Calling all Vulnerability Researchers and Bug Bounty Hunters! Spring into Summer with Wordfence! Now through August 4, 2025, earn 2X bounty rewards forall in-scope submissions from our 'High Thre ...
Continue ReadingJuly 17, 2025
creation_timestamp| type| source ---|---|--- 2025-07-17 11:51:46+00:00| confirmed|...Read More ...
Continue ReadingJuly 17, 2025
The Stop User Enumeration WordPress plugin before version 1.7.3 blocks REST API /wp-json/wp/v2/users/ requests for non-authorized users. However, this can be bypassed by URL-encoding the API...Read Mo ...
Continue ReadingJuly 17, 2025
creation_timestamp| type| source ---|---|--- 2025-07-17 13:20:05+00:00| seen| https://bsky.app/profile/knaepp.bsky.social/post/3lu5zj3fenn2b 2025-07-17 13:30:04+00:00| seen|...Read More ...
Continue ReadingJuly 17, 2025
An update for tomcat is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service. Red Hat Product Security ha ...
Continue ReadingJuly 17, 2025
An update for tomcat is now available for Red Hat Enterprise Linux 9.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulner ...
Continue ReadingJuly 17, 2025
GLPI asset and data center management software vulnerability is related to incorrect access restrictions in the API. Exploitation of the vulnerability could allow an attacker, acting remotely, to gain ...
Continue ReadingJuly 17, 2025
creation_timestamp| type| source ---|---|--- 2025-07-17 10:43:23+00:00| seen|...Read More ...
Continue ReadingJuly 17, 2025
Back to Main