Page 24 - Exploit Author News Today : Breaking News, Live Updates & Top Stories | Vimarsana

Stay updated with breaking news from Exploit author. Get real-time updates on events, politics, business, and more. Visit us for reliable news and exclusive interviews.

Top News In Exploit Author Today - Breaking & Trending Today

Franklin Fueling Systems TS-550 Hash Disclosure / Default Credentials

# Exploit Title: Franklin Fueling Systems TS-550 - Default Password# Date: 4/16/2023# Exploit Author: parsa rezaie khiabanloo# Vendor Homepage: Franklin Fueling Systems (http://www.franklinfueling.com/)# Version: TS-550# Tested on: Linux/Android(termux)Step 1 : attacker can using these dorks and access to find the panelinurl:"relay status.html"inurl:"fms compliance.html"inurl:"fms alarms.html"inurl:"system status.html"inurl:"system reports.html'inurl:"tank status.html"inurl:"sensor status.html"inurl:"tank control.html"inurl:"fms reports.html"inurl:"correction table.html"Step 2 : attacker can send request curl -H "Content-Type:text/xml" data '' http://IP:10001/cgi-bin/tsaws.cgiStep 3 : ....

Exploit Title , Franklin Fueling Systems , Exploit Author , Vendor Homepage ,

Bang Resto 1.0 SQL Injection - KizzMyAnthia.com

# Exploit Title: Bang Resto v1.0 - 'Multiple' SQL Injection# Date: 2023-04-02# Exploit Author: Rahad Chowdhury# Vendor Homepage:https://www.hockeycomputindo.com/2021/05/restaurant-pos-source-code-free.html# Software Link:https://github.com/mesinkasir/bangresto/archive/refs/heads/main.zip# Version: 1.0# Tested on: Windows 10, PHP 7.4.29, Apache 2.4.53# CVE: CVE-2023-29849 Affected Parameters: btnMenuItemID, itemID, itemPrice, menuID, staffID, itemPrice, itemID[],itemqty[], btnMenuItemID Steps to Reproduce: 1. First login your staff panel.2. then go to "order" menu and Select menu ....

Rahad Chowdhury , Software Link , Exploit Title , Bang Resto , Exploit Author , Vendor Homepage , Affected Parameters ,

Bang Resto 1.0 Cross Site Scripting - KizzMyAnthia.com

# Exploit Title: Bang Resto v1.0 - Stored Cross-Site Scripting (XSS)# Date: 2023-04-02# Exploit Author: Rahad Chowdhury# Vendor Homepage:https://www.hockeycomputindo.com/2021/05/restaurant-pos-source-code-free.html# Software Link:https://github.com/mesinkasir/bangresto/archive/refs/heads/main.zip# Version: 1.0# Tested on: Windows 10, PHP 7.4.29, Apache 2.4.53# CVE: CVE-2023-29848 Steps to Reproduce: 1. First login to your admin panel.2. then go to Menu section and click add new menu from group.your request data ....

Rahad Chowdhury , Software Link , Exploit Title , Bang Resto , Stored Cross Site Scripting , Exploit Author , Vendor Homepage ,

File Replication Pro 7.5.0 Insecure Permissions / Privilege Escalation

# Exploit Title: File Replication Pro 7.5.0 - Password disclosure/reset & PrivEsc due Incorrect Access Control# Date: 2023-04-13# Exploit Author: Andrea Intilangelo# Vendor Homepage: http://www.diasoft.net - https://www.filereplicationpro.com# Software Link: http://www.filereplicationpro.com/install/InstData/Windows 64 Bit/VM/frpro.exe# Version: 7.5.0# Tested on: Windows 10 Pro 22H2 x64# CVE: CVE-2023-26918Incorrect file/folder permissions in Diasoft Corporation's File Replication Pro 7.5.0 allow privilege escalation byreplacing a ....

Andrea Intilangelo , Program Filesfilereplicationproprunsrv , Software Link , Program Files , Windows Services , Diasoft Corporation File Replication Pro , Program Filesfilereplicationpro , Program Filesfilereplicationpro Everyone , Exploit Title , File Replication Pro , Incorrect Access , Exploit Author , Vendor Homepage , Diasoft Corporation ,

ChurchCRM 4.5.1 SQL Injection - KizzMyAnthia.com

# Exploit Title: ChurchCRM 4.5.1 - Authenticated SQL Injection# Date: 11-03-2023# Exploit Author: Arvandy# Blog Post: https://github.com/arvandy/CVE/blob/main/CVE-2023-24787/CVE-2023-24787.md# Software Link: https://github.com/ChurchCRM/CRM/releases# Vendor Homepage: http://churchcrm.io/# Version: 4.5.1# Tested on: Windows, Linux# CVE: CVE-2023-24787"""The endpoint /EventAttendance.php is vulnerable to Authenticated SQL Injection (Union-based and Blind-based) via the Event GET parameter.This endpoint can be triggered through the following menu: ....

Church Service Sunday School , Software Link , Exploit Title , Exploit Author , Blog Post , Vendor Homepage , Event Attendance Reports , Event Parameter ,