Emagic Data Center Management Suite 6.0 Remote Command Execution – Torchsec
August 10th, 2023 | ๐
Text to Speech # Exploit Title: Emagic Data Center Management Suite v6.0 - OS Command Injection# Date: 03-08-2023# Exploit Author:
August 10th, 2023 | ๐
Text to Speech # Exploit Title: Emagic Data Center Management Suite v6.0 - OS Command Injection# Date: 03-08-2023# Exploit Author:
August 3rd, 2023 | ๐
iSpeech Internal reference: OXUIB-2282Type: CWE-79 (Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'))Component: frontendReport confidence: ConfirmedSolution status: Fixed
July 31st, 2023 | ๐
https://www.ispeech.org ========================================================================================================| # Title : Codecanyon Bitcoin Tools Suite v1.0 LFI Vulnerability || # Author : indoushka || # Tested
July 7th, 2023 | ๐
iSpeech ====================================================================================================================================| # Title : CakePHP Test Suite v2.7.0 Xss Vulnerability || # Author : indoushka || # Tested on
June 28th, 2023 | ๐
https://www.ispeech.org/text.to.speech # Exploit Title: Office Suite Premium 10.9.1.42602 - Cross-Site Scripting (reflected)# Date: 06-26-2023# Exploit Author: tmrswrr# Vendor Homepage: https://www.mobisystems.com/#
June 28th, 2023 | ๐
https://www.ispeech.org/text.to.speech # Exploit Title: Office Suite Premium 10.9.1.42602 - Path Traversal# Date: 06-26-2023# Exploit Author: tmrswrr# Vendor Homepage: https://www.mobisystems.com/# Software
June 28th, 2023 | ๐
https://www.ispeech.org/text.to.speech # Exploit Title: Office Suite Premium 10.9.1.42602 - Local File Inclusion # Date: 06-26-2023# Exploit Author: tmrswrr# Vendor Homepage:
June 23rd, 2023 | ๐
Speech Synthesis Internal reference: MWB-1994Type: CWE-922 (Insecure Storage of Sensitive Information)Component: backendReport confidence: ConfirmedSolution status: Fixed by vendorLast affected revision:
May 9th, 2023 | ๐
TTS Internal reference: OXUIB-2130Type: CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor)Component: frontendReport confidence: ConfirmedSolution status: Fixed by vendorLast
May 3rd, 2023 | ๐
Text to Speech Demo # Exploit Title: SoftExpert (SE) Suite v2.1.3 - Local File Inclusion# Date: 27-04-2023# Exploit Author: Felipe
March 27th, 2023 | ๐
Powered by iSpeech Ollie Whitehouse | 21 March 2023 at 14:30 UTC tl;dr We have released BSEEPT - Burp Suite
March 1st, 2023 | ๐
british text to speech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'rex/zip' class MetasploitModule < Msf::Exploit::RemoteRank = ExcellentRanking
February 27th, 2023 | ๐
iSpeech Part 1 of a series. ย The Varonis Data Security Platform is true to its name: itโs a complete,
February 25th, 2023 | ๐
iSpeech submitted by /u/filippo_cavallarin comments] Source link
Gloss