March 20th, 2024 | 🕒
https://www.ispeech.org # Exploit Title: CVE-2023-22527: Atlassian Confluence RCE Vulnerability# Date: 25/1/2024# Exploit Author: MaanVader# Vendor Homepage: https://www.atlassian.com/software/confluence# Software Link: https://www.atlassian.com/software/confluence#
March 6th, 2024 | 🕒
iSpeech.org Mar 06, 2024NewsroomServer Security / Cryptocurrency Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker,
February 28th, 2024 | 🕒
https://www.ispeech.org/text.to.speech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Auxiliary prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClient def initialize(info =
January 27th, 2024 | 🕒
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude
January 23rd, 2024 | 🕒
iSpeech.org Jan 23, 2024NewsroomVulnerability / Cyber Attack Malicious actors have begun to actively exploit a recently disclosed critical security flaw
December 19th, 2023 | 🕒
https://www.ispeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::Remote::HTTP::Atlassian::Confluence::Versioninclude Msf::Exploit::Remote::HTTP::Atlassian::Confluence::PayloadPlugin
October 19th, 2023 | 🕒
Free Text to Speech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include
October 11th, 2023 | 🕒
Convert Text to Speech Oct 11, 2023NewsroomCyber Attack / Vulnerability Microsoft has linked the exploitation of a recently disclosed critical
July 25th, 2023 | 🕒
iSpeech.org Jul 25, 2023THNServer Security / Zero Day Atlassian has released updates to address three security flaws impacting its Confluence
August 13th, 2022 | 🕒
TTS Demo The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added the recently disclosed Atlassian security flaw to
July 23rd, 2022 | 🕒
https://www.ispeech.org Dive Brief: Threat actors are likely exploiting a critical vulnerability that surfaced in a pair of Confluence support apps
June 8th, 2022 | 🕒
https://www.ispeech.org/text.to.speech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude
June 8th, 2022 | 🕒
iSpeech #!/usr/bin/python3 # Exploit Title: Confluence Pre-Auth Remote Code Execution via OGNL Injection# Google Dork: N/A# Date: 06/006/2022# Exploit Author:
June 8th, 2022 | 🕒
iSpeechThrough the Wire is a proof of concept exploit for CVE-2022-26134, an OGNL injection vulnerability affecting Atlassian Confluence Server and
Gloss