February 11th, 2022 | 🕒
iSpeech # Exploit Title: Tokheim Profleet DiaLOG Fuel Management System 11.005.02 - SQLi (Unauthenticated)# Date: 02/9/2022# Exploit Author: golem445# Vendor
January 11th, 2022 | 🕒
https://www.ispeech.org/text.to.speech +] Credits: John Page (aka hyp3rlinx)+] Website: hyp3rlinx.altervista.org+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_REG_FILE_DIALOG_SPOOF_MITIGATION_BYPASS.txt+] twitter.com/hyp3rlinx+] ISR: ApparitionSec Vendor]www.microsoft.com A file with the .reg
November 20th, 2019 | 🕒
iSpeech.org CVE-2019-1388: Windows Certificate Dialog Elevation of Privilege Vulnerability (Proof of Concept Demo on Windows 10) An elevation of privilege
August 18th, 2019 | 🕒
https://www.ispeech.org This exploit attacks a weak encryption implementation to discover the dialog handler key for vulnerable versions of Telerik UI
June 28th, 2019 | 🕒
https://www.ispeech.org/text.to.speech CVSS Meta Temp Score Current Exploit Price (≈) 6.0 $5k-$25k A vulnerability was found in Google Chrome on Android
May 31st, 2019 | 🕒
https://www.ispeech.org/text.to.speech CVSS Meta Temp Score Current Exploit Price (≈) 4.1 $0-$5k A vulnerability has been found in Synacor Zimbra Mail
March 26th, 2019 | 🕒
iSpeech.org Unpatched Windows Bug Allows Attackers To Spoof Security Dialog Boxes Source link
March 13th, 2019 | 🕒
TTS The Windows registry editor allows specially crafted .reg filenames to spoof the default registry dialog warning box presented to
Gloss