Wordpress 4.8.3

WordPress Publishes Critical Security Update XSS, SQL Injection vulnerabilities

WordPress 4.7.1 and earlier forms are influenced by various vulnerabilities. A remote attacker could exploit some of these vulnerabilities to take control of an...
Privilege Escalation Vulnerability in Lenovo Transition Application

Privilege Escalation Vulnerability in Lenovo Transition Application

Summary Description: A vulnerability was identified in the Lenovo Transition program specific to some Lenovo Yoga, Flex and Miix systems running Windows where a user...
Google Forms WordPress Plugin unauthenticated PHP Object injection vulnerability

Google Forms WordPress Plugin unauthenticated PHP Object injection vulnerability

Introduction The Google Forms WordPress Plugin fetches a published Google Form using a WordPress custom post or shortcode, removes the Google wrapper HTML and then...

Discovered Critical Bug allowed to Delete any Videos from Facebook

Security researcher Dan Melamed came across the vulnerability in June 2016. The bug is some ways similar to a vulnerability discovered by another researcher...
Google Forms WordPress Plugin unauthenticated PHP Object injection vulnerability

WordPress Plugin Stop User Enumeration does not stop user enumeration

User Enumeration is the capacity to automatically figure out if a given account is valid on a system. By enumerating client accounts, you are at danger of locking...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security