January 19th, 2021 | ๐
https://www.ispeech.org/text.to.speech -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: dnsmasq security updateAdvisory ID: RHSA-2021:0155-01Product: Red Hat
January 19th, 2021 | ๐
iSpeech.org #!/usr/bin/perl## ZynOS rom-0 Flaw Scanner## Copyright 2021 (c) Todor Donev ## https://donev.eu/### $ perl zynos_scanner## ZynOS rom-0 Flaw Scanner#
January 19th, 2021 | ๐
Free Text to Speech Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/25e0570cc803cd77abc2268b41237937.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Nucleroot.bi - MaskPE
January 19th, 2021 | ๐
https://www.ispeech.org/text.to.speech # Exploit Title: Xwiki CMS 12.10.2 - Cross Site Scripting (XSS)# Date: 17-01-2021# Exploit Author: Karan Keswani# Vendor Homepage:
January 19th, 2021 | ๐
Powered by iSpeech Discovery / credits: Malvuln - malvuln.com (c) 20211Original source: https://malvuln.com/advisory/170d3ccf9f036c552aef6690bf419b2e.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Nucleroot.t - MaskPE 1.6Vulnerability:
January 19th, 2021 | ๐
https://www.ispeech.org/text.to.speech Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/9adffcc98cd658a7f9c5419480013f72.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Latinus.bVulnerability: Remote Buffer Overflow Description: Malware
January 19th, 2021 | ๐
Powered by iSpeech # Exploit Title: Life Insurance Management System 1.0 - 'client_id' SQL Injection# Date: 15/1/2021# Exploit Author: Aitor
January 19th, 2021 | ๐
https://www.ispeech.org # Exploit Title: Life Insurance Management System 1.0 - File Upload RCE (Authenticated)# Date: 15/1/2021# Exploit Author: Aitor Herrero#
January 19th, 2021 | ๐
iSpeech Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/eb6fd418cd3b52132ffb029b52839edf.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.WhgrxVulnerability: Remote Host Header Stack Buffer
January 19th, 2021 | ๐
iSpeech.org Discovery / credits: Malvuln - malvuln.com (c) 2021Original source: https://malvuln.com/advisory/1e42493dcef54a62bc28e0a1338c1142.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.MnetsVulnerability: Remote Stack Buffer Overflow -
January 19th, 2021 | ๐
iSpeech # Exploit Title: Inteno IOPSYS 3.16.4 - root filesystem access via sambashare (Authenticated)# Date: 2020-03-29# Exploit Author: Henrik Pedersen#
January 18th, 2021 | ๐
TTS*]import sys, ssl, os, time*]import requests*]from requests.packages.urllib3.exceptions import InsecureRequestWarning requests.packages.urllib3.disable_warnings(InsecureRequestWarning) #*]# Exploit Title : Cisco UCS Manager - 2.2(1d) -
January 18th, 2021 | ๐
Text to Speech -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256 =====================================================================Red Hat Security Advisory Synopsis: Important: postgresql:12 security updateAdvisory ID: RHSA-2021:0163-01Product: Red
January 18th, 2021 | ๐
iSpeech.org -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA256 =====================================================================Red Hat Security Advisory Synopsis: Important: postgresql:10 security updateAdvisory ID: RHSA-2021:0161-01Product: Red Hat Enterprise
Gloss