Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
XXE Injection in React.js — What It Is and How to Prevent It
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Sep 11 '25
XXE Injection in React.js — What It Is and How to Prevent It
#
cybersecurity
#
vulnerabilities
#
react
#
webdev
3
 reactions
Comments
Add Comment
3 min read
Critical SQL Injection Vulnerability in Weaver e-cology OA: What You Need to Know
Sharon
Sharon
Sharon
Follow
Sep 11 '25
Critical SQL Injection Vulnerability in Weaver e-cology OA: What You Need to Know
#
cybersecurity
#
safeline
#
waf
#
vulnerabilities
10
 reactions
Comments
Add Comment
2 min read
Security Alert: XXE Vulnerability in Weaver e-cology OA
Sharon
Sharon
Sharon
Follow
Sep 10 '25
Security Alert: XXE Vulnerability in Weaver e-cology OA
#
vulnerabilities
#
safeline
#
waf
#
cybersecurity
6
 reactions
Comments
Add Comment
2 min read
Securing Frontend Apps from Lodash Issues
Sudhanshu Chaubey
Sudhanshu Chaubey
Sudhanshu Chaubey
Follow
Oct 11 '25
Securing Frontend Apps from Lodash Issues
#
lodash
#
security
#
vulnerabilities
#
typescript
5
 reactions
Comments
Add Comment
3 min read
An NPM dependency check list
Tracy Gilmore
Tracy Gilmore
Tracy Gilmore
Follow
Sep 21 '25
An NPM dependency check list
#
javascript
#
npm
#
vulnerabilities
#
packages
9
 reactions
Comments
Add Comment
3 min read
Patch Management vs Vulnerability Management: Why the Difference Matters
Team Spektion
Team Spektion
Team Spektion
Follow
for
Spektion
Sep 3 '25
Patch Management vs Vulnerability Management: Why the Difference Matters
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
1
 reaction
Comments
Add Comment
5 min read
Openfire Admin Console Auth Bypass (CVE-2023-32315) — From Path Traversal to RCE
Sharon
Sharon
Sharon
Follow
Sep 17 '25
Openfire Admin Console Auth Bypass (CVE-2023-32315) — From Path Traversal to RCE
#
rce
#
safeline
#
cybersecurity
#
vulnerabilities
6
 reactions
Comments
Add Comment
2 min read
RCE Risk in Yonyou U8Cloud: ServiceDispatcher Deserialization Vulnerability
Sharon
Sharon
Sharon
Follow
Sep 1 '25
RCE Risk in Yonyou U8Cloud: ServiceDispatcher Deserialization Vulnerability
#
rce
#
vulnerabilities
#
cybersecurity
#
safeline
6
 reactions
Comments
Add Comment
2 min read
How to Allow Nextcloud Backup Files with SafeLine WAF
Sharon
Sharon
Sharon
Follow
Sep 1 '25
How to Allow Nextcloud Backup Files with SafeLine WAF
#
safeline
#
vulnerabilities
#
waf
#
beginners
7
 reactions
Comments
Add Comment
3 min read
Smartbi Access Bypass Vulnerability Leads to Admin Takeover
Sharon
Sharon
Sharon
Follow
Sep 3 '25
Smartbi Access Bypass Vulnerability Leads to Admin Takeover
#
cybersecurity
#
vulnerabilities
#
safeline
#
waf
6
 reactions
Comments
Add Comment
2 min read
CVE-2023-42442: JumpServer Session Replay Leak Could Expose Sensitive Ops Data
Sharon
Sharon
Sharon
Follow
Aug 29 '25
CVE-2023-42442: JumpServer Session Replay Leak Could Expose Sensitive Ops Data
#
cybersecurity
#
webdev
#
beginners
#
vulnerabilities
6
 reactions
Comments
Add Comment
2 min read
Dealing With Dependency Vulnerabilities
Buffolander
Buffolander
Buffolander
Follow
Aug 31 '25
Dealing With Dependency Vulnerabilities
#
infosec
#
vulnerabilities
#
node
Comments
Add Comment
4 min read
CVE Alert: SQL Injection in Yonyou GRP-U8 – Patch Now
Sharon
Sharon
Sharon
Follow
Aug 28 '25
CVE Alert: SQL Injection in Yonyou GRP-U8 – Patch Now
#
safeline
#
cybersecurity
#
webdev
#
vulnerabilities
6
 reactions
Comments
Add Comment
2 min read
KEV: V8 CVE-2025-10585 Hits Electron Apps
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Sep 30 '25
KEV: V8 CVE-2025-10585 Hits Electron Apps
#
cve
#
cybersecurity
#
vulnerabilities
#
devbugsmash
6
 reactions
Comments
Add Comment
7 min read
Automating SBOM Generation and Vulnerability Analysis
uknowWho
uknowWho
uknowWho
Follow
Sep 30 '25
Automating SBOM Generation and Vulnerability Analysis
#
vulnerabilities
#
security
#
compliance
#
rust
Comments
Add Comment
4 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account