April 16th, 2024 | ๐
https://www.ispeech.org Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/6cc630843cabf23621375830df474bc5.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Dumador.cVulnerability: Remote Stack Buffer
April 9th, 2024 | ๐
Text to Speech Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/0eb4a9089d3f7cf431d6547db3b9484d.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Trojan.Win32.Razy.abcVulnerability: Insecure
April 3rd, 2024 | ๐
uk text to speech Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/0e6e40aad3e8d46e3c0c26ccc6ab94b3.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Agent.ju
March 22nd, 2024 | ๐
german text to speech Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/3b9e9e130d52fe95c8be82aa4b8feb74.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Win32.STOP.Ransomware
March 15th, 2024 | ๐
iSpeech.org Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/19a14d0414aec62ef38378de2e8b259d.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Emegrab.bVulnerability: Remote Stack Buffer
March 11th, 2024 | ๐
https://www.ispeech.org Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/6268df4c9c805c90725dde4fe5ef6fea.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Beastdoor.oqVulnerability: Unauthenticated Remote Command
March 1st, 2024 | ๐
iSpeech Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/d6b192a4027c7d635499133ca6ce067f.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Jeemp.cVulnerability: Cleartext Hardcoded CredentialsDescription:
March 1st, 2024 | ๐
https://www.ispeech.orgBackdoor.Win32.Agent.amt malware suffers from bypass and code execution vulnerabilities. Source link
February 29th, 2024 | ๐
https://www.ispeech.org Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/2a442d3da88f721a786ff33179c664b7.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Agent.amtVulnerability: Authentication BypassDescription: The
February 29th, 2024 | ๐
Powered by iSpeech Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/2a442d3da88f721a786ff33179c664b7.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.Agent.amtVulnerability: Authentication
February 27th, 2024 | ๐
iSpeech Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/b012704cad2bae6edbd23135394b9127.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Backdoor.Win32.AutoSpy.10Vulnerability: Unauthenticated Remote Command
February 24th, 2024 | ๐
Text to SpeechBackdoor.Win32.Armageddon.r malware suffers from a hardcoded credential vulnerability. Source link
February 19th, 2024 | ๐
iSpeech.org +] Credits: John Page (aka hyp3rlinx) +] Website: hyp3rlinx.altervista.org+] Source: https://hyp3rlinx.altervista.org/advisories/MICROSOFT_WINDOWS_DEFENDER_VBSCRIPT_TROJAN_MITIGATION_BYPASS.txt+] twitter.com/hyp3rlinx+] ISR: ApparitionSec Vendor]www.microsoft.com Product]Windows Defender Vulnerability Type]Windows
February 1st, 2024 | ๐
TTS Demo Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2024Original source: https://malvuln.com/advisory/f2fd6a7b400782bb43499e722fb62cf4.txtContact: malvuln13@gmail.comMedia: twitter.com/malvuln Threat: Trojan.Win32 BankShotVulnerability: Remote
Gloss