Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
A Guide to Common Web Application Security Vulnerabilities and Mitigation
Mainul Hasan
Mainul Hasan
Mainul Hasan
Follow
Apr 7 '24
A Guide to Common Web Application Security Vulnerabilities and Mitigation
#
sqlinjection
#
cybersecurity
#
security
#
vulnerabilities
8
reactions
Comments
Add Comment
16 min read
Common Security Vulnerabilities in the Blockchain World
oluwatobi2001
oluwatobi2001
oluwatobi2001
Follow
Apr 3 '24
Common Security Vulnerabilities in the Blockchain World
#
blockchain
#
security
#
hacking
#
vulnerabilities
1
reaction
Comments
Add Comment
4 min read
A deep dive into zero-day vulnerability alerts with New Relic APM
Harry Kimpel
Harry Kimpel
Harry Kimpel
Follow
for
New Relic
Feb 23 '24
A deep dive into zero-day vulnerability alerts with New Relic APM
#
devsecops
#
observability
#
apm
#
vulnerabilities
1
reaction
Comments
Add Comment
7 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Feb 21 '24
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)
#
cybersecurity
#
infosec
#
vulnerabilities
#
security
Comments
Add Comment
8 min read
Zero-day: Server Message Block (SMB) Server in Linux Kernel 5.15 Has a Critical Vulnerability!
SecPod
SecPod
SecPod
Follow
Mar 19 '24
Zero-day: Server Message Block (SMB) Server in Linux Kernel 5.15 Has a Critical Vulnerability!
#
cybersecurity
#
vulnerabilities
#
patch
#
attacksurface
Comments
Add Comment
2 min read
Solving Pickle Rick: An Online CTF Challenge on TryHackMe
Sabid Mahmud
Sabid Mahmud
Sabid Mahmud
Follow
Feb 25 '24
Solving Pickle Rick: An Online CTF Challenge on TryHackMe
#
cybersecurity
#
vulnerabilities
#
hacking
Comments
Add Comment
6 min read
How to resolve vulnerabilities in Front-End Applications
Utkarsh Tiwari
Utkarsh Tiwari
Utkarsh Tiwari
Follow
Mar 3 '24
How to resolve vulnerabilities in Front-End Applications
#
webdev
#
javascript
#
vulnerabilities
#
security
2
reactions
Comments
Add Comment
4 min read
Training data poisoning to get what you want in LLMs, A Question
Ali Faraji
Ali Faraji
Ali Faraji
Follow
Mar 2 '24
Training data poisoning to get what you want in LLMs, A Question
#
llm
#
security
#
machinelearning
#
vulnerabilities
Comments
Add Comment
2 min read
Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution Vulnerability
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Feb 24 '24
Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution Vulnerability
#
cybersecurity
#
infosec
#
vulnerabilities
#
cve
3
reactions
Comments
Add Comment
39 min read
ERC-X Miner Contract Exploit on ERC-404 Standard: our Expert Analysis
Crypton Studio
Crypton Studio
Crypton Studio
Follow
Feb 16 '24
ERC-X Miner Contract Exploit on ERC-404 Standard: our Expert Analysis
#
smartcontract
#
security
#
vulnerabilities
#
blockchain
1
reaction
Comments
Add Comment
4 min read
Nmap - Network Mapper
Ibrahim S
Ibrahim S
Ibrahim S
Follow
Jan 23 '24
Nmap - Network Mapper
#
ibbus
#
nmap
#
weakness
#
vulnerabilities
1
reaction
Comments
Add Comment
2 min read
What’s the Deal with CVEs?
Jan Schulte
Jan Schulte
Jan Schulte
Follow
for
Outshift By Cisco
Dec 22 '23
What’s the Deal with CVEs?
#
security
#
devsecops
#
vulnerabilities
1
reaction
Comments
Add Comment
6 min read
Como corrigir vulnerabilidades de software automaticamente com o Veracode Fix
Lucas Santos Ferreira
Lucas Santos Ferreira
Lucas Santos Ferreira
Follow
for
M3Corp
Nov 30 '23
Como corrigir vulnerabilidades de software automaticamente com o Veracode Fix
#
veracode
#
fix
#
vulnerabilities
#
cybersecurity
2
reactions
Comments
Add Comment
2 min read
Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Nov 23 '23
Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
Comments
Add Comment
8 min read
[Possible Fix] Inflight reported as a vulnerability in react project (Veracode SCA)
Mark Benjamin
Mark Benjamin
Mark Benjamin
Follow
Nov 10 '23
[Possible Fix] Inflight reported as a vulnerability in react project (Veracode SCA)
#
react
#
veracode
#
security
#
vulnerabilities
Comments
1
comment
1 min read
Descubra como encontrar buckets ocultos na nuvem da Amazon S3! 👀🔍
Higor Diego
Higor Diego
Higor Diego
Follow
Oct 28 '23
Descubra como encontrar buckets ocultos na nuvem da Amazon S3! 👀🔍
#
aws
#
security
#
vulnerabilities
#
gobuster
3
reactions
Comments
Add Comment
10 min read
Vulnerable and Outdated Components
Jahin Justin
Jahin Justin
Jahin Justin
Follow
Oct 27 '23
Vulnerable and Outdated Components
#
programming
#
opensource
#
vulnerabilities
#
cybersecurity
7
reactions
Comments
Add Comment
4 min read
Introduction to OWASP
Jahin Justin
Jahin Justin
Jahin Justin
Follow
Oct 25 '23
Introduction to OWASP
#
owasp
#
nullchapter
#
vulnerabilities
#
cybersecurity
8
reactions
Comments
Add Comment
2 min read
Your Daily CVE Reminder 🦸🏻♀️
Sena Yakut
Sena Yakut
Sena Yakut
Follow
for
AWS Community Builders
Oct 14 '23
Your Daily CVE Reminder 🦸🏻♀️
#
aws
#
security
#
devops
#
vulnerabilities
3
reactions
Comments
Add Comment
3 min read
Symbolic Execution Fuzzing With KLEE
Ramin Farajpour Cami
Ramin Farajpour Cami
Ramin Farajpour Cami
Follow
Oct 10 '23
Symbolic Execution Fuzzing With KLEE
#
fuzzing
#
klee
#
security
#
vulnerabilities
Comments
Add Comment
2 min read
KeePass Memory Leakage Vulnerability Analysis - CVE-2023-32784
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Oct 9 '23
KeePass Memory Leakage Vulnerability Analysis - CVE-2023-32784
#
poc
#
cybersecurity
#
infosec
#
vulnerabilities
2
reactions
Comments
Add Comment
4 min read
Beyond CVSS: Project Context, Exploitability, and Reachability of Vulnerabilities - Part 2
Robin Birney
Robin Birney
Robin Birney
Follow
for
Safety Cybersecurity
Sep 25 '23
Beyond CVSS: Project Context, Exploitability, and Reachability of Vulnerabilities - Part 2
#
python
#
vulnerabilities
#
security
#
devops
Comments
Add Comment
4 min read
Análisis dinámico de aplicaciones web con OWASP ZAP
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Follow
Sep 25 '23
Análisis dinámico de aplicaciones web con OWASP ZAP
#
cybersecurity
#
vulnerabilities
#
spanish
#
testing
1
reaction
Comments
2
comments
9 min read
Identificando vulnerabilidades en código fuente a través de análisis estático con SonarQube
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Follow
Sep 13 '23
Identificando vulnerabilidades en código fuente a través de análisis estático con SonarQube
#
cybersecurity
#
vulnerabilities
#
beginners
#
spanish
1
reaction
Comments
Add Comment
9 min read
Hardcoded secret at the heart of the Dell Compellent VMware vulnerability
Dwayne McDaniel
Dwayne McDaniel
Dwayne McDaniel
Follow
for
GitGuardian
Sep 8 '23
Hardcoded secret at the heart of the Dell Compellent VMware vulnerability
#
dell
#
vmware
#
cybersecurity
#
vulnerabilities
1
reaction
Comments
Add Comment
6 min read
Fun Infosec Writeups from GH
Rake
Rake
Rake
Follow
Sep 1 '23
Fun Infosec Writeups from GH
#
cybersecurity
#
informationsecurity
#
vulnerabilities
#
appsec
Comments
Add Comment
3 min read
Interesting Software Vulns
Rake
Rake
Rake
Follow
Aug 31 '23
Interesting Software Vulns
#
vulnerabilities
#
infosec
#
appsec
#
cybersecurity
Comments
Add Comment
3 min read
Bypassing PHP WAF to Achieve Remote Code Execution In-Depth Analysis
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Jul 21 '23
Bypassing PHP WAF to Achieve Remote Code Execution In-Depth Analysis
#
php
#
cybersecurity
#
infosec
#
vulnerabilities
Comments
Add Comment
5 min read
Level up your security skillset with New Relic
Harry Kimpel
Harry Kimpel
Harry Kimpel
Follow
for
New Relic
Jun 22 '23
Level up your security skillset with New Relic
#
devsecops
#
applicationsecurity
#
vulnerabilities
#
observability
Comments
Add Comment
6 min read
The Summary Of Spring Security Authorization Bypass on Java
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Apr 27 '23
The Summary Of Spring Security Authorization Bypass on Java
#
cybersecurity
#
vulnerabilities
#
infosec
#
springboot
1
reaction
Comments
Add Comment
12 min read
Gitpod remote code execution 0-day vulnerability via WebSockets
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Mar 6 '23
Gitpod remote code execution 0-day vulnerability via WebSockets
#
applicationsecurity
#
casestudies
#
cloudnativesecurity
#
vulnerabilities
Comments
Add Comment
9 min read
Supply chain security incident at CircleCI: Rotate your secrets
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Jan 9 '23
Supply chain security incident at CircleCI: Rotate your secrets
#
vulnerabilities
Comments
Add Comment
5 min read
Unsafe deserialization vulnerability in SnakeYaml (CVE-2022-1471)
Brian Vermeer 🧑🏼🎓🧑🏼💻
Brian Vermeer 🧑🏼🎓🧑🏼💻
Brian Vermeer 🧑🏼🎓🧑🏼💻
Follow
for
Snyk
Dec 14 '22
Unsafe deserialization vulnerability in SnakeYaml (CVE-2022-1471)
#
java
#
opensource
#
vulnerabilities
#
security
4
reactions
Comments
Add Comment
5 min read
Breaking down the ‘critical’ OpenSSL vulnerability
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 14 '22
Breaking down the ‘critical’ OpenSSL vulnerability
#
applicationsecurity
#
vulnerabilities
Comments
Add Comment
7 min read
Update: OpenSSL high severity vulnerabilities
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 14 '22
Update: OpenSSL high severity vulnerabilities
#
applicationsecurity
#
engineering
#
opensource
#
vulnerabilities
Comments
Add Comment
4 min read
New OpenSSL critical vulnerability: What you need to know
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Nov 14 '22
New OpenSSL critical vulnerability: What you need to know
#
opensource
#
vulnerabilities
#
openssl
Comments
Add Comment
5 min read
Understanding DNS attacks: Identifying and patching vulnerabilities
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Oct 27 '22
Understanding DNS attacks: Identifying and patching vulnerabilities
#
vulnerabilities
3
reactions
Comments
Add Comment
8 min read
Reviewing CVE-2022-42889: The arbitrary code execution vulnerability in Apache Commons Text (Text4Shell)
Brian Vermeer 🧑🏼🎓🧑🏼💻
Brian Vermeer 🧑🏼🎓🧑🏼💻
Brian Vermeer 🧑🏼🎓🧑🏼💻
Follow
for
Snyk
Oct 19 '22
Reviewing CVE-2022-42889: The arbitrary code execution vulnerability in Apache Commons Text (Text4Shell)
#
java
#
security
#
vulnerabilities
Comments
Add Comment
2 min read
Phony PyPi package imitates known developer
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Oct 5 '22
Phony PyPi package imitates known developer
#
opensource
#
vulnerabilities
#
python
#
pypi
Comments
Add Comment
5 min read
Avoiding SMTP Injection: A Whitebox primer
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Sep 19 '22
Avoiding SMTP Injection: A Whitebox primer
#
applicationsecurity
#
dependencyhealth
#
vulnerabilities
Comments
Add Comment
7 min read
How to find and fix XML entity vulnerabilities
SnykSec
SnykSec
SnykSec
Follow
for
Snyk
Sep 12 '22
How to find and fix XML entity vulnerabilities
#
applicationsecurity
#
vulnerabilities
Comments
Add Comment
9 min read
Explain Aws API Gateway vulnerabilities Like I'm Five
Muhammad Shakeel
Muhammad Shakeel
Muhammad Shakeel
Follow
Jul 23 '22
Explain Aws API Gateway vulnerabilities Like I'm Five
#
api
#
vulnerabilities
#
javascript
14
reactions
Comments
1
comment
1 min read
Capture the flag: A Node.js web app vulnerability practice (part 1)
Yanze Dai
Yanze Dai
Yanze Dai
Follow
for
Pitayan Blog
May 20 '22
Capture the flag: A Node.js web app vulnerability practice (part 1)
#
vulnerabilities
#
workshop
6
reactions
Comments
Add Comment
5 min read
Data Engineering and Secure Coding with a Vulnerability Database
sagu94271
sagu94271
sagu94271
Follow
Dec 29 '21
Data Engineering and Secure Coding with a Vulnerability Database
#
datascience
#
whitesource
#
vulnerabilities
#
python
4
reactions
Comments
1
comment
3 min read
Vulnerability List in React Packages encountered while Building up React Application
rajdeepmca04
rajdeepmca04
rajdeepmca04
Follow
Sep 16 '21
Vulnerability List in React Packages encountered while Building up React Application
#
react
#
vulnerabilities
#
reactdevutils
1
reaction
Comments
Add Comment
1 min read
Network Security & Database Vulnerabilities
L0WK3Y | Infophreak
L0WK3Y | Infophreak
L0WK3Y | Infophreak
Follow
Sep 18 '21
Network Security & Database Vulnerabilities
#
security
#
cybersecurity
#
vulnerabilities
#
networking
3
reactions
Comments
Add Comment
8 min read
Top 9 Joomla Security Vulnerabilities and What You Can Do About Them
Gilad David Maayan
Gilad David Maayan
Gilad David Maayan
Follow
Mar 21 '21
Top 9 Joomla Security Vulnerabilities and What You Can Do About Them
#
joomla
#
security
#
vulnerabilities
2
reactions
Comments
2
comments
6 min read
Happy 1st Birthday to Sonatype Gradle Scan Plugin - Enter Sherlock Trunks!
Guillermo Varela
Guillermo Varela
Guillermo Varela
Follow
Feb 19 '21
Happy 1st Birthday to Sonatype Gradle Scan Plugin - Enter Sherlock Trunks!
#
gradle
#
vulnerabilities
#
ossindex
#
dependencies
2
reactions
Comments
1
comment
2 min read
Yarn audit fix: workaround
Anton Golub
Anton Golub
Anton Golub
Follow
Jul 10 '20
Yarn audit fix: workaround
#
javascript
#
yarn
#
audit
#
vulnerabilities
37
reactions
Comments
2
comments
3 min read
Fix a transitive npm dependency vulnerability
Vasily Malykhin
Vasily Malykhin
Vasily Malykhin
Follow
May 29 '20
Fix a transitive npm dependency vulnerability
#
npm
#
vulnerabilities
#
javascript
18
reactions
Comments
Add Comment
2 min read
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis
Katie McCaskey
Katie McCaskey
Katie McCaskey
Follow
for
Sonatype
Mar 30 '20
Nexus Vulnerability Scanner: Getting Started with Vulnerability Analysis
#
vulnerabilities
#
security
#
appsec
#
applicationsecurity
2
reactions
Comments
Add Comment
1 min read
Windows zero-day vulnerability ADV200006: How to disable preview pane and details pane in Explorer
nabbisen
nabbisen
nabbisen
Follow
Mar 25 '20
Windows zero-day vulnerability ADV200006: How to disable preview pane and details pane in Explorer
#
security
#
windows
#
vulnerabilities
#
commandline
7
reactions
Comments
Add Comment
2 min read
Fixing security vulnerabilities in npm dependencies in less than 3 mins
Vivek Nayyar
Vivek Nayyar
Vivek Nayyar
Follow
Mar 19 '20
Fixing security vulnerabilities in npm dependencies in less than 3 mins
#
javascript
#
security
#
vulnerabilities
#
npm
22
reactions
Comments
5
comments
3 min read
How to identify and fix open-source vulnerabilities
Jordan Irabor
Jordan Irabor
Jordan Irabor
Follow
Dec 15 '19
How to identify and fix open-source vulnerabilities
#
opensource
#
vulnerabilities
#
security
#
softwaredevelopment
21
reactions
Comments
2
comments
5 min read
Don't let security vulnerabilities crawl into your Node.js Docker images
Liran Tal
Liran Tal
Liran Tal
Follow
for
Snyk
Dec 9 '19
Don't let security vulnerabilities crawl into your Node.js Docker images
#
docker
#
scan
#
image
#
vulnerabilities
19
reactions
Comments
Add Comment
2 min read
Anchore Security Bundle Policies
The OpenShift Ninja
The OpenShift Ninja
The OpenShift Ninja
Follow
Oct 9 '18
Anchore Security Bundle Policies
#
containers
#
security
#
malware
#
vulnerabilities
8
reactions
Comments
Add Comment
1 min read
Learn from others mistakes: How not to write a PHP install script
Richard Klose
Richard Klose
Richard Klose
Follow
Jul 21 '18
Learn from others mistakes: How not to write a PHP install script
#
php
#
vulnerabilities
#
security
#
https
36
reactions
Comments
2
comments
6 min read
Recipe for Infection: Ransomware
Antoinette Maria
Antoinette Maria
Antoinette Maria
Follow
May 16 '17
Recipe for Infection: Ransomware
#
security
#
hacking
#
ransomware
#
vulnerabilities
12
reactions
Comments
Add Comment
3 min read
Nexus Intelligence Insights: What's in a Ghostcat? CVE-2020-1938 Apache Tomcat - Local File Inclusion Potentially Leads to RCE
Katie McCaskey
Katie McCaskey
Katie McCaskey
Follow
for
Sonatype
Mar 23 '20
Nexus Intelligence Insights: What's in a Ghostcat? CVE-2020-1938 Apache Tomcat - Local File Inclusion Potentially Leads to RCE
#
vulnerabilities
#
tomcat
#
featured
#
nexusintelligencei
7
reactions
Comments
Add Comment
2 min read
Vulnerabilities: Filling a Sieve with Sand
Anders Hornor
Anders Hornor
Anders Hornor
Follow
Dec 18 '19
Vulnerabilities: Filling a Sieve with Sand
#
vulnerabilities
4
reactions
Comments
Add Comment
2 min read
loading...
We're a blogging-forward open source social network where we learn from one another
Log in
Create account