Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
Forem
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Prevent XXE Injection in Symfony Framework
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
May 1
Prevent XXE Injection in Symfony Framework
#
cybersecurity
#
vulnerabilities
#
symfony
#
coding
3
reactions
Comments
Add Comment
3 min read
What is a Vulnerability Assessment? Importance, Key Steps, and Tools
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Apr 28
What is a Vulnerability Assessment? Importance, Key Steps, and Tools
#
vulnerabilities
#
scanning
#
cybersecurity
#
vulnerabilityassessment
Comments
Add Comment
7 min read
How to Prevent Remote Code Execution (RCE) Vulnerabilities in Symfony
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Apr 27
How to Prevent Remote Code Execution (RCE) Vulnerabilities in Symfony
#
cybersecurity
#
vulnerabilities
#
symfony
#
php
3
reactions
Comments
Add Comment
3 min read
Fix Security Misconfiguration in Symfony Apps
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Apr 22
Fix Security Misconfiguration in Symfony Apps
#
cybersecurity
#
vulnerabilities
#
symfony
#
coding
2
reactions
Comments
Add Comment
3 min read
Exploiting Websites
Harnoor Puniyani
Harnoor Puniyani
Harnoor Puniyani
Follow
Apr 20
Exploiting Websites
#
webdev
#
security
#
vulnerabilities
#
programming
1
reaction
Comments
Add Comment
2 min read
IDOR Vulnerability in Symfony: How to Detect and Fix It
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Apr 15
IDOR Vulnerability in Symfony: How to Detect and Fix It
#
cybersecurity
#
symfony
#
php
#
vulnerabilities
2
reactions
Comments
Add Comment
4 min read
Unlock Pro-Level Debugging Skills in 2025
ISHTIAQ AHMED
ISHTIAQ AHMED
ISHTIAQ AHMED
Follow
Apr 6
Unlock Pro-Level Debugging Skills in 2025
#
programming
#
devbugsmash
#
ai
#
vulnerabilities
Comments
Add Comment
4 min read
SSRF Vulnerability in Symfony Framework Explained
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Apr 29
SSRF Vulnerability in Symfony Framework Explained
#
cybersecurity
#
vulnerabilities
#
symfony
#
coding
4
reactions
Comments
Add Comment
3 min read
Broken Access Control in Symfony: Real-World Examples and Fixes
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Apr 24
Broken Access Control in Symfony: Real-World Examples and Fixes
#
cybersecurity
#
vulnerabilities
#
symfony
#
coding
3
reactions
Comments
Add Comment
3 min read
How to Prevent Cross-Site Script Inclusion (XSSI) in Laravel
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 18
How to Prevent Cross-Site Script Inclusion (XSSI) in Laravel
#
cybersecurity
#
vulnerabilities
#
laravel
#
php
2
reactions
Comments
Add Comment
3 min read
Sensitive Data Exposure in Symfony Apps
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Apr 20
Sensitive Data Exposure in Symfony Apps
#
cybersecurity
#
vulnerabilities
#
symfony
#
coding
10
reactions
Comments
Add Comment
3 min read
Enhancing Healthcare Cyber Security with Proactive Risk Assessment and DevSecOps
Manikandan
Manikandan
Manikandan
Follow
Mar 17
Enhancing Healthcare Cyber Security with Proactive Risk Assessment and DevSecOps
#
testing
#
cybersecurity
#
softwaretesting
#
vulnerabilities
Comments
Add Comment
3 min read
How to Fix Weak API Authentication in Laravel (With Code Examples)
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 16
How to Fix Weak API Authentication in Laravel (With Code Examples)
#
cybersecurity
#
vulnerabilities
#
laravel
#
api
3
reactions
Comments
Add Comment
3 min read
Fix It Before They Break It: The True Role of Vulnerability Management
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
SHUBHENDU SHUBHAM
Follow
Mar 11
Fix It Before They Break It: The True Role of Vulnerability Management
#
cybersecurity
#
vulnerabilities
#
vapt
#
threathunting
Comments
Add Comment
2 min read
Prevent CSRF Vulnerabilities in Symfony Easily
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Apr 13
Prevent CSRF Vulnerabilities in Symfony Easily
#
cybersecurity
#
vulnerabilities
#
symfony
#
coding
4
reactions
Comments
Add Comment
3 min read
Stop giving hackers the easy button
bfuller
bfuller
bfuller
Follow
Apr 9
Stop giving hackers the easy button
#
security
#
devops
#
vulnerabilities
#
opservations
1
reaction
Comments
Add Comment
4 min read
What is Web Exploitation? Types of Web Exploitation Vulnerabilities
Rachel Ritchay
Rachel Ritchay
Rachel Ritchay
Follow
Mar 4
What is Web Exploitation? Types of Web Exploitation Vulnerabilities
#
web
#
webexploitation
#
vulnerabilities
Comments
Add Comment
7 min read
Continuous Vulnerability Monitoring with AI: Real-Time Risk Visibility and Adaptive Security Posture Management
Network Intelligence
Network Intelligence
Network Intelligence
Follow
Apr 3
Continuous Vulnerability Monitoring with AI: Real-Time Risk Visibility and Adaptive Security Posture Management
#
vulnerabilities
#
vulnerabilitymonitoring
#
vulnerabilitymanagement
#
aiincybersecurity
1
reaction
Comments
Add Comment
5 min read
🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project
Ajinkya Anil Kahane
Ajinkya Anil Kahane
Ajinkya Anil Kahane
Follow
Mar 31
🔐 Stop Writing Weak Auth! Build Rock-Solid Authentication for Your Next Project
#
programming
#
vulnerabilities
#
security
#
api
6
reactions
Comments
5
comments
4 min read
Analyzing a Suspicious Flash Loan Arbitrage Smart Contract
FOBABS
FOBABS
FOBABS
Follow
Feb 18
Analyzing a Suspicious Flash Loan Arbitrage Smart Contract
#
web3
#
smartcontract
#
vulnerabilities
#
blockchain
Comments
Add Comment
3 min read
Prevent Subdomain Takeover in Laravel: A Dev’s Guide
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Feb 13
Prevent Subdomain Takeover in Laravel: A Dev’s Guide
#
cybersecurity
#
laravel
#
vulnerabilities
#
php
2
reactions
Comments
Add Comment
3 min read
Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)
Carrie
Carrie
Carrie
Follow
Mar 14
Apache Tomcat Partial PUT Remote Code Execution Vulnerability (CVE-2025-24813)
#
vulnerabilities
#
cybersecurity
7
reactions
Comments
Add Comment
3 min read
Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025
Namik Ahmadov
Namik Ahmadov
Namik Ahmadov
Follow
Mar 13
Abusing AI: Most Compromised Weaknesses Pentesters Need to Know in 2025
#
ai
#
vulnerabilities
#
cybersecurity
#
python
Comments
Add Comment
3 min read
Prevent Session Replay Attacks in Laravel: A Complete Guide
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Mar 13
Prevent Session Replay Attacks in Laravel: A Complete Guide
#
cybersecurity
#
vulnerabilities
#
laravel
#
php
3
reactions
Comments
Add Comment
4 min read
Often Misused File Upload ( 11503 ) Check the File Extension During Upload
FakeStandard
FakeStandard
FakeStandard
Follow
Feb 11
Often Misused File Upload ( 11503 ) Check the File Extension During Upload
#
vulnerabilities
Comments
Add Comment
1 min read
loading...
We're a blogging-forward open source social network where we learn from one another
Log in
Create account