October 3rd, 2020 | 🕒
Powered by iSpeech -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256 Advisory ID: SYSS-2019-048Product: MailDepotManufacturer: REDDOXX GmbHAffected Version(s): 2032 SP2 (2.2.1242)Tested Version(s): 2032
October 2nd, 2020 | 🕒
https://www.ispeech.org/text.to.speech -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256 Advisory ID: SYSS-2019-049Product: MailDepotManufacturer: REDDOXX GmbHAffected Version(s): 2032 SP2 (2.2.1242)Tested Version(s): 2032 SP2 (2.2.1242)Vulnerability
July 16th, 2020 | 🕒
https://www.ispeech.org ## # This module requires Metasploit: https://metasploit.com/download # Current source: https://github.com/rapid7/metasploit-framework ## class MetasploitModule < Msf::Exploit::Remote Rank = ExcellentRanking
April 15th, 2020 | 🕒
https://www.ispeech.org Document Title:===============DedeCMS v7.5 SP2 - Multiple Persistent Web Vulnerabilities References (Source):====================https://www.vulnerability-lab.com/get_content.php?id=2195 Release Date:=============2020-04-09 Vulnerability Laboratory ID (VL-ID):====================================2195 Common Vulnerability
April 15th, 2020 | 🕒
https://www.ispeech.org/text.to.speech Document Title:===============DedeCMS v7.5 SP2 - Multiple Cross Site Scripting Web Vulnerabilities References (Source):====================https://www.vulnerability-lab.com/get_content.php?id=2194 Release Date:=============2020-04-08 Vulnerability Laboratory ID (VL-ID):====================================2194
April 15th, 2020 | 🕒
https://www.ispeech.org/text.to.speech # Title: DedeCMS 7.5 SP2 - Persistent Cross-Site Scripting # Author: Vulnerability Laboratory # Date: 2020-04-15 # Vendor Link:
March 19th, 2020 | 🕒
Text to Speech How to Hack Windows XP SP2 using MiniShare Web Server 1.4.1 Link to vulnerable app https://www.exploit-db.com/apps/0ffe5385147edd1f9e7b460c6d7cb0a6-minishare-1.4.1.zip source
Gloss