July 10th, 2020 | 🕒
https://www.ispeech.org/text.to.speech # Exploit Title: Microsoft Windows mshta.exe 2019 - XML External Entity Injection # Date: 2020-07-07 # Exploit Author: hyp3rlinx
July 9th, 2020 | 🕒
iSpeech +] Credits: John Page (aka hyp3rlinx) +] Website: hyp3rlinx.altervista.org+] Source: http://hyp3rlinx.altervista.org/advisories/MICROSOFT-WINDOWS-MSHTA-HTA-FILE-XML-EXTERNAL-ENTITY-INJECTION.txt+] twitter.com/hyp3rlinx+] ISR: ApparitionSec Vendor]www.microsoft.com Product]Windows MSHTA.EXE .HTA File
April 8th, 2020 | 🕒
iSpeech Security researchers observed that a new Ursnif attack campaign replaced PowerShell with mshta as a means to distribute the
Gloss