The Next Generation Anti-Corruption Technology
August 25th, 2021 | ๐
iSpeech AI now helps curb corruption through anti-corruption technology. Artificial Intelligence (AI) can be a useful weapon in the fight
August 25th, 2021 | ๐
iSpeech AI now helps curb corruption through anti-corruption technology. Artificial Intelligence (AI) can be a useful weapon in the fight
August 17th, 2021 | ๐
iSpeech Chrome: JS object corruption in WasmJs::InstallConditionalFeatures VULNERABILITY DETAILS```void WasmJs::InstallConditionalFeatures(Isolate* isolate,Handle context) {// Exception handling may have been enabled by
July 8th, 2021 | ๐
iSpeechASProtect embeds a runtime DLL that is susceptible to memory corruption. Crash testcase provided. Source link
July 5th, 2021 | ๐
iSpeech.org Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/37d4a5ba123dd32f1e2c4ba0be14e77c_C.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Virus.Win32.Shodi.eVulnerability: Heap CorruptionDescription: The virus listens
June 28th, 2021 | ๐
https://www.ispeech.org/text.to.speech Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/9e1ef166901534c276b5eeeee511fe22.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Constructor.Win32.Bifrose.ascVulnerability: Local Stack Buffer Overflow (Heap
June 9th, 2021 | ๐
iSpeech.orgThere is a vulnerability in jscript9 that could potentially be exploited to execute arbitrary code when viewing an attacker-controlled website
June 1st, 2021 | ๐
iSpeech.org Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/e677149c35cbba118655d9b133da8827.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.NetSpy.10Vulnerability: Heap CorruptionDescription: The malware listens
May 13th, 2021 | ๐
Speech Synthesis Internet Explorer: Memory corruption in jscript9.dll related to scope of the arguments object There is a vulnerability in
May 12th, 2021 | ๐
iSpeech Advisory: four vulnerabilities found in MikroTik's RouterOS Details======= Product: MikroTik's RouterOSVendor URL: https://mikrotik.com/Vendor Status: no fix yetCVE: CVE-2020-20214, CVE-2020-20222,
May 12th, 2021 | ๐
TTS Advisory: four vulnerabilities found in MikroTik's RouterOS Details======= Product: MikroTik's RouterOSVendor URL: https://mikrotik.com/Vendor Status: only CVE-2020-20227 is fixedCVE: CVE-2020-20220,
March 4th, 2021 | ๐
https://www.ispeech.org Multiple Vulnerabilities in jpeg-xl===================================CVE: CVE-2021-27804Highest Severity Rating: HighConfirmed Affected Versions: jpeg-xl v0.3.1 and earlierVendor: Joint Photographic Experts Group (JPEG)Vendor
February 10th, 2021 | ๐
iSpeech Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/146ce177ab03b8f62a9fc6e7bbf40dc1.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Trojan.Win32.Cafelom.buVulnerability: Heap Corruption Description: This malware
February 5th, 2021 | ๐
https://www.ispeech.orgApple CoreText libFontParser.dylib suffers from a stack corruption vulnerability in the handling of /BlendDesignPositions Type 1 objects. Source link
January 20th, 2021 | ๐
https://www.ispeech.org Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/a0edb91f62c8c083ec35b32a922168d1.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Whisper.bVulnerability: Remote Stack Corruption Description: Whisper.b
Gloss