DEV Community

# opensourcesecurity

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Join a Webinar on OSS

Join a Webinar on OSS

Comments
1 min read
Ultralytics AI Pwn Request Supply Chain Attack

Ultralytics AI Pwn Request Supply Chain Attack

Comments
7 min read
Understanding command injection vulnerabilities in Go

Understanding command injection vulnerabilities in Go

13
Comments 2
8 min read
The mysterious supply chain concern of string-width-cjs npm package

The mysterious supply chain concern of string-width-cjs npm package

Comments
7 min read
If you don’t know about HTTP Archive’s Web Almanac yet, you should!

If you don’t know about HTTP Archive’s Web Almanac yet, you should!

1
Comments
3 min read
The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant

The persistent threat: Why major vulnerabilities like Log4Shell and Spring4Shell remain significant

Comments
4 min read
Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System

Zero-day RCE vulnerability found in CUPS - Common UNIX Printing System

15
Comments
5 min read
Abusing Ubuntu 24.04 features for root privilege escalation

Abusing Ubuntu 24.04 features for root privilege escalation

2
Comments
24 min read
Vulnerabilities in NodeJS C/C++ add-on extensions

Vulnerabilities in NodeJS C/C++ add-on extensions

1
Comments
12 min read
Polyfill supply chain attack embeds malware in JavaScript CDN assets

Polyfill supply chain attack embeds malware in JavaScript CDN assets

213
Comments 6
5 min read
How to secure a REST API?

How to secure a REST API?

2
Comments
11 min read
Preventing broken access control in express Node.js applications

Preventing broken access control in express Node.js applications

5
Comments
12 min read
How to secure Python Flask applications

How to secure Python Flask applications

27
Comments
17 min read
How to install Java on macOS

How to install Java on macOS

1
Comments
12 min read
Symmetric vs. asymmetric encryption: Practical Python examples

Symmetric vs. asymmetric encryption: Practical Python examples

3
Comments
16 min read
The ultimate guide to creating a secure Python package

The ultimate guide to creating a secure Python package

17
Comments 3
15 min read
Building an npm package compatible with ESM and CJS in 2024

Building an npm package compatible with ESM and CJS in 2024

31
Comments 4
4 min read
Exploiting HTTP/2 CONTINUATION frames for DoS attacks

Exploiting HTTP/2 CONTINUATION frames for DoS attacks

2
Comments
4 min read
GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok

GitHub “besieged” by malware repositories and repo confusion: Why you'll be ok

4
Comments 1
8 min read
Preventing server-side request forgery in Node.js applications

Preventing server-side request forgery in Node.js applications

6
Comments
8 min read
10 GitHub Security Best Practices

10 GitHub Security Best Practices

3
Comments
14 min read
7 tips to become a successful bug bounty hunter

7 tips to become a successful bug bounty hunter

18
Comments 1
5 min read
Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195)

Understanding and mitigating the Jinja2 XSS vulnerability (CVE-2024-22195)

6
Comments
5 min read
Handling security vulnerabilities in Spring Boot

Handling security vulnerabilities in Spring Boot

4
Comments 2
6 min read
Dependency injection in Python

Dependency injection in Python

4
Comments
12 min read
loading...