January 29th, 2025 | 🕒
iSpeech Jan 29, 2025Ravie LakshmananVulnerability / Threat Intelligence A critical security flaw has been disclosed in the Cacti open-source network
January 26th, 2025 | 🕒
https://www.ispeech.org/text.to.speech A high-severity security flaw has been disclosed in Meta's Llama large language model (LLM) framework that, if successfully exploited,
January 23rd, 2025 | 🕒
Text to Speech Voices Jan 23, 2025Ravie LakshmananMalware / Threat Intelligence Cybersecurity researchers have disclosed details of a new BackConnect
January 9th, 2025 | 🕒
https://www.ispeech.org/text.to.speech Jan 09, 2025Ravie LakshmananVulnerability / Threat Intelligence Threat actors are attempting to take advantage of a recently disclosed security
December 20th, 2024 | 🕒
iSpeech.org Dec 20, 2024Ravie LakshmananVulnerability / Cyber Attack A now-patched critical security flaw impacting Fortinet FortiClient EMS is being exploited
December 10th, 2024 | 🕒
iSpeech Dec 10, 2024Ravie LakshmananCyber Espionage / Hacking News A suspected China-nexus cyber espionage group has been attributed to an
December 4th, 2024 | 🕒
https://www.ispeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule Rank = GreatRankinginclude Msf::Exploit::Remote::Asteriskprepend Msf::Exploit::Remote::AutoCheck def initialize(info =
December 3rd, 2024 | 🕒
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp def initialize(info =
December 3rd, 2024 | 🕒
iSpeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Auxiliary::Reportinclude Msf::Exploit::Remote::HTTP::AcronisCyberprepend Msf::Exploit::Remote::AutoCheck
November 26th, 2024 | 🕒
iSpeech Nov 26, 2024Ravie LakshmananVulnerability / Website Security Two critical security flaws impacting the Spam protection, Anti-Spam, and FireWall plugin
November 22nd, 2024 | 🕒
german text to speech class MetasploitModule Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Exploit::PhpEXEprepend Msf::Exploit::Remote::AutoCheck class CSRFRetrievalError def initialize(info = {})super(update_info(info,'Name' =>
November 22nd, 2024 | 🕒
Powered by iSpeech class MetasploitModule Rank = NormalRanking include Exploit::Remote::DNS::Commoninclude Exploit::Remote::SocketServerinclude Msf::Exploit::Remote::HttpServer::HTML # Accessor for IPP HTTP serviceattr_accessor :service2 MULTICAST_ADDR
November 20th, 2024 | 🕒
iSpeech Proof of concept code to exploit an authentication bypass in Palo Alto's PAN-OS that is coupled with remote command
November 18th, 2024 | 🕒
iSpeech # Exploit Title: SOPlanning 1.52.01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated)# Date: 6th October, 2024#
Gloss