CVE-2024-8353 | GiveWP WordPress Plugin Vulnerable to PHP Object Injection

CVE-2024-8353 | givewp plugin vulnerable to PHP object injection more then 100K wordpress application are using givewp plugin...

CVE-2024-51482 | Boolean-Base SQL Injection In ZoneMinder v1.37.* <= 1.37.64

Description of CVE-2024-51482 (Boolean-based SQL Injection in ZoneMinder) ZoneMinder is a free...

CVE-2024-9264 | Grafana RCE via SQL Expressions (Critical)

Description of CVE-2024-9264 | Grafana RCE The SQL Expressions experimental feature of...

CVE−2024−24919 | Checkpoint information disclosure vulnerability.

Description of CVE-2024-24919 | checkpoint information disclosure vulnerability An attacker can potentially...

CVE-2024-45519 | Zimbra UnAuthenticated PostJournal RCE

Summary CVE-2024–45519 is a vulnerability in Zimbra, especially the PostJournal service. It...

Master Subdomain HUNTING | Art of finding Hidden Assets

How to properly recone the sub domains using various methods that top bug bounty hunter don't reveal with best wordlists for subdomain enum that will give you some results...

Hacking Indian Government with reflected XSS and SQL Injection

Hacking an indian gov website and dumping the database and the importance of the google dorking while hunting on bug bounty program. with...

How hackers bypass 2fa: All methods revealed

In this post you will learn all the methods that can help you to bypass 2fa code in web application/mobile application...