Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
Forem
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know
Sam Bishop
Sam Bishop
Sam Bishop
Follow
Jul 11 '25
What Makes a Great Vulnerability Scanner? 8 Features Developers Should Know
#
cybersecurity
#
vulnerabilities
#
appsec
#
developerguide
1
reaction
Comments
1
comment
4 min read
Spring4Shell Vulnerability: What You Need to Know
Redfox Security
Redfox Security
Redfox Security
Follow
Jul 7 '25
Spring4Shell Vulnerability: What You Need to Know
#
security
#
java
#
spring
#
vulnerabilities
5
reactions
Comments
Add Comment
3 min read
Manipulating JavaScript App code in browser: Is it possible?
Hamdan Khan
Hamdan Khan
Hamdan Khan
Follow
Jul 5 '25
Manipulating JavaScript App code in browser: Is it possible?
#
discuss
#
javascript
#
beginners
#
vulnerabilities
2
reactions
Comments
Add Comment
3 min read
Prevent HTTP Response Splitting in Symfony
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Jun 3 '25
Prevent HTTP Response Splitting in Symfony
#
cybersecurity
#
vulnerabilities
#
symfony
#
webdev
2
reactions
Comments
2
comments
3 min read
Zero-Day Exploits in 2025: Detection, Prevention, and Response Strategies
Sennovate
Sennovate
Sennovate
Follow
Jul 2 '25
Zero-Day Exploits in 2025: Detection, Prevention, and Response Strategies
#
cybersecurity
#
vulnerabilities
#
infosec
1
reaction
Comments
Add Comment
3 min read
CVE-2024-38077: Critical RCE in Windows RDL Service
Sharon
Sharon
Sharon
Follow
Jul 2 '25
CVE-2024-38077: Critical RCE in Windows RDL Service
#
webdev
#
cybersecurity
#
vulnerabilities
#
rce
6
reactions
Comments
Add Comment
3 min read
Пентестинг: основы, преимущества и применение
CyberSec Pro
CyberSec Pro
CyberSec Pro
Follow
Jul 1 '25
Пентестинг: основы, преимущества и применение
#
pentest
#
cybersecurity
#
infosec
#
vulnerabilities
1
reaction
Comments
Add Comment
1 min read
Promptfoo vs Deepteam vs PyRIT vs Garak: The Ultimate Red Teaming Showdown for LLMs
Ayush kumar
Ayush kumar
Ayush kumar
Follow
Jul 1 '25
Promptfoo vs Deepteam vs PyRIT vs Garak: The Ultimate Red Teaming Showdown for LLMs
#
opensource
#
llm
#
security
#
vulnerabilities
7
reactions
Comments
Add Comment
10 min read
API Vulnerabilities in Symfony: Real-World Examples
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
May 27 '25
API Vulnerabilities in Symfony: Real-World Examples
#
cybersecurity
#
vulnerabilities
#
symfony
#
webdev
2
reactions
Comments
Add Comment
3 min read
Vulnerability Assessment
Salmankhan
Salmankhan
Salmankhan
Follow
Jun 28 '25
Vulnerability Assessment
#
vulnerabilities
#
security
#
azure
Comments
Add Comment
1 min read
Insecure Deserialization in Symfony: How to Prevent It
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Jun 17 '25
Insecure Deserialization in Symfony: How to Prevent It
#
cybersecurity
#
vulnerabilities
#
symfony
#
webdev
3
reactions
Comments
Add Comment
3 min read
The Essential Guide to Web Security Scanning: Protecting Your Digital Assets
Freedom Coder
Freedom Coder
Freedom Coder
Follow
Jun 27 '25
The Essential Guide to Web Security Scanning: Protecting Your Digital Assets
#
cybersecurity
#
webscanner
#
websecurity
#
vulnerabilities
Comments
Add Comment
2 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
Akuson Daniel
Akuson Daniel
Akuson Daniel
Follow
Jun 25 '25
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
#
cybersecurity
#
vulnerabilities
#
testing
Comments
Add Comment
1 min read
Weak Password Policy in Symfony: Risks & Prevention
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
May 22 '25
Weak Password Policy in Symfony: Risks & Prevention
#
cybersecurity
#
vulnerabilities
#
symfony
#
webdev
2
reactions
Comments
Add Comment
4 min read
CVE-2025-0282: Remote Code Execution in Ivanti Connect Secure VPN
Sharon
Sharon
Sharon
Follow
Jun 25 '25
CVE-2025-0282: Remote Code Execution in Ivanti Connect Secure VPN
#
vulnerabilities
#
cybersecurity
#
websecurity
5
reactions
Comments
Add Comment
2 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a blogging-forward open source social network where we learn from one another
Log in
Create account