Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Critical Risk: Seeyon OA Arbitrary Password Reset Vulnerability
Sharon
Sharon
Sharon
Follow
Sep 2 '25
Critical Risk: Seeyon OA Arbitrary Password Reset Vulnerability
#
webdev
#
vulnerabilities
#
cybersecurity
#
safeline
6
 reactions
Comments
Add Comment
2 min read
Cracking the Opus: Red Teaming Anthropic’s Giant with Promptfoo
Ayush kumar
Ayush kumar
Ayush kumar
Follow
Sep 1 '25
Cracking the Opus: Red Teaming Anthropic’s Giant with Promptfoo
#
vulnerabilities
#
security
#
llm
#
opensource
7
 reactions
Comments
Add Comment
16 min read
DeepSeek V3.1 Meets Promptfoo: Jailbreaks, Biases & Beyond
Ayush kumar
Ayush kumar
Ayush kumar
Follow
Aug 31 '25
DeepSeek V3.1 Meets Promptfoo: Jailbreaks, Biases & Beyond
#
deepseek
#
llm
#
security
#
vulnerabilities
5
 reactions
Comments
Add Comment
15 min read
🕵️‍♂️The Hidden Google Drive Flaw Nobody Talks About
Abdelghani Alhijawi
Abdelghani Alhijawi
Abdelghani Alhijawi
Follow
Aug 26 '25
🕵️‍♂️The Hidden Google Drive Flaw Nobody Talks About
#
vulnerabilities
#
cybersecurity
#
google
Comments
Add Comment
2 min read
iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution
Sharon
Sharon
Sharon
Follow
Aug 6 '25
iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution
#
cybersecurity
#
rce
#
vulnerabilities
#
safeline
6
 reactions
Comments
Add Comment
2 min read
Citrix NetScaler ADC/Gateway Session Token Leak — Patch Now or Risk a Breach
Sharon
Sharon
Sharon
Follow
Aug 15 '25
Citrix NetScaler ADC/Gateway Session Token Leak — Patch Now or Risk a Breach
#
cybersecurity
#
vulnerabilities
#
webdev
#
safeline
6
 reactions
Comments
Add Comment
2 min read
From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data
Samuel Adeduntan
Samuel Adeduntan
Samuel Adeduntan
Follow
Aug 21 '25
From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data
#
vulnerabilities
#
databreach
#
pentest
#
webappsecurity
Comments
Add Comment
5 min read
Critical SQL Injection in Kingsoft Endpoint Security V9 — Patch Now
Sharon
Sharon
Sharon
Follow
Aug 21 '25
Critical SQL Injection in Kingsoft Endpoint Security V9 — Patch Now
#
cybersecurity
#
safeline
#
waf
#
vulnerabilities
6
 reactions
Comments
Add Comment
2 min read
The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management
Team Spektion
Team Spektion
Team Spektion
Follow
for
Spektion
Aug 20 '25
The Behavioral Intelligence Revolution: How Runtime Data Is Reshaping Threat Management
#
cybersecurity
#
security
#
vulnerabilities
1
 reaction
Comments
Add Comment
6 min read
Remote Code Execution Flaw Found in Yonyou U8 Cloud (All Versions Affected)
Sharon
Sharon
Sharon
Follow
Jul 31 '25
Remote Code Execution Flaw Found in Yonyou U8 Cloud (All Versions Affected)
#
cybersecurity
#
rce
#
vulnerabilities
#
webdev
6
 reactions
Comments
Add Comment
2 min read
Don’t Panic Yet: Breaking Down the Latest Apache Solr RCE Vulnerability
Sharon
Sharon
Sharon
Follow
Aug 20 '25
Don’t Panic Yet: Breaking Down the Latest Apache Solr RCE Vulnerability
#
rce
#
vulnerabilities
#
cybersecurity
#
safeline
6
 reactions
Comments
Add Comment
3 min read
Smartbi RCE Vulnerability — Patch Now Before Attackers Do
Sharon
Sharon
Sharon
Follow
Aug 19 '25
Smartbi RCE Vulnerability — Patch Now Before Attackers Do
#
cybersecurity
#
waf
#
safeline
#
vulnerabilities
7
 reactions
Comments
Add Comment
2 min read
CVE-2023-50164: New Struts2 Upload Vulnerability Explained
Sharon
Sharon
Sharon
Follow
Jul 28 '25
CVE-2023-50164: New Struts2 Upload Vulnerability Explained
#
safeline
#
vulnerabilities
#
waf
#
cybersecurity
6
 reactions
Comments
Add Comment
3 min read
How to Update and Fix Vulnerabilities in Global Packages
Ishfaq Maknoo
Ishfaq Maknoo
Ishfaq Maknoo
Follow
Jul 12 '25
How to Update and Fix Vulnerabilities in Global Packages
#
webdev
#
vulnerabilities
#
npm
#
javascript
Comments
Add Comment
2 min read
Critical GeoServer RCE Vulnerability (CVE-2024-36401) — No Auth Needed
Sharon
Sharon
Sharon
Follow
Jul 10 '25
Critical GeoServer RCE Vulnerability (CVE-2024-36401) — No Auth Needed
#
rce
#
vulnerabilities
#
cybersecurity
6
 reactions
Comments
Add Comment
3 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account