Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Prevent Path Manipulation Vulnerability in Symfony
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
May 20 '25
Prevent Path Manipulation Vulnerability in Symfony
#
cybersecurity
#
vulnerabilities
#
symfony
#
webdev
2
 reactions
Comments
Add Comment
3 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
Akuson Daniel
Akuson Daniel
Akuson Daniel
Follow
Jun 22 '25
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
#
cybersecurity
#
vulnerabilities
#
testing
Comments
Add Comment
2 min read
CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps
Sharon
Sharon
Sharon
Follow
Jun 10 '25
CVE-2025-29927: How a Header Bypass in Next.js Broke Auth for Some AI Apps
#
vulnerabilities
#
webdev
#
cybersecurity
#
ai
8
 reactions
Comments
1
 comment
3 min read
Ollama Exposed: Unauthenticated Access Vulnerability Could Leak Your LLM Models
Sharon
Sharon
Sharon
Follow
Jun 20 '25
Ollama Exposed: Unauthenticated Access Vulnerability Could Leak Your LLM Models
#
vulnerabilities
#
cybersecurity
#
llm
#
ollama
5
 reactions
Comments
1
 comment
2 min read
Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them
Besufkade Terefe
Besufkade Terefe
Besufkade Terefe
Follow
May 16 '25
Vulnerabilities on LED Displays in Addis Ababa, Ethiopia — and How to Defend Against Them
#
security
#
vulnerabilities
#
iot
#
learning
Comments
Add Comment
5 min read
New VMware ESXi Vulnerability Chain Enables VM Escape — Now Exploited in the Wild
Sharon
Sharon
Sharon
Follow
Jun 17 '25
New VMware ESXi Vulnerability Chain Enables VM Escape — Now Exploited in the Wild
#
vulnerabilities
#
cybersecurity
5
 reactions
Comments
Add Comment
3 min read
A Guide to Phishing Websites and Malicious Link Checkers
Freedom Coder
Freedom Coder
Freedom Coder
Follow
Jun 14 '25
A Guide to Phishing Websites and Malicious Link Checkers
#
cybersecurity
#
phishing
#
vulnerabilities
#
malicious
Comments
Add Comment
2 min read
RedTiger: Advanced Automated XSS Vulnerability Testing Tool
Mohamed
Mohamed
Mohamed
Follow
Jun 7 '25
RedTiger: Advanced Automated XSS Vulnerability Testing Tool
#
cybersecurity
#
automation
#
testing
#
vulnerabilities
3
 reactions
Comments
2
 comments
4 min read
What is a Vulnerability Assessment? Importance, Key Steps, and Tools
Stephano Kambeta
Stephano Kambeta
Stephano Kambeta
Follow
Apr 28 '25
What is a Vulnerability Assessment? Importance, Key Steps, and Tools
#
vulnerabilities
#
scanning
#
cybersecurity
#
vulnerabilityassessment
Comments
Add Comment
7 min read
9 Free Web App Vulnerability Scanners You Should Know in 2025
Sam Bishop
Sam Bishop
Sam Bishop
Follow
May 28 '25
9 Free Web App Vulnerability Scanners You Should Know in 2025
#
web
#
appsec
#
vulnerabilities
#
security
1
 reaction
Comments
Add Comment
4 min read
Vite File Read Vulnerability Exposed (CVE-2025-30208)
Sharon
Sharon
Sharon
Follow
Jun 9 '25
Vite File Read Vulnerability Exposed (CVE-2025-30208)
#
vulnerabilities
#
cybersecurity
6
 reactions
Comments
1
 comment
3 min read
Critical RCE Vulnerabilities Found in DataEase (CVE-2025-49001/49002)
Sharon
Sharon
Sharon
Follow
Jun 6 '25
Critical RCE Vulnerabilities Found in DataEase (CVE-2025-49001/49002)
#
vulnerabilities
#
rce
#
cybersecurity
#
webdev
5
 reactions
Comments
1
 comment
2 min read
0day RCE Vulnerability in Apusic Application Server via IIOP Deserialization
Sharon
Sharon
Sharon
Follow
Jun 5 '25
0day RCE Vulnerability in Apusic Application Server via IIOP Deserialization
#
vulnerabilities
#
cybersecurity
#
rce
#
webdev
8
 reactions
Comments
1
 comment
2 min read
New Kafka Connect Vulnerability (CVE-2025-27817) Lets Attackers Read Any File
Sharon
Sharon
Sharon
Follow
Jun 12 '25
New Kafka Connect Vulnerability (CVE-2025-27817) Lets Attackers Read Any File
#
vulnerabilities
#
cybersecurity
6
 reactions
Comments
2
 comments
2 min read
MitM Attack in Symfony: Prevention with Secure Coding
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
May 15 '25
MitM Attack in Symfony: Prevention with Secure Coding
#
cybersecurity
#
vulnerabilities
#
symfony
#
webdev
3
 reactions
Comments
Add Comment
4 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account