Malicious Code in XZ Utils for Linux Systems Enables Remote Code Execution
April 2nd, 2024 | ๐
Text to Speech Demo ๎ Apr 02, 2024๎ NewsroomFirmware Security / Vulnerability The malicious code inserted into the open-source library XZ Utils,
April 2nd, 2024 | ๐
Text to Speech Demo ๎ Apr 02, 2024๎ NewsroomFirmware Security / Vulnerability The malicious code inserted into the open-source library XZ Utils,
April 2nd, 2024 | ๐
Text to Voice # Exploit Title: Gibbon LMS has an SSTI vulnerability on the v26.0.00 version# Date: 21.01.2024# Exploit Author:
April 2nd, 2024 | ๐
iSpeech # __________.__ ___________.__ # \______ \__| ___\__ ___/|__| _____ ____ # | | _/ |/ _ \| | |
March 29th, 2024 | ๐
iSpeech.org ################################################################################################# Exploit Title : EXPLOIT WinRAR version 6.22 Vulnerability CVE-2023-38831 ## ## Author : E1.Coders ## ## Contact :
March 27th, 2024 | ๐
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::Remote::HTTP::Wordpressprepend Msf::Exploit::Remote::AutoCheck
March 27th, 2024 | ๐
iSpeech #!/usr/bin/env python3#coding: utf-8 # Exploit Title: Craft CMS unauthenticated Remote Code Execution (RCE)# Date: 2023-12-26# Version: 4.0.0-RC1 - 4.4.14#
March 22nd, 2024 | ๐
german text to speech Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/3b9e9e130d52fe95c8be82aa4b8feb74.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Win32.STOP.Ransomware
March 20th, 2024 | ๐
iSpeech # Exploit Title: Lektor static content management system Version: 3.3.10 Arbitrary File upload# Date: 20/03/2024# Exploit Author: kai6u# Vendor
March 20th, 2024 | ๐
Free Text to SpeechThis is a proof of concept exploit for CVE-2024-25153, a remote code execution vulnerability in Fortra FileCatalyst
March 20th, 2024 | ๐
https://www.ispeech.org/text.to.speech # Exploit Title: Gibbon LMS has a PHP Deserialization vulnerability on the v26.0.00 version# Date: 22.01.2024# Exploit Author: SecondX.io
March 20th, 2024 | ๐
Convert Text to Speech import reimport requestsfrom bs4 import BeautifulSoupimport argparseimport base64 # Exploit Title: Unauthenticated RCE in ZoneMinder Snapshots#
March 20th, 2024 | ๐
https://www.ispeech.org # Exploit Title: CVE-2023-22527: Atlassian Confluence RCE Vulnerability# Date: 25/1/2024# Exploit Author: MaanVader# Vendor Homepage: https://www.atlassian.com/software/confluence# Software Link: https://www.atlassian.com/software/confluence#
March 15th, 2024 | ๐
https://www.ispeech.org #- Exploit Title: Ruijie Switch PSG-5124 26293 - Remote Code Execution (RCE)#- Shodan Dork: http.html_hash:-1402735717#- Fofa Dork: body="img/free_login_ge.gif" &&
March 15th, 2024 | ๐
TTS #- Exploit Title: Viessmann Vitogate
Gloss