April 23rd, 2024 | 🕒
iSpeech Apr 23, 2024NewsroomEnd-to-End Encryption / Privacy European Police Chiefs said that the complementary partnership between law enforcement agencies and
April 15th, 2024 | 🕒
iSpeech Apr 15, 2024The Hacker NewsActive Directory / Attack Surface To minimize the risk of privilege misuse, a trend in
April 11th, 2024 | 🕒
TTS Demo CVE ID: CVE-2023-27195 Description:An access control issue in Trimble TM4Web v22.2.0 allowsunauthenticated attackers to access a specific crafted
April 3rd, 2024 | 🕒
iSpeech.org # Exploit Title: Daily Habit Tracker 1.0 - Broken Access Control# Date: 2 Feb 2024# Exploit Author: Yevhenii Butenko#
March 29th, 2024 | 🕒
iSpeech.org Exploit Title: Broken Access Control - on NodeBB v3.6.7 Date: 22/2/2024 Exploit Author: Vibhor Sharma Vendor Homepage: https://nodebb.org/ Version:
March 6th, 2024 | 🕒
https://www.ispeech.org/text.to.speech ulldisclosure-bounces@seclists.org>Status: ROContent-Length: 5433Lines: 153 =====Tempest Security Intelligence - Security Advisory -CVE-2023-38944]======= Access Control Bypass in Multilaser routers' Web Management
March 6th, 2024 | 🕒
iSpeech.org =====Tempest Security Intelligence - Security Advisory -CVE-2023-38945]======= Access Control Bypass in Multilaser routers' Web Management Interface Author: Vinicius Moraes
March 5th, 2024 | 🕒
iSpeech =====Tempest Security Intelligence - Security Advisory -CVE-2023-38946]======= Access Control Bypass in Multilaser router's Web Management Interface Author: Vinicius Moraes
February 29th, 2024 | 🕒
iSpeech # Exploit Title: WordPress Plugin Admin Bar & Dashboard Access Control Version: 1.2.8 - "Dashboard Redirect" field Stored Cross-Site
February 12th, 2024 | 🕒
iSpeech.org +] Credits: John Page (aka hyp3rlinx) +] Website: hyp3rlinx.altervista.org+] Source: http://hyp3rlinx.altervista.org/advisories/WYRESTORM_APOLLO_VX20_INCORRECT_ACCESS_CONTROL_DOS_CVE-2024-25736.txt+] twitter.com/hyp3rlinx+] ISR: ApparitionSec Vendor]www.wyrestorm.com Product]APOLLO VX20 < 1.3.58
February 9th, 2024 | 🕒
iSpeech.org +] Credits: John Page (aka hyp3rlinx) +] Website: hyp3rlinx.altervista.org+] Source: http://hyp3rlinx.altervista.org/advisories/IBMI_ACCESS_CLIENT_REMOTE_CREDENTIAL_THEFT_CVE-2024-22318.txt+] twitter.com/hyp3rlinx+] ISR: ApparitionSec Vendor]www.ibm.com Product]IBM i Access Client
February 2nd, 2024 | 🕒
Text to Speech Feb 02, 2024NewsroomData Breach / Cloud Security Cloudflare has revealed that it was the target of a
January 31st, 2024 | 🕒
iSpeech.org TELSAT marKoni FM Transmitter 1.9.5 Client-Side Access Control Bypass Vendor: TELSAT SrlProduct web page: https://www.markoni.itAffected version: Markoni-D (Compact) FM
January 31st, 2024 | 🕒
iSpeech Jan 31, 2024NewsroomSoftware Security / Linux Multiple security vulnerabilities have been disclosed in the runC command line tool that
Gloss