Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Automating SBOM Generation and Vulnerability Analysis
uknowWho
uknowWho
uknowWho
Follow
Sep 30 '25
Automating SBOM Generation and Vulnerability Analysis
#
vulnerabilities
#
security
#
compliance
#
rust
Comments
Add Comment
4 min read
Critical Vulnerability Alert: Weaver e-Office Remote Code Execution (RCE) – Patch Now
Sharon
Sharon
Sharon
Follow
Aug 27 '25
Critical Vulnerability Alert: Weaver e-Office Remote Code Execution (RCE) – Patch Now
#
rce
#
cybersecurity
#
vulnerabilities
#
beginners
6
 reactions
Comments
Add Comment
2 min read
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
Dogan
Dogan
Dogan
Follow
Sep 24 '25
Cybersecurity: Scan your hosts, before vulnerabilities cost you millions
#
cybersecurity
#
infosec
#
vulnerabilities
#
security
Comments
Add Comment
3 min read
OWASP Top Ten 2021 explained with simple Java examples and SAST insights
Unicorn Developer
Unicorn Developer
Unicorn Developer
Follow
Sep 23 '25
OWASP Top Ten 2021 explained with simple Java examples and SAST insights
#
owasp
#
topten
#
java
#
vulnerabilities
5
 reactions
Comments
Add Comment
15 min read
Smartbi RCE Vulnerability: Patch Fast Before Hackers Do
Sharon
Sharon
Sharon
Follow
Sep 12 '25
Smartbi RCE Vulnerability: Patch Fast Before Hackers Do
#
safeline
#
cybersecurity
#
rce
#
vulnerabilities
10
 reactions
Comments
Add Comment
2 min read
An NPM dependency check list
Tracy Gilmore
Tracy Gilmore
Tracy Gilmore
Follow
Sep 21 '25
An NPM dependency check list
#
javascript
#
npm
#
vulnerabilities
#
packages
9
 reactions
Comments
Add Comment
3 min read
Critical File Upload Vulnerability in Yonyou U8 Cloud (IPFxxFileService)
Sharon
Sharon
Sharon
Follow
Sep 19 '25
Critical File Upload Vulnerability in Yonyou U8 Cloud (IPFxxFileService)
#
safeline
#
cybersecurity
#
vulnerabilities
#
beginners
15
 reactions
Comments
Add Comment
2 min read
Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch
Ajeet Singh Raina
Ajeet Singh Raina
Ajeet Singh Raina
Follow
Sep 6 '25
Docker Hardened Images for Python: How I Eliminated 152 Vulnerabilities in One Simple Switch
#
security
#
docker
#
vulnerabilities
#
containers
Comments
Add Comment
3 min read
Review of CWE-843 Type Confusion Vulnerability and Exploit
Fatih Küçükkarakurt
Fatih Küçükkarakurt
Fatih Küçükkarakurt
Follow
Aug 1 '25
Review of CWE-843 Type Confusion Vulnerability and Exploit
#
cybersecurity
#
security
#
c
#
vulnerabilities
Comments
Add Comment
6 min read
Critical Risk: Seeyon OA Arbitrary Password Reset Vulnerability
Sharon
Sharon
Sharon
Follow
Sep 2 '25
Critical Risk: Seeyon OA Arbitrary Password Reset Vulnerability
#
webdev
#
vulnerabilities
#
cybersecurity
#
safeline
6
 reactions
Comments
Add Comment
2 min read
Cracking the Opus: Red Teaming Anthropic’s Giant with Promptfoo
Ayush kumar
Ayush kumar
Ayush kumar
Follow
Sep 1 '25
Cracking the Opus: Red Teaming Anthropic’s Giant with Promptfoo
#
vulnerabilities
#
security
#
llm
#
opensource
7
 reactions
Comments
Add Comment
16 min read
DeepSeek V3.1 Meets Promptfoo: Jailbreaks, Biases & Beyond
Ayush kumar
Ayush kumar
Ayush kumar
Follow
Aug 31 '25
DeepSeek V3.1 Meets Promptfoo: Jailbreaks, Biases & Beyond
#
deepseek
#
llm
#
security
#
vulnerabilities
5
 reactions
Comments
Add Comment
15 min read
🕵️‍♂️The Hidden Google Drive Flaw Nobody Talks About
Abdelghani Alhijawi
Abdelghani Alhijawi
Abdelghani Alhijawi
Follow
Aug 26 '25
🕵️‍♂️The Hidden Google Drive Flaw Nobody Talks About
#
vulnerabilities
#
cybersecurity
#
google
Comments
Add Comment
2 min read
iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution
Sharon
Sharon
Sharon
Follow
Aug 6 '25
iDocView RCE Vulnerability: How a Simple URL Leads to Remote Code Execution
#
cybersecurity
#
rce
#
vulnerabilities
#
safeline
6
 reactions
Comments
Add Comment
2 min read
From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data
Samuel Adeduntan
Samuel Adeduntan
Samuel Adeduntan
Follow
Aug 21 '25
From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data
#
vulnerabilities
#
databreach
#
pentest
#
webappsecurity
Comments
Add Comment
5 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account