Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How to Prevent Common Security Vulnerabilities in REST APIs
Akshay Kurve
Akshay Kurve
Akshay Kurve
Follow
Mar 20
How to Prevent Common Security Vulnerabilities in REST APIs
#
challenge
#
security
#
vulnerabilities
#
restapi
2
 reactions
Comments
Add Comment
12 min read
AI/ML Infrastructure Vulnerabilities Expose Systems to Security Risks: Patching and Mitigation Strategies Proposed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 20
AI/ML Infrastructure Vulnerabilities Expose Systems to Security Risks: Patching and Mitigation Strategies Proposed
#
security
#
aiml
#
vulnerabilities
#
rce
2
 reactions
Comments
Add Comment
13 min read
66% of MCP Servers Have Critical Security Vulnerabilities: Urgent Patching and Audits Needed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 15
66% of MCP Servers Have Critical Security Vulnerabilities: Urgent Patching and Audits Needed
#
security
#
vulnerabilities
#
mcp
#
patching
3
 reactions
Comments
Add Comment
13 min read
The State of MCP Server Security — 2026 Audit
Anders
Anders
Anders
Follow
Mar 13
The State of MCP Server Security — 2026 Audit
#
security
#
ai
#
mcp
#
vulnerabilities
1
 reaction
Comments
Add Comment
2 min read
Microsoft's Software Ecosystem Faces 79 Vulnerabilities: Urgent Patching and Mitigation Strategies Required
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 10
Microsoft's Software Ecosystem Faces 79 Vulnerabilities: Urgent Patching and Mitigation Strategies Required
#
cybersecurity
#
vulnerabilities
#
patching
#
zerodays
2
 reactions
Comments
Add Comment
16 min read
Building Secure Blockchain Bridges: Common Vulnerabilities and Solutions.
Progress Ochuko Eyaadah
Progress Ochuko Eyaadah
Progress Ochuko Eyaadah
Follow
Jan 28
Building Secure Blockchain Bridges: Common Vulnerabilities and Solutions.
#
blockchain
#
security
#
vulnerabilities
#
bridges
4
 reactions
Comments
Add Comment
5 min read
Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain
Rez Moss
Rez Moss
Rez Moss
Follow
Feb 4
Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain
#
security
#
vulnerabilities
#
go
#
programming
5
 reactions
Comments
Add Comment
10 min read
Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask
Hafiz Shamnad
Hafiz Shamnad
Hafiz Shamnad
Follow
Feb 21
Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask
#
webdev
#
cybersecurity
#
devchallenge
#
vulnerabilities
3
 reactions
Comments
Add Comment
6 min read
Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation
Hafiz Shamnad
Hafiz Shamnad
Hafiz Shamnad
Follow
Feb 20
Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation
#
cybersecurity
#
webdev
#
python
#
vulnerabilities
1
 reaction
Comments
Add Comment
6 min read
Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host
Hafiz Shamnad
Hafiz Shamnad
Hafiz Shamnad
Follow
Feb 19
Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host
#
cybersecurity
#
webdev
#
vulnerabilities
#
website
1
 reaction
Comments
Add Comment
3 min read
How to Integrate Vulnerability Scanning Into DevSecOps Workflows
James Miller
James Miller
James Miller
Follow
Feb 17
How to Integrate Vulnerability Scanning Into DevSecOps Workflows
#
vulnerabilities
#
devops
#
security
2
 reactions
Comments
Add Comment
7 min read
Understanding TOCTOU: The Race Condition Hiding in Your Code
Victory Lucky
Victory Lucky
Victory Lucky
Follow
Feb 15
Understanding TOCTOU: The Race Condition Hiding in Your Code
#
webdev
#
vulnerabilities
#
ai
#
programming
7
 reactions
Comments
Add Comment
4 min read
Vens: Stop Patching Vulnerabilities That Don't Matter to You
Fahed dorgaa
Fahed dorgaa
Fahed dorgaa
Follow
Feb 14
Vens: Stop Patching Vulnerabilities That Don't Matter to You
#
cybersecurity
#
owasp
#
vulnerabilities
#
trivy
1
 reaction
Comments
1
 comment
2 min read
Unauthenticated Blind SSRF in Oracle EBS
John
John
John
Follow
Jan 10
Unauthenticated Blind SSRF in Oracle EBS
#
oracle
#
vulnerabilities
Comments
Add Comment
2 min read
n8n Security Vulnerabilities: A Comprehensive Whitepaper for Developers and Architects
Srinivasan Ragothaman
Srinivasan Ragothaman
Srinivasan Ragothaman
Follow
Feb 6
n8n Security Vulnerabilities: A Comprehensive Whitepaper for Developers and Architects
#
n8n
#
vulnerabilities
#
remotecodeexecution
1
 reaction
Comments
Add Comment
10 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account