February 5th, 2025 | 🕒
https://www.ispeech.org Feb 05, 2025Ravie LakshmananVulnerability / Data Protection Veeam has released patches to address a critical security flaw impacting its
January 29th, 2025 | 🕒
iSpeech Jan 29, 2025Ravie LakshmananVulnerability / Threat Intelligence A critical security flaw has been disclosed in the Cacti open-source network
January 29th, 2025 | 🕒
https://www.ispeech.org A team of security researchers from Georgia Institute of Technology and Ruhr University Bochum has demonstrated two new side-channel
January 26th, 2025 | 🕒
https://www.ispeech.org/text.to.speech A high-severity security flaw has been disclosed in Meta's Llama large language model (LLM) framework that, if successfully exploited,
January 9th, 2025 | 🕒
https://www.ispeech.org/text.to.speech Jan 09, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors are attempting to take advantage of a recently disclosed security
December 4th, 2024 | 🕒
https://www.ispeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule Rank = GreatRankinginclude Msf::Exploit::Remote::Asteriskprepend Msf::Exploit::Remote::AutoCheck def initialize(info =
December 3rd, 2024 | 🕒
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp def initialize(info =
December 3rd, 2024 | 🕒
iSpeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Auxiliary::Reportinclude Msf::Exploit::Remote::HTTP::AcronisCyberprepend Msf::Exploit::Remote::AutoCheck
November 22nd, 2024 | 🕒
german text to speech class MetasploitModule Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::PhpEXEprepend Msf::Exploit::Remote::AutoCheck class CSRFRetrievalError def initialize(info = {})super(update_info(info,'Name' =>
November 22nd, 2024 | 🕒
Powered by iSpeech class MetasploitModule Rank = NormalRanking include Exploit::Remote::DNS::Commoninclude Exploit::Remote::SocketServerinclude Msf::Exploit::Remote::HttpServer::HTML # Accessor for IPP HTTP serviceattr_accessor :service2 MULTICAST_ADDR
November 21st, 2024 | 🕒
iSpeech # This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework require 'rex/proto/ms_nrtp/client' class MetasploitModule prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::Tcp Rank = ExcellentRanking
November 20th, 2024 | 🕒
iSpeech Proof of concept code to exploit an authentication bypass in Palo Alto's PAN-OS that is coupled with remote command
November 18th, 2024 | 🕒
iSpeech # Exploit Title: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)# Date: 6th October, 2024#
November 18th, 2024 | 🕒
https://www.ispeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## require 'rex/stopwatch' class MetasploitModule Rank = ExcellentRanking prepend Msf::Exploit::Remote::AutoCheckinclude Msf::Exploit::Remote::HttpClientinclude
Gloss