August 26th, 2023 | π
https://www.ispeech.org/text.to.speech ====================================================================================================================================| # Title : GetSimple CMS v3.3.2 XSS Vulnerability || # Author : indoushka || # Tested on :
May 24th, 2023 | π
iSpeech.org # Exploit Title: GetSimple CMS v3.3.16 - Remote Code Execution (RCE)# Data: 18/5/2023# Exploit Author : Youssef Muhammad# Vendor:
June 3rd, 2021 | π
iSpeech*] # Exploit Title: GetSimple CMS 3.3.4 - Information Disclosure# Date 01.06.2021# Exploit Author: Ron Jost (Hacker5preme)# Vendor Homepage: http://get-simple.info/#
March 31st, 2021 | π
Text to Speech # Exploit Title: GetSimple CMS 3.3.16 - Reflected XSS to RCE# Exploit Author: Bobby Cooke (boku)# Discovery
March 30th, 2021 | π
TTS Demo # Exploit Title: GetSimple CMS Custom JS Plugin 0.1 - CSRF to Persistent XSS # Exploit Author: Abhishek
March 30th, 2021 | π
Text to Voice # Exploit Title: GetSimple CMS 3.3.16 - Reflected XSS to RCE # Exploit Author: Bobby Cooke (boku)
October 3rd, 2020 | π
iSpeech.org # Exploit Title: GetSimple CMS 3.3.16 - Persistent Cross-Site Scripting (Authenticated) # Google Dork: - # Date: 2020-09-29 #
October 2nd, 2020 | π
iSpeech # Exploit Title: GetSimple CMS 3.3.16 - Persistent Cross-Site Scripting (Authenticated)# Google Dork: -# Date: 2020-09-29# Exploit Author: Roel
August 14th, 2020 | π
iSpeech.org # Exploit Title: GetSimple CMS Plugin Multi User v1.8.2 - Cross-Site Request Forgery (Add Admin) # Exploit Author: Bobby
August 13th, 2020 | π
Free Text to Speech # Exploit Title: GetSimple CMS Plugin Multi User v1.8.2 - Cross-Site Request Forgery (Delete Admin/User)# Exploit
September 16th, 2019 | π
iSpeechA vulnerability, which was classified as problematic, was found in GetSimple CMS 3.3.15 (Content Management System). This affects an unknown
May 23rd, 2019 | π
https://www.ispeech.org/text.to.speech CVSS Meta Temp Score Current Exploit Price (β) 6.3 $0-$5k A vulnerability, which was classified as critical, has been
Gloss