Flowise 1.6.5 Authentication Bypass – Torchsec
April 25th, 2024 | ๐
iSpeech # Exploit Title: Flowise 1.6.5 - Authentication Bypass# Date: 17-April-2024# Exploit Author: Maerifat Majeed# Vendor Homepage: https://flowiseai.com/# Software Link:
April 25th, 2024 | ๐
iSpeech # Exploit Title: Flowise 1.6.5 - Authentication Bypass# Date: 17-April-2024# Exploit Author: Maerifat Majeed# Vendor Homepage: https://flowiseai.com/# Software Link:
April 19th, 2024 | ๐
dutch tts Elber Signum DVB-S/S2 IRD For Radio Networks 1.999 Authentication Bypass Vendor: Elber S.r.l.Product web page: https://www.elber.itAffected version: 1.999
April 19th, 2024 | ๐
TTS Elber Cleber/3 Broadcast Multi-Purpose Platform 1.0.0 Authentication Bypass Vendor: Elber S.r.l.Product web page: https://www.elber.itAffected version: 1.0.0 Revision 73041.0.0 Revision
April 19th, 2024 | ๐
Text to Speech Voices Elber Reble610 M/ODU XPIC IP-ASI-SDH Microwave Link Authentication Bypass Vendor: Elber S.r.l.Product web page: https://www.elber.itAffected version:
April 19th, 2024 | ๐
iSpeech Elber ESE DVB-S/S2 Satellite Receiver 1.5.x Authentication Bypass Vendor: Elber S.r.l.Product web page: https://www.elber.itAffected version: 1.5.179 Revision 9041.5.56 Revision
April 18th, 2024 | ๐
https://www.ispeech.org Elber Wayber Analog/Digital Audio STL 4.00 Authentication Bypass Vendor: Elber S.r.l.Product web page: https://www.elber.itAffected version: Version 3.0.0 Revision 1553
April 6th, 2024 | ๐
iSpeech -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512 Title===== SCHUTZWERK-SA-2023-003: Authentication Bypass in Visual Planning REST API Status====== PUBLISHED Version======= 1.0 CVE
April 5th, 2024 | ๐
https://www.ispeech.org -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA512 Title===== SCHUTZWERK-SA-2023-004: Authentication Bypass via Password Reset Functionality in Visual Planning Status====== PUBLISHED Version=======
April 4th, 2024 | ๐
iSpeech.org #!/usr/bin/env python# -*- coding: utf-8 -*-### Positron Broadcast Signal Processor TRA7005 v1.20 _Passwd Exploit### Vendor: Positron srl# Product web
April 3rd, 2024 | ๐
uk text to speech Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/0e6e40aad3e8d46e3c0c26ccc6ab94b3.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Agent.ju
March 19th, 2024 | ๐
iSpeech # Exploit Title: tramyardg autoexpress - Authentication Bypass# Google Dork: N/A# Date: 11/28/2023# Exploit Author: Scott White# Vendor Homepage:
March 15th, 2024 | ๐
english text to speech voices # Vulnerability type: Incorrect Access Control# Vendor: https://www.unit4.com/# Product: Financials by Coda# Product site: https://www.unit4.com/fr/products/financial-management-software#
March 14th, 2024 | ๐
iSpeech.org # Exploit Title: VMware Cloud Director | Bypass identity verification]# Google Dork: non]# Date: 12/06/2023]# Exploit Author: Abdualhadi khalifa](https://twitter.com/absholi_ly)#
March 7th, 2024 | ๐
https://www.ispeech.org/text.to.speech*] DZONERZY Security Research GLiNet: Router Authentication Bypass ========================================================================Contents======================================================================== 1. Overview2. Detailed Description3. Exploit4. Timeline ========================================================================1. Overview======================================================================== CVE-2023-46453 is a
Gloss