Laravel 11.0 Cross Site Scripting – Torchsec
December 5th, 2024 | 🕒
iSpeech.org /*!- # VULNERABILITY: Cross Site Scripting Laravel version 11.0 - # Authenticated Persistent XSS- # GOOGLE DORK: inurl:.com/?q=- # GOOGLE
December 5th, 2024 | 🕒
iSpeech.org /*!- # VULNERABILITY: Cross Site Scripting Laravel version 11.0 - # Authenticated Persistent XSS- # GOOGLE DORK: inurl:.com/?q=- # GOOGLE
December 4th, 2024 | 🕒
iSpeech.org /*!- # VULNERABILITY: Cross Site Scripting Federal Security Service of the Russian Federation- # Authenticated Persistent XSS- # GOOGLE
December 4th, 2024 | 🕒
TTS #Exploit Title:Simple Chat System 1.0#Reflected XSS#Date:05/12/2024#Exploit Author:Merve Hatice Arslan#Vendor Homepage:https://code-projects.org/simple-chat-system/#Sofware Link:https://download.code-projects.org/details/ec6340ea-ef68-48d9-b9b2-da397f52b2dc#Version:1.0#Tested on:Linux / XAMPP#Scripting (XSS) in user.php via the
December 4th, 2024 | 🕒
https://www.ispeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule Rank = GreatRankinginclude Msf::Exploit::Remote::Asteriskprepend Msf::Exploit::Remote::AutoCheck def initialize(info =
December 3rd, 2024 | 🕒
iSpeech ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule Rank = ExcellentRanking include Msf::Exploit::Remote::Tcp def initialize(info =
December 3rd, 2024 | 🕒
iSpeech.org ### This module requires Metasploit: https://metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## class MetasploitModule Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClientinclude Msf::Auxiliary::Reportinclude Msf::Exploit::Remote::HTTP::AcronisCyberprepend Msf::Exploit::Remote::AutoCheck
December 3rd, 2024 | 🕒
Text to Speech Demo ABB Cylon Aspect 3.08.01 (diagLateThread.php) Information DisclosureVendor: ABB Ltd.Product web page: https://www.global.abbAffected version: NEXUS Series, MATRIX-2
December 3rd, 2024 | 🕒
iSpeech ABB Cylon Aspect 3.08.01 (mstpstatus.php) Information Disclosure Vendor: ABB Ltd.Product web page: https://www.global.abbAffected version: NEXUS Series, MATRIX-2 Series, ASPECT-Enterprise,
December 3rd, 2024 | 🕒
iSpeech ABB Cylon Aspect 3.08.00 (fileSystemUpdate.php) Insecure File Upload Vendor: ABB Ltd.Product web page: https://www.global.abbAffected version: NEXUS Series, MATRIX-2 Series,
December 3rd, 2024 | 🕒
https://www.ispeech.org/text.to.speech SEC Consult Vulnerability Lab Security Advisory =======================================================================title: Unlocked JTAG interface and buffer overflowproduct: Siemens SM-2558 Protocol Element (extension module
December 2nd, 2024 | 🕒
Text to Speech SEC Consult Vulnerability Lab Security Advisory =======================================================================title: Stored Cross-Site Scriptingproduct: Omada Identityvulnerable version: fixed version: v15U1, v14.14
December 2nd, 2024 | 🕒
iSpeech The following advisory data is extracted from: https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_10273.json Red Hat officially shut down their mailing list notifications October 10,
December 1st, 2024 | 🕒
iSpeech.org The following advisory data is extracted from: https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_10274.json Red Hat officially shut down their mailing list notifications October 10,
December 1st, 2024 | 🕒
iSpeech The following advisory data is extracted from: https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_10275.json Red Hat officially shut down their mailing list notifications October 10,
Gloss