,

Smart Office Web 20.28 Information Disclosure / Insecure Direct Object Reference

# Exploit Title: Smart Office Web 20.28 - Remote Information Disclosure (Unauthenticated)# Shodan Dork:: inurl:"https://www.shodan.io/search?query=smart+office"# Date: 09/Dec/2022# Exploit Author: Tejas Nitin Pingulkar (https://cvewalkthrough.com/)# Vendor Homepage: https://smartofficepayroll.com/# Software Link: https://smartofficepayroll.com/downloads# Version: Smart Office Web 20.28 and before# CVE Number : CVE-2022-47075 and CVE-2022-47076# CVSS : 7.5 (High)# Reference : https://cvewalkthrough.com/smart-office-suite-cve-2022-47076-cve-2022-47075/# Vulnerability Description:# Smart Office Web 20.28 ....

Tejas Nitin Pingulkar , Smart Office Web , Software Link , Exploit Title , Remote Information Disclosure , Shodan Dork , Exploit Author , Vendor Homepage , Vulnerability Description , Tejas Nitin ,

WordPress Super Socializer 7.13.52 Cross Site Scripting

# Exploit Title: Super Socializer 7.13.52 - Reflected XSS# Dork: inurl: https://example.com/wp-admin/admin-ajax.php?action=the champ sharing count&urls[%3Cimg%20src%3Dx%20onerror%3Dalert%28document%2Edomain%29%3E]=https://www.google.com# Date: 2023-06-20# Exploit Author: Amirhossein Bahramizadeh# Category : Webapps# Vendor Homepage: https://wordpress.org/plugins/super-socializer# Version: 7.13.52 (REQUIRED)# Tested on: Windows/Linux# CVE : CVE-2023-2779import requests# The URL of the vulnerable AJAX endpointurl = "https://example.com/wp-admin/admin-ajax.php"# The vulnerable parameter that is not properly sanitized and escapedvulnerable param = ""# ....

Amirhossein Bahramizadeh , Exploit Title , Super Socializer , Exploit Author , Vendor Homepage ,