The Database Toolset plugin is vulnerable to arbitrary file deletion due to insufficient file path validation in a function in all versions up to, and including, 1.8.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php).

ALL

21

Expert Bug Bounty Platform for Crypto Projects.

Reduce the risk of a security incident by working with the world’s largest community of trusted ethical hackers. HackerOne offers bug bounty, VDP, security assessments, attack surface management, and pentest solutions.

Bug bounty and agile penetration testing solutions powered by Europe's leading network of ethical hackers.

Leading source of security tools, hacking tools, cybersecurity and network security. Learn about new tools and updates in one place.

Educating people on the use and abuse of AI.

Industry news, insights from cybersecurity experts, and new product, feature, and company announcements.

Your one-stop-shop to learn all about Blockchain development and Crypto Technologies.

Sticky notes for pentesting. Search hacking techniques and tools for penetration testings, bug bounty, CTFs.

These are notes about all things focusing on, but not limited to, red teaming and offensive security.

An archive focusing on anarchism and anarchist texts.

Explore YesWeHack, leading global Bug Bounty & Vulnerability Management Platform. Connect with tens of thousands of ethical hackers worldwide to uncover vulnerabilities in your websites, mobile apps, and digital infrastructure, bolstering your cyber defense strategy.

Stay up-to-date on the latest in top security news and industry perspectives from the Flare team.

21