June 21st, 2020 | ๐
https://www.ispeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::FileDropperinclude Msf::Exploit::CmdStager
June 21st, 2020 | ๐
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::FileDropper def
June 6th, 2020 | ๐
iSpeech.org # Title: Cayin Digital Signage System xPost 2.5 - Remote Command Injection # Author:LiquidWorm # Date: 2020-06-04 # Vendor:
June 6th, 2020 | ๐
Convert Text to Speech # Title: Cayin Signage Media Player 3.0 - Remote Command Injection (root) # Author:LiquidWorm # Date:
June 6th, 2020 | ๐
https://www.ispeech.org # Title: Cayin Content Management Server 11.0 - Remote Command Injection (root) # Author:LiquidWorm # Date: 2020-06-04 # Vendor:
June 5th, 2020 | ๐
https://www.ispeech.org #!/usr/bin/env python3### Cayin Signage Media Player 3.0 Root Remote Command Injection### Vendor: CAYIN Technology Co., Ltd.# Product web page:
June 5th, 2020 | ๐
iSpeech Cayin Content Management Server 11.0 Root Remote Command Injection Vendor: CAYIN Technology Co., Ltd.Product web page: https://www.cayintech.comAffected version: CMS-SE
June 5th, 2020 | ๐
https://www.ispeech.org #!/usr/bin/env python3### Cayin Digital Signage System xPost 2.5 Pre-Auth SQLi Remote Code Execution### Vendor: CAYIN Technology Co., Ltd.# Product
January 14th, 2020 | ๐
Text to VoiceA vulnerability classified as problematic has been found in Cayin SMP-PRO4 (the affected version unknown). This affects an
January 14th, 2020 | ๐
Text to Voice CVSS Meta Temp Score CVSS is a standardized scoring system to determine possibilities of attacks. The Temp
Gloss