CVE-2024-8353 | givewp plugin vulnerable to PHP object injection more then 100K wordpress application are using givewp plugin...
Description of CVE-2024-51482 (Boolean-based SQL Injection in ZoneMinder) ZoneMinder is a free...
Description of CVE-2024-45216 (Apache Solr Auth Bypass) Improper Authentication vulnerability in Apache...
Description of CVE-2024-9264 | Grafana RCE The SQL Expressions experimental feature of...
Description of CVE-2024-24919 | checkpoint information disclosure vulnerability An attacker can potentially...
Summary CVE-2024–45519 is a vulnerability in Zimbra, especially the PostJournal service. It...
Hii Everyone!! Today we are going to learn about the Shodan Dorking...
How to properly recone the sub domains using various methods that top bug bounty hunter don't reveal with best wordlists for subdomain enum that will give you some results...
Hacking an indian gov website and dumping the database and the importance of the google dorking while hunting on bug bounty program. with...
In this post you will learn all the methods that can help you to bypass 2fa code in web application/mobile application...