Hello! Welcome. Wprecon (WordPress Recon), is a vulnerability recognition tool in CMS WordPress, 100% developed in Go. Notice: Why is the...
According to a recent report, malicious hacking groups may abuse a deserialization vulnerability in Zend Framework to run remote code on PHP...
Apparently, Microsoft released a patch to fix the vulnerability in June but it did not work the way it was supposed to...
A recent cybersecurity report reveals that up to 5% or all web servers worldwide could be exposed to a Linux kernel security...
Vulmap is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS and...
Information security researchers often require plugins for vulnerability scanners in Kali Linux, although due to licensing restrictions these tools are not included...
Cybersecurity experts report finding a critical arbitrary file uploading vulnerability in Contact Form 7, a plugin used on millions of WordPress websites....
Other than malware delivery; WinZip vulnerability also lets hackers carry out DNS poisoning and arbitrary code execution. Most of us are pretty...
Hewlett Packard Enterprise (HPE) security teams released a report related to a recently found zero-day remote code execution vulnerability in the latest...
In a recently detected campaign, a hacker group has been resetting administrator passwords on WordPress sites by exploiting a critical zero-day vulnerability...
OpenSSL developers have just announced that the latest version, OpenSSL 1.1.1i, contains a number of patches to fix a critical vulnerability that...
Special investigators from the National Security Agency (NSA) have issued a high priority alert arguing that Russian state-sponsored threat actors are exploiting...
A flaw in a D-Link firmware, used by multiple router models with VPN pass-through functionality, would allow threat actors to take full...
Security teams at Kubernetes have released a report regarding a Man-in-The-Middle (MiTM) vulnerability that would allow threat actors to steal traffic from...
A zero-click remote code execution (RCE) bug in Microsoft Teams desktop apps could have allowed an adversary to execute arbitrary code by...
The vulnerability (CVE-2020-27641) allowed malicious actors to bypass two-factor authentication (2FA) on the software using brute-force attacks. In the web hosting world,...
(CVE-2018-13379) Exploitation Tool, You can use this tool to check the vulnerability in your FortiGate SSL-VPN. https://www.fortinet.com/blog/business-and-technology/fortios-ssl-vulnerability Usage v...
Ian Beer, a researcher at Google Project Zero, has revealed some details about a dangerous iOS vulnerability that could put millions of...
Zyxel security teams have confirmed the finding of a critical vulnerability affecting their firewall solutions and VPN access points that would allow...
It took Bumble 255 days to respond and fix some of the vulnerabilities reported by the researcher. Dating sites and apps have...
An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports. Jira Integration ...