Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
NIS2 Compliance 2025: What’s Actually In Force
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Oct 9 '25
NIS2 Compliance 2025: What’s Actually In Force
#
webdev
#
cybersecurity
#
vulnerabilities
#
security
3
 reactions
Comments
Add Comment
7 min read
OnePlus CVE-2025-10184: Ditch SMS 2FA Now
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Sep 28 '25
OnePlus CVE-2025-10184: Ditch SMS 2FA Now
#
android
#
cybersecurity
#
vulnerabilities
#
mobile
4
 reactions
Comments
Add Comment
6 min read
XXE Injection in React.js — What It Is and How to Prevent It
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Sep 11 '25
XXE Injection in React.js — What It Is and How to Prevent It
#
cybersecurity
#
vulnerabilities
#
react
#
webdev
3
 reactions
Comments
Add Comment
3 min read
Critical SQL Injection Vulnerability in Weaver e-cology OA: What You Need to Know
Sharon
Sharon
Sharon
Follow
Sep 11 '25
Critical SQL Injection Vulnerability in Weaver e-cology OA: What You Need to Know
#
cybersecurity
#
safeline
#
waf
#
vulnerabilities
10
 reactions
Comments
Add Comment
2 min read
Security Alert: XXE Vulnerability in Weaver e-cology OA
Sharon
Sharon
Sharon
Follow
Sep 10 '25
Security Alert: XXE Vulnerability in Weaver e-cology OA
#
vulnerabilities
#
safeline
#
waf
#
cybersecurity
6
 reactions
Comments
Add Comment
2 min read
Securing Frontend Apps from Lodash Issues
Sudhanshu Chaubey
Sudhanshu Chaubey
Sudhanshu Chaubey
Follow
Oct 11 '25
Securing Frontend Apps from Lodash Issues
#
lodash
#
security
#
vulnerabilities
#
typescript
5
 reactions
Comments
Add Comment
3 min read
An NPM dependency check list
Tracy Gilmore
Tracy Gilmore
Tracy Gilmore
Follow
Sep 21 '25
An NPM dependency check list
#
javascript
#
npm
#
vulnerabilities
#
packages
9
 reactions
Comments
Add Comment
3 min read
Weaver e-cology Vulnerability: Frontend File Upload RCE Risk
Sharon
Sharon
Sharon
Follow
Sep 5 '25
Weaver e-cology Vulnerability: Frontend File Upload RCE Risk
#
rce
#
vulnerabilities
#
safeline
#
waf
6
 reactions
Comments
Add Comment
2 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Team Spektion
Team Spektion
Team Spektion
Follow
for
Spektion
Sep 3 '25
Patch Management vs Vulnerability Management: Why the Difference Matters
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
1
 reaction
Comments
Add Comment
5 min read
Openfire Admin Console Auth Bypass (CVE-2023-32315) — From Path Traversal to RCE
Sharon
Sharon
Sharon
Follow
Sep 17 '25
Openfire Admin Console Auth Bypass (CVE-2023-32315) — From Path Traversal to RCE
#
rce
#
safeline
#
cybersecurity
#
vulnerabilities
6
 reactions
Comments
Add Comment
2 min read
RCE Risk in Yonyou U8Cloud: ServiceDispatcher Deserialization Vulnerability
Sharon
Sharon
Sharon
Follow
Sep 1 '25
RCE Risk in Yonyou U8Cloud: ServiceDispatcher Deserialization Vulnerability
#
rce
#
vulnerabilities
#
cybersecurity
#
safeline
6
 reactions
Comments
Add Comment
2 min read
How to Allow Nextcloud Backup Files with SafeLine WAF
Sharon
Sharon
Sharon
Follow
Sep 1 '25
How to Allow Nextcloud Backup Files with SafeLine WAF
#
safeline
#
vulnerabilities
#
waf
#
beginners
7
 reactions
Comments
Add Comment
3 min read
Smartbi Access Bypass Vulnerability Leads to Admin Takeover
Sharon
Sharon
Sharon
Follow
Sep 3 '25
Smartbi Access Bypass Vulnerability Leads to Admin Takeover
#
cybersecurity
#
vulnerabilities
#
safeline
#
waf
6
 reactions
Comments
Add Comment
2 min read
CVE-2023-42442: JumpServer Session Replay Leak Could Expose Sensitive Ops Data
Sharon
Sharon
Sharon
Follow
Aug 29 '25
CVE-2023-42442: JumpServer Session Replay Leak Could Expose Sensitive Ops Data
#
cybersecurity
#
webdev
#
beginners
#
vulnerabilities
6
 reactions
Comments
Add Comment
2 min read
Dealing With Dependency Vulnerabilities
Buffolander
Buffolander
Buffolander
Follow
Aug 31 '25
Dealing With Dependency Vulnerabilities
#
infosec
#
vulnerabilities
#
node
Comments
Add Comment
4 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account