DEV Community

# vulnerabilities

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
AWS Glue vulnerabilities in default packages

AWS Glue vulnerabilities in default packages

2
Comments
8 min read
đź”’Network Security and Threats: Protecting the Digital World

đź”’Network Security and Threats: Protecting the Digital World

1
Comments
2 min read
Automating Container Security: Building Self-Healing Systems with Docker Scout and DevSecOps Best Practices

Automating Container Security: Building Self-Healing Systems with Docker Scout and DevSecOps Best Practices

5
Comments
3 min read
Host Header Injection in Laravel: Risks and Prevention

Host Header Injection in Laravel: Risks and Prevention

5
Comments
3 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

Comments
4 min read
Trivy Vulnerability Scans Adnvanced Filtering

Trivy Vulnerability Scans Adnvanced Filtering

Comments
2 min read
Prevent Directory Traversal in Laravel: Expert Guide

Prevent Directory Traversal in Laravel: Expert Guide

1
Comments
2 min read
🚨High-Severity Laravel Vulnerability (CVE-2024-52301) - Awareness and Action Required

🚨High-Severity Laravel Vulnerability (CVE-2024-52301) - Awareness and Action Required

10
Comments 2
3 min read
Preventing File Inclusion Vulnerabilities in Laravel Applications

Preventing File Inclusion Vulnerabilities in Laravel Applications

2
Comments 1
2 min read
Prevent SSRF in Laravel: Guide & Example Code

Prevent SSRF in Laravel: Guide & Example Code

1
Comments
3 min read
Insecure Direct Object References (IDOR) in Laravel

Insecure Direct Object References (IDOR) in Laravel

Comments
4 min read
Amazon Inspector Deep-Dive : CIS Benchmark, Container image and SBOM

Amazon Inspector Deep-Dive : CIS Benchmark, Container image and SBOM

3
Comments
6 min read
How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code

How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code

11
Comments
6 min read
Hotel Booking Data Breach of Taiwan Tourists

Hotel Booking Data Breach of Taiwan Tourists

10
Comments
3 min read
Automating Vulnerability Detection for Your Assets

Automating Vulnerability Detection for Your Assets

Comments
13 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.