OX App Suite 7.10.6 Cross Site Scripting / Deserialization Issue – Torchsec
April 11th, 2024 | ๐
TTS Dear subscribers, We're sharing our latest advisory with you and like to thank everyone who contributed in finding and
April 11th, 2024 | ๐
TTS Dear subscribers, We're sharing our latest advisory with you and like to thank everyone who contributed in finding and
March 27th, 2024 | ๐
https://www.ispeech.org/text.to.speech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::CmdStagerinclude Msf::Exploit::FileDropperprepend
March 20th, 2024 | ๐
https://www.ispeech.org/text.to.speech # Exploit Title: Gibbon LMS has a PHP Deserialization vulnerability on the v26.0.00 version# Date: 22.01.2024# Exploit Author: SecondX.io
March 7th, 2024 | ๐
https://www.ispeech.org/text.to.speech KL-001-2024-002: Artica Proxy Unauthenticated PHP Deserialization Vulnerability Title: Artica Proxy Unauthenticated PHP Deserialization VulnerabilityAdvisory ID: KL-001-2024-002Publication Date: 2024.03.05Publication URL:
November 14th, 2023 | ๐
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude
October 13th, 2023 | ๐
Text to Speech Demo ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require 'rex/zip' class MetasploitModule < Msf::Exploit::RemoteRank =
August 17th, 2023 | ๐
iSpeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::FILEFORMATinclude Msf::Post::File def
February 23rd, 2023 | ๐
https://www.ispeech.org While performing a web application penetration test, I stumbled upon a parameter with some base64 encoded data within a
February 16th, 2023 | ๐
Powered by iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheck
February 9th, 2023 | ๐
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::JavaDeserialization
August 3rd, 2022 | ๐
TTS ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude
July 11th, 2022 | ๐
Text to Speech VoicesThe code in cc::PaintImageReader::Read (cc::PaintImage*) does not properly check the incoming data when handling embedded image data,
June 21st, 2022 | ๐
iSpeech.org SEC Consult Vulnerability Lab Security Advisory < 20220608-0 >=======================================================================title: Stored Cross-Site Scripting & Unsafe Java Deserializiationproduct: Gentics CMSvulnerable version:
May 18th, 2022 | ๐
iSpeech.org -] Affected Versions: Version 2.2.0 is affected, and prior versions are likely affected too. -] Vulnerabilities Description: Vulnerable component
Gloss