Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Insecure Deserialization in Symfony: How to Prevent It
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Jun 17 '25
Insecure Deserialization in Symfony: How to Prevent It
#
cybersecurity
#
vulnerabilities
#
symfony
#
webdev
3
 reactions
Comments
Add Comment
3 min read
The Essential Guide to Web Security Scanning: Protecting Your Digital Assets
Freedom Coder
Freedom Coder
Freedom Coder
Follow
Jun 27 '25
The Essential Guide to Web Security Scanning: Protecting Your Digital Assets
#
cybersecurity
#
webscanner
#
websecurity
#
vulnerabilities
Comments
Add Comment
2 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
Akuson Daniel
Akuson Daniel
Akuson Daniel
Follow
Jun 25 '25
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
#
cybersecurity
#
vulnerabilities
#
testing
Comments
Add Comment
1 min read
Weak Password Policy in Symfony: Risks & Prevention
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
May 22 '25
Weak Password Policy in Symfony: Risks & Prevention
#
cybersecurity
#
vulnerabilities
#
symfony
#
webdev
2
 reactions
Comments
Add Comment
4 min read
CVE-2025-0282: Remote Code Execution in Ivanti Connect Secure VPN
Sharon
Sharon
Sharon
Follow
Jun 25 '25
CVE-2025-0282: Remote Code Execution in Ivanti Connect Secure VPN
#
vulnerabilities
#
cybersecurity
#
websecurity
5
 reactions
Comments
Add Comment
2 min read
GeoServer Hit by Critical SSRF and XXE Vulnerabilities — Patch Now!
Sharon
Sharon
Sharon
Follow
Jun 13 '25
GeoServer Hit by Critical SSRF and XXE Vulnerabilities — Patch Now!
#
vulnerabilities
#
cybersecurity
6
 reactions
Comments
1
 comment
3 min read
Prevent Path Manipulation Vulnerability in Symfony
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
May 20 '25
Prevent Path Manipulation Vulnerability in Symfony
#
cybersecurity
#
vulnerabilities
#
symfony
#
webdev
2
 reactions
Comments
Add Comment
3 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
Akuson Daniel
Akuson Daniel
Akuson Daniel
Follow
Jun 22 '25
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
#
cybersecurity
#
vulnerabilities
#
testing
Comments
Add Comment
2 min read
CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps
Sharon
Sharon
Sharon
Follow
Jun 10 '25
CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps
#
vulnerabilities
#
webdev
#
cybersecurity
#
ai
8
 reactions
Comments
1
 comment
3 min read
Ollama Exposed: Unauthenticated Access Vulnerability Could Leak Your LLM Models
Sharon
Sharon
Sharon
Follow
Jun 20 '25
Ollama Exposed: Unauthenticated Access Vulnerability Could Leak Your LLM Models
#
vulnerabilities
#
cybersecurity
#
llm
#
ollama
5
 reactions
Comments
1
 comment
2 min read
Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them
Besufkade Terefe
Besufkade Terefe
Besufkade Terefe
Follow
May 16 '25
Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them
#
security
#
vulnerabilities
#
iot
#
learning
Comments
Add Comment
5 min read
New VMware ESXi Vulnerability Chain Enables VM Escape — Now Exploited in the Wild
Sharon
Sharon
Sharon
Follow
Jun 17 '25
New VMware ESXi Vulnerability Chain Enables VM Escape — Now Exploited in the Wild
#
vulnerabilities
#
cybersecurity
5
 reactions
Comments
Add Comment
3 min read
A Guide to Phishing Websites and Malicious Link Checkers
Freedom Coder
Freedom Coder
Freedom Coder
Follow
Jun 14 '25
A Guide to Phishing Websites and Malicious Link Checkers
#
cybersecurity
#
phishing
#
vulnerabilities
#
malicious
Comments
Add Comment
2 min read
RedTiger: Advanced Automated XSS Vulnerability Testing Tool
Mohamed
Mohamed
Mohamed
Follow
Jun 7 '25
RedTiger: Advanced Automated XSS Vulnerability Testing Tool
#
cybersecurity
#
automation
#
testing
#
vulnerabilities
3
 reactions
Comments
2
 comments
4 min read
What is a Vulnerability Assessment? Importance, Key Steps, and Tools
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Apr 28 '25
What is a Vulnerability Assessment? Importance, Key Steps, and Tools
#
vulnerabilities
#
scanning
#
cybersecurity
#
vulnerabilityassessment
Comments
Add Comment
7 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account