As last year, this year we made a ranking with the most popular tools between January and December 2023. The tools of this year encompass a diverse range of cybersecurity disciplines, including AI-Enh ...
Continue ReadingDecember 28, 2023
csv_builder.rb in ActiveAdmin (aka Active Admin) before 3.2.0 allows CSV...Read More ...
Continue ReadingDecember 28, 2023
Cross-Site Request Forgery (CSRF) vulnerability in Bill Minozzi Disable Json API, Login Lockdown, XMLRPC, Pingback, Stop User Enumeration Anti Hacker Scan.This issue affects Disable Json API, Login Lo ...
Continue ReadingDecember 28, 2023
Description The plugin does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion...Read More ...
Continue ReadingDecember 28, 2023
Description The plugin does not prevent unauthenticated attackers from overwriting local variables when rendering templates over the REST API, which may lead to Local File Inclusion attacks. PoC The P ...
Continue ReadingDecember 28, 2023
Description The Paid Memberships Pro – Content Restriction, User Registration, & Paid Subscriptions plugin for WordPress is vulnerable to unauthorized modification of membership levels creat ...
Continue ReadingDecember 28, 2023
ReVanced API proxies requests needed to feed the ReVanced Manager and website with data. Up to and including commit 71f81f7f20cd26fd707335bca9838fa3e7df20d2, ReVanced API lacks error caching causing r ...
Continue ReadingDecember 27, 2023
Content Delivery Networks (CDNs) accelerate web traffic across the internet through servers residing in strategic locations (known as points of presence or PoPs) across the globe. Each PoP has a numbe ...
Continue ReadingDecember 27, 2023
Back to Main