Forem

# vulnerability

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2021-44026: Roundcube Webmail SQL Injection Vulnerability
Cover image for CVE-2021-44026: Roundcube Webmail SQL Injection Vulnerability

CVE-2021-44026: Roundcube Webmail SQL Injection Vulnerability

Comments
1 min read
CVE-2020-35730: Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability
Cover image for CVE-2020-35730: Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability

CVE-2020-35730: Roundcube Webmail Cross-Site Scripting (XSS) Vulnerability

Comments
2 min read
CVE-2023-20273: Cisco IOS XE Web UI Command Injection Vulnerability
Cover image for CVE-2023-20273: Cisco IOS XE Web UI Command Injection Vulnerability

CVE-2023-20273: Cisco IOS XE Web UI Command Injection Vulnerability

Comments
2 min read
CVE-2023-20198: Cisco IOS XE Web UI Privilege Escalation Vulnerability
Cover image for CVE-2023-20198: Cisco IOS XE Web UI Privilege Escalation Vulnerability

CVE-2023-20198: Cisco IOS XE Web UI Privilege Escalation Vulnerability

Comments
2 min read
CVE-2025-43200: Apple Multiple Products Unspecified Vulnerability
Cover image for CVE-2025-43200: Apple Multiple Products Unspecified Vulnerability

CVE-2025-43200: Apple Multiple Products Unspecified Vulnerability

Comments
1 min read
CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability
Cover image for CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability

CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability

Comments
1 min read
CVE-2023-33538: TP-Link Multiple Routers Command Injection Vulnerability
Cover image for CVE-2023-33538: TP-Link Multiple Routers Command Injection Vulnerability

CVE-2023-33538: TP-Link Multiple Routers Command Injection Vulnerability

Comments
1 min read
CVE-2021-27104: Accellion FTA OS Command Injection Vulnerability
Cover image for CVE-2021-27104: Accellion FTA OS Command Injection Vulnerability

CVE-2021-27104: Accellion FTA OS Command Injection Vulnerability

Comments 1
1 min read
The top 11 web application vulnerability scanners with self-hosting and automation
Cover image for The top 11 web application vulnerability scanners with self-hosting and automation

The top 11 web application vulnerability scanners with self-hosting and automation

2
Comments 2
7 min read
Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

6
Comments
2 min read
10 Free Vulnerability Scanners Every Developer Should Know in 2025
Cover image for 10 Free Vulnerability Scanners Every Developer Should Know in 2025

10 Free Vulnerability Scanners Every Developer Should Know in 2025

Comments
2 min read
Beware of Spring Boot Actuator Endpoint env: A Security Alert
Cover image for Beware of Spring Boot Actuator Endpoint env: A Security Alert

Beware of Spring Boot Actuator Endpoint env: A Security Alert

1
Comments
3 min read
OWASP Broken Access Control Vulnerabilities
Cover image for OWASP Broken Access Control Vulnerabilities

OWASP Broken Access Control Vulnerabilities

Comments
4 min read
Server side (vulnerability scanning)

Server side (vulnerability scanning)

6
Comments 1
10 min read
Patch your servers! It's time of regreSSHion
Cover image for Patch your servers! It's time of regreSSHion

Patch your servers! It's time of regreSSHion

2
Comments
1 min read
buffer Overflow (Application Vulnerability)

buffer Overflow (Application Vulnerability)

4
Comments
2 min read
Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack
Cover image for Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack

Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack

6
Comments 1
3 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

5
Comments
4 min read
Death to the invincible engineer
Cover image for Death to the invincible engineer

Death to the invincible engineer

62
Comments 6
7 min read
Insecure Direct Object Reference (IDOR) vulnerability types
Cover image for Insecure Direct Object Reference (IDOR) vulnerability types

Insecure Direct Object Reference (IDOR) vulnerability types

Comments
3 min read
Rational Shift-Left Security for Developers

Rational Shift-Left Security for Developers

2
Comments 1
7 min read
10 Best Vulnerability Scanner Tools For Penetration Testing

10 Best Vulnerability Scanner Tools For Penetration Testing

2
Comments 1
4 min read
Un Dependabot más inteligente y silencioso
Cover image for Un Dependabot más inteligente y silencioso

Un Dependabot más inteligente y silencioso

2
Comments
1 min read
Top websites for website vulnerability checks online

Top websites for website vulnerability checks online

3
Comments
2 min read
Sekurak MSHP CTF Summary - Part 1
Cover image for Sekurak MSHP CTF Summary - Part 1

Sekurak MSHP CTF Summary - Part 1

2
Comments
3 min read
loading...