DEV Community

# vulnerabilities

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Automating SBOM Generation and Vulnerability Analysis

Automating SBOM Generation and Vulnerability Analysis

Comments
4 min read
Critical Vulnerability Alert: Weaver e-Office Remote Code Execution (RCE) – Patch Now

Critical Vulnerability Alert: Weaver e-Office Remote Code Execution (RCE) – Patch Now

6
Comments
2 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Cybersecurity: Scan your hosts, before vulnerabilities cost you millions

Comments
3 min read
OWASP Top Ten 2021 explained with simple Java examples and SAST insights

OWASP Top Ten 2021 explained with simple Java examples and SAST insights

5
Comments
15 min read
Smartbi RCE Vulnerability: Patch Fast Before Hackers Do

Smartbi RCE Vulnerability: Patch Fast Before Hackers Do

10
Comments
2 min read
An NPM dependency check list

An NPM dependency check list

9
Comments
3 min read
Critical File Upload Vulnerability in Yonyou U8 Cloud (IPFxxFileService)

Critical File Upload Vulnerability in Yonyou U8 Cloud (IPFxxFileService)

15
Comments
2 min read
Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch

Comments
3 min read
Review of CWE-843 Type Confusion Vulnerability and Exploit

Review of CWE-843 Type Confusion Vulnerability and Exploit

Comments
6 min read
Critical Risk: Seeyon OA Arbitrary Password Reset Vulnerability

Critical Risk: Seeyon OA Arbitrary Password Reset Vulnerability

6
Comments
2 min read
Cracking the Opus: Red Teaming Anthropic’s Giant with Promptfoo

Cracking the Opus: Red Teaming Anthropic’s Giant with Promptfoo

7
Comments
16 min read
DeepSeek V3.1 Meets Promptfoo: Jailbreaks, Biases & Beyond

DeepSeek V3.1 Meets Promptfoo: Jailbreaks, Biases & Beyond

5
Comments
15 min read
🕵️‍♂️The Hidden Google Drive Flaw Nobody Talks About

🕵️‍♂️The Hidden Google Drive Flaw Nobody Talks About

Comments
2 min read
iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution

iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution

6
Comments
2 min read
From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.