Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Securing Frontend Apps from Lodash Issues
Sudhanshu Chaubey
Sudhanshu Chaubey
Sudhanshu Chaubey
Follow
Oct 11 '25
Securing Frontend Apps from Lodash Issues
#
lodash
#
security
#
vulnerabilities
#
typescript
5
 reactions
Comments
Add Comment
3 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Team Spektion
Team Spektion
Team Spektion
Follow
for
Spektion
Sep 3 '25
Patch Management vs Vulnerability Management: Why the Difference Matters
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
1
 reaction
Comments
Add Comment
5 min read
Openfire Admin Console Auth Bypass (CVE-2023-32315) — From Path Traversal to RCE
Sharon
Sharon
Sharon
Follow
Sep 17 '25
Openfire Admin Console Auth Bypass (CVE-2023-32315) — From Path Traversal to RCE
#
rce
#
safeline
#
cybersecurity
#
vulnerabilities
6
 reactions
Comments
Add Comment
2 min read
RCE Risk in Yonyou U8Cloud: ServiceDispatcher Deserialization Vulnerability
Sharon
Sharon
Sharon
Follow
Sep 1 '25
RCE Risk in Yonyou U8Cloud: ServiceDispatcher Deserialization Vulnerability
#
rce
#
vulnerabilities
#
cybersecurity
#
safeline
6
 reactions
Comments
Add Comment
2 min read
How to Allow Nextcloud Backup Files with SafeLine WAF
Sharon
Sharon
Sharon
Follow
Sep 1 '25
How to Allow Nextcloud Backup Files with SafeLine WAF
#
safeline
#
vulnerabilities
#
waf
#
beginners
7
 reactions
Comments
Add Comment
3 min read
Smartbi Access Bypass Vulnerability Leads to Admin Takeover
Sharon
Sharon
Sharon
Follow
Sep 3 '25
Smartbi Access Bypass Vulnerability Leads to Admin Takeover
#
cybersecurity
#
vulnerabilities
#
safeline
#
waf
6
 reactions
Comments
Add Comment
2 min read
Dealing With Dependency Vulnerabilities
Buffolander
Buffolander
Buffolander
Follow
Aug 31 '25
Dealing With Dependency Vulnerabilities
#
infosec
#
vulnerabilities
#
node
Comments
Add Comment
4 min read
KEV: V8 CVE-2025-10585 Hits Electron Apps
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Sep 30 '25
KEV: V8 CVE-2025-10585 Hits Electron Apps
#
cve
#
cybersecurity
#
vulnerabilities
#
devbugsmash
6
 reactions
Comments
Add Comment
7 min read
Automating SBOM Generation and Vulnerability Analysis
uknowWho
uknowWho
uknowWho
Follow
Sep 30 '25
Automating SBOM Generation and Vulnerability Analysis
#
vulnerabilities
#
security
#
compliance
#
rust
Comments
Add Comment
4 min read
Critical Vulnerability Alert: Weaver e-Office Remote Code Execution (RCE) – Patch Now
Sharon
Sharon
Sharon
Follow
Aug 27 '25
Critical Vulnerability Alert: Weaver e-Office Remote Code Execution (RCE) – Patch Now
#
rce
#
cybersecurity
#
vulnerabilities
#
beginners
6
 reactions
Comments
Add Comment
2 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
Dogan
Dogan
Dogan
Follow
Sep 24 '25
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
#
cybersecurity
#
infosec
#
vulnerabilities
#
security
Comments
Add Comment
3 min read
OWASP Top Ten 2021 explained with simple Java examples and SAST insights
Unicorn Developer
Unicorn Developer
Unicorn Developer
Follow
Sep 23 '25
OWASP Top Ten 2021 explained with simple Java examples and SAST insights
#
owasp
#
topten
#
java
#
vulnerabilities
5
 reactions
Comments
Add Comment
15 min read
Smartbi RCE Vulnerability: Patch Fast Before Hackers Do
Sharon
Sharon
Sharon
Follow
Sep 12 '25
Smartbi RCE Vulnerability: Patch Fast Before Hackers Do
#
safeline
#
cybersecurity
#
rce
#
vulnerabilities
10
 reactions
Comments
Add Comment
2 min read
An NPM dependency check list
Tracy Gilmore
Tracy Gilmore
Tracy Gilmore
Follow
Sep 21 '25
An NPM dependency check list
#
javascript
#
npm
#
vulnerabilities
#
packages
9
 reactions
Comments
Add Comment
3 min read
Critical File Upload Vulnerability in Yonyou U8 Cloud (IPFxxFileService)
Sharon
Sharon
Sharon
Follow
Sep 19 '25
Critical File Upload Vulnerability in Yonyou U8 Cloud (IPFxxFileService)
#
safeline
#
cybersecurity
#
vulnerabilities
#
beginners
15
 reactions
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account