Forem

# vulnerabilities

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Insecure Deserialization in Symfony: How to Prevent It
Cover image for Insecure Deserialization in Symfony: How to Prevent It

Insecure Deserialization in Symfony: How to Prevent It

3
Comments
3 min read
The Essential Guide to Web Security Scanning: Protecting Your Digital Assets
Cover image for The Essential Guide to Web Security Scanning: Protecting Your Digital Assets

The Essential Guide to Web Security Scanning: Protecting Your Digital Assets

Comments
2 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Comments
1 min read
Weak Password Policy in Symfony: Risks & Prevention
Cover image for Weak Password Policy in Symfony: Risks & Prevention

Weak Password Policy in Symfony: Risks & Prevention

2
Comments
4 min read
CVE-2025-0282: Remote Code Execution in Ivanti Connect Secure VPN

CVE-2025-0282: Remote Code Execution in Ivanti Connect Secure VPN

5
Comments
2 min read
GeoServer Hit by Critical SSRF and XXE Vulnerabilities — Patch Now!

GeoServer Hit by Critical SSRF and XXE Vulnerabilities — Patch Now!

6
Comments 1
3 min read
Prevent Path Manipulation Vulnerability in Symfony
Cover image for Prevent Path Manipulation Vulnerability in Symfony

Prevent Path Manipulation Vulnerability in Symfony

2
Comments
3 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Perform basic reconnaissance to gather domain-related information using Vulnerable Web.

Comments
2 min read
CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps

CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps

8
Comments 1
3 min read
Ollama Exposed: Unauthenticated Access Vulnerability Could Leak Your LLM Models

Ollama Exposed: Unauthenticated Access Vulnerability Could Leak Your LLM Models

5
Comments 1
2 min read
Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them
Cover image for Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them

Comments
5 min read
New VMware ESXi Vulnerability Chain Enables VM Escape — Now Exploited in the Wild

New VMware ESXi Vulnerability Chain Enables VM Escape — Now Exploited in the Wild

5
Comments
3 min read
A Guide to Phishing Websites and Malicious Link Checkers

A Guide to Phishing Websites and Malicious Link Checkers

Comments
2 min read
RedTiger: Advanced Automated XSS Vulnerability Testing Tool
Cover image for RedTiger: Advanced Automated XSS Vulnerability Testing Tool

RedTiger: Advanced Automated XSS Vulnerability Testing Tool

3
Comments 2
4 min read
What is a Vulnerability Assessment? Importance, Key Steps, and Tools

What is a Vulnerability Assessment? Importance, Key Steps, and Tools

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.