Nginx 1.25.5 Host Header Validation – Torchsec
April 25th, 2024 | ๐
iSpeech # Nginx =< 1.25.5 $host variable validation bug ## Intro: In the "Host" header sent to Nginx web server
April 25th, 2024 | ๐
iSpeech # Nginx =< 1.25.5 $host variable validation bug ## Intro: In the "Host" header sent to Nginx web server
April 25th, 2024 | ๐
iSpeech.org # Nginx =< 1.25.5 $host variable validation bug ## Intro: In the "Host" header sent to Nginx web server
March 6th, 2024 | ๐
https://www.ispeech.org/text.to.speech ulldisclosure-bounces@seclists.org>Status: ROContent-Length: 5433Lines: 153 =====Tempest Security Intelligence - Security Advisory -CVE-2023-38944]======= Access Control Bypass in Multilaser routers' Web Management
February 5th, 2024 | ๐
iSpeech.org # Exploit Title: SISQUAL WFM 7.1.319.103 Host Header Injection# Discovered Date: 17/03/2023# Reported Date: 17/03/2023# Exploit Author: Omer Shaik
November 21st, 2023 | ๐
iSpeech # Exploit Title: Jorani Leave Management System v1.0.2 Host Header Attack# Date: 12/11/2023# Exploit Author: BugsBD Security Researcher (Rahad
July 5th, 2023 | ๐
iSpeech ====================================================================================================================================| # Title : ApPHP MicroCMS v1.0.1 Host header attack Vulnerability || # Author : indoushka || # Tested
May 12th, 2023 | ๐
Text to Speech DemoThere is a stack buffer overflow in Shannon Baseband when processing the Via header in the SIP
May 12th, 2023 | ๐
https://www.ispeech.org/text.to.speechThere is a stack buffer overflow in Shannon Baseband when processing the Session-Expires header in the SIP protocol decoder (IMSPL_SipDecode.c
May 12th, 2023 | ๐
Text to SpeechThere is a stack buffer overflow in Shannon Baseband when processing the Min-SE header in the SIP protocol
May 12th, 2023 | ๐
iSpeechThere is a heap buffer overflow in Shannon Baseband when processing the Retry-After header in the SIP protocol decoder (IMSPL_SipRetryAfter.c
February 23rd, 2022 | ๐
iSpeech On February 15, 2022, the Wordfence Threat Intelligence team responsibly disclosed a reflected Cross-Site Scripting (XSS) vulnerability in Header
January 13th, 2022 | ๐
https://www.ispeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking include Msf::Exploit::JavaDeserializationinclude Msf::Exploit::Javainclude Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::Remote::LDAP::Serverinclude
October 13th, 2021 | ๐
Text to Speech # Exploit Title: Sonicwall SonicOS 7.0 - Host Header Injection# Google Dork: inurl:"auth.html" intitle:"SonicWall" # intitle:"SonicWall Analyzer
September 29th, 2021 | ๐
iSpeech Extensible Service Proxy (a.k.a. ESP) is an open source software byGoogle assisting Cloud Endpoints, a product on Google Cloud
Gloss