Forem

# vulnerabilities

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Building Secure Blockchain Bridges: Common Vulnerabilities and Solutions.
Cover image for Building Secure Blockchain Bridges: Common Vulnerabilities and Solutions.

Building Secure Blockchain Bridges: Common Vulnerabilities and Solutions.

4
Comments
5 min read
When Zero‑Width Isn’t Zero: How I Found and Fixed a Vulnerability
Cover image for When Zero‑Width Isn’t Zero: How I Found and Fixed a Vulnerability

When Zero‑Width Isn’t Zero: How I Found and Fixed a Vulnerability

Comments
4 min read
Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain
Cover image for Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain

Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain

5
Comments
10 min read
Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask
Cover image for Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask

Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask

3
Comments
6 min read
Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation
Cover image for Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation

Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation

1
Comments
6 min read
Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host
Cover image for Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host

Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host

1
Comments
3 min read
How to Integrate Vulnerability Scanning Into DevSecOps Workflows
Cover image for How to Integrate Vulnerability Scanning Into DevSecOps Workflows

How to Integrate Vulnerability Scanning Into DevSecOps Workflows

2
Comments
7 min read
Understanding TOCTOU: The Race Condition Hiding in Your Code
Cover image for Understanding TOCTOU: The Race Condition Hiding in Your Code

Understanding TOCTOU: The Race Condition Hiding in Your Code

6
Comments
4 min read
Vens: Stop Patching Vulnerabilities That Don't Matter to You
Cover image for Vens: Stop Patching Vulnerabilities That Don't Matter to You

Vens: Stop Patching Vulnerabilities That Don't Matter to You

1
Comments 1
2 min read
Unauthenticated Blind SSRF in Oracle EBS
Cover image for Unauthenticated Blind SSRF in Oracle EBS

Unauthenticated Blind SSRF in Oracle EBS

Comments
2 min read
n8n Security Vulnerabilities: A Comprehensive Whitepaper for Developers and Architects

n8n Security Vulnerabilities: A Comprehensive Whitepaper for Developers and Architects

1
Comments
10 min read
Is Learning Manual Vulnerability Scanning a Waste of Time in 2026?
Cover image for Is Learning Manual Vulnerability Scanning a Waste of Time in 2026?

Is Learning Manual Vulnerability Scanning a Waste of Time in 2026?

1
Comments
5 min read
CVE-2025-3248: Kerentanan Kritis pada Platform AI Langflow dan Cara Melindungi Jaringan Anda
Cover image for CVE-2025-3248: Kerentanan Kritis pada Platform AI Langflow dan Cara Melindungi Jaringan Anda

CVE-2025-3248: Kerentanan Kritis pada Platform AI Langflow dan Cara Melindungi Jaringan Anda

Comments
15 min read
Hunting the Bad Guy Bug: CVE-2025-55182 Detection & Fix Guide
Cover image for Hunting the Bad Guy Bug: CVE-2025-55182 Detection & Fix Guide

Hunting the Bad Guy Bug: CVE-2025-55182 Detection & Fix Guide

Comments
2 min read
The Compromise of a Production VPS
Cover image for The Compromise of a Production VPS

The Compromise of a Production VPS

Comments
8 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.