Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
VSCode Extension for finding Vulnerabilities and Outdated Dependencies.
Sunil Kumar
Sunil Kumar
Sunil Kumar
Follow
Sep 15 '24
VSCode Extension for finding Vulnerabilities and Outdated Dependencies.
#
vscode
#
extensions
#
auditing
#
vulnerabilities
2
 reactions
Comments
Add Comment
1 min read
A Critical Fix for a 5-Year Old Vulnerability through Docker's Security Patch
Dr. Vamsi Mohan Vandrangi
Dr. Vamsi Mohan Vandrangi
Dr. Vamsi Mohan Vandrangi
Follow
Sep 12 '24
A Critical Fix for a 5-Year Old Vulnerability through Docker's Security Patch
#
vulnerabilities
#
docker
#
security
#
containers
Comments
Add Comment
2 min read
Web Application Penetration Testing: An In-Depth Guide
Salman
Salman
Salman
Follow
Aug 19 '24
Web Application Penetration Testing: An In-Depth Guide
#
cybersecurity
#
linux
#
vulnerabilities
#
beginners
Comments
Add Comment
2 min read
Top Security Flaws hiding in your code right now - and how to fix them
Jonathan Vila
Jonathan Vila
Jonathan Vila
Follow
Aug 28 '24
Top Security Flaws hiding in your code right now - and how to fix them
#
security
#
cleancode
#
vulnerabilities
#
java
1
 reaction
Comments
2
 comments
8 min read
Scanning AWS S3 Buckets for Security Vulnerabilities
Ibrahim Salami
Ibrahim Salami
Ibrahim Salami
Follow
for
Aviator
Aug 27 '24
Scanning AWS S3 Buckets for Security Vulnerabilities
#
aws
#
vulnerabilities
#
s3
#
security
3
 reactions
Comments
Add Comment
12 min read
Implementation of Missing Security Header Vulnerability in Apache (Part 1)
Rahul Sarma
Rahul Sarma
Rahul Sarma
Follow
Jul 23 '24
Implementation of Missing Security Header Vulnerability in Apache (Part 1)
#
webdev
#
vulnerabilities
#
apache
Comments
Add Comment
2 min read
Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities
Wallace Freitas
Wallace Freitas
Wallace Freitas
Follow
Aug 2 '24
Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities
#
programming
#
security
#
vulnerabilities
Comments
Add Comment
4 min read
The Data Security Duo: Data Encryption and Vulnerability Scans
Lulu Cheng
Lulu Cheng
Lulu Cheng
Follow
for
jarrid.xyz
Jul 28 '24
The Data Security Duo: Data Encryption and Vulnerability Scans
#
security
#
data
#
encryption
#
vulnerabilities
1
 reaction
Comments
Add Comment
5 min read
Securing the AWS Infrastructure
Hemalatha Ramanujam
Hemalatha Ramanujam
Hemalatha Ramanujam
Follow
Jul 14 '24
Securing the AWS Infrastructure
#
aws
#
security
#
vulnerabilities
#
vpc
2
 reactions
Comments
Add Comment
4 min read
Implementation of Missing Security Header Vulnerability in Apache (Part 2)
Rahul Sarma
Rahul Sarma
Rahul Sarma
Follow
Jul 24 '24
Implementation of Missing Security Header Vulnerability in Apache (Part 2)
#
webdev
#
vulnerabilities
#
apache
Comments
Add Comment
3 min read
API Testing: A Journey into Reconnaissance and Vulnerability Identification using BurpSuite
FFFF:0000h
FFFF:0000h
FFFF:0000h
Follow
Jun 19 '24
API Testing: A Journey into Reconnaissance and Vulnerability Identification using BurpSuite
#
cybersecurity
#
webdev
#
vulnerabilities
#
api
1
 reaction
Comments
Add Comment
5 min read
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices
Marko Meic
Marko Meic
Marko Meic
Follow
Jun 11 '24
Detailed Internet Security Analysis: Common Vulnerabilities and Best Practices
#
sec
#
vulnerabilities
#
owasp
#
webdev
Comments
Add Comment
7 min read
Securing the Cloud Frontier: Generative AI for Vulnerability Hunting
Public_Cloud
Public_Cloud
Public_Cloud
Follow
Jul 12 '24
Securing the Cloud Frontier: Generative AI for Vulnerability Hunting
#
genai
#
cloudsecurity
#
cloudcomputing
#
vulnerabilities
1
 reaction
Comments
Add Comment
4 min read
buffer Overflow (Application Vulnerability)
BEIDI DINA SAMUEL
BEIDI DINA SAMUEL
BEIDI DINA SAMUEL
Follow
Jun 24 '24
buffer Overflow (Application Vulnerability)
#
bufferoverflo
#
vulnerabilities
#
vulnerability
4
 reactions
Comments
Add Comment
2 min read
Path Traversal: The Hidden Threat to Your Data
FFFF:0000h
FFFF:0000h
FFFF:0000h
Follow
Jun 15 '24
Path Traversal: The Hidden Threat to Your Data
#
cybersecurity
#
webdev
#
vulnerabilities
#
learning
2
 reactions
Comments
Add Comment
6 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account