Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
When Zero‑Width Isn’t Zero: How I Found and Fixed a Vulnerability
Karol Wrótniak
Karol Wrótniak
Karol Wrótniak
Follow
Jan 28
When Zero‑Width Isn’t Zero: How I Found and Fixed a Vulnerability
#
cybersecurity
#
javascript
#
node
#
vulnerabilities
Comments
Add Comment
4 min read
Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host
Hafiz Shamnad
Hafiz Shamnad
Hafiz Shamnad
Follow
Feb 19
Day 6 — I Built a Profile Picture Upload… and turned My Website into a Malware Host
#
cybersecurity
#
webdev
#
vulnerabilities
#
website
Comments
Add Comment
3 min read
Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain
Rez Moss
Rez Moss
Rez Moss
Follow
Feb 4
Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain
#
security
#
vulnerabilities
#
go
#
programming
5
reactions
Comments
Add Comment
10 min read
Understanding TOCTOU: The Race Condition Hiding in Your Code
Victory Lucky
Victory Lucky
Victory Lucky
Follow
Feb 15
Understanding TOCTOU: The Race Condition Hiding in Your Code
#
webdev
#
vulnerabilities
#
ai
#
programming
5
reactions
Comments
Add Comment
4 min read
Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation
Hafiz Shamnad
Hafiz Shamnad
Hafiz Shamnad
Follow
Feb 20
Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation
#
cybersecurity
#
webdev
#
python
#
vulnerabilities
Comments
Add Comment
6 min read
Building Secure Blockchain Bridges: Common Vulnerabilities and Solutions.
Progress Ochuko Eyaadah
Progress Ochuko Eyaadah
Progress Ochuko Eyaadah
Follow
Jan 28
Building Secure Blockchain Bridges: Common Vulnerabilities and Solutions.
#
blockchain
#
security
#
vulnerabilities
#
bridges
4
reactions
Comments
Add Comment
5 min read
n8n Security Vulnerabilities: A Comprehensive Whitepaper for Developers and Architects
Srinivasan Ragothaman
Srinivasan Ragothaman
Srinivasan Ragothaman
Follow
Feb 6
n8n Security Vulnerabilities: A Comprehensive Whitepaper for Developers and Architects
#
n8n
#
vulnerabilities
#
remotecodeexecution
Comments
Add Comment
10 min read
Vens: Stop Patching Vulnerabilities That Don't Matter to You
Fahed dorgaa
Fahed dorgaa
Fahed dorgaa
Follow
Feb 14
Vens: Stop Patching Vulnerabilities That Don't Matter to You
#
cybersecurity
#
owasp
#
vulnerabilities
#
trivy
Comments
1
comment
2 min read
Is Learning Manual Vulnerability Scanning a Waste of Time in 2026?
Jigar Shah
Jigar Shah
Jigar Shah
Follow
Feb 5
Is Learning Manual Vulnerability Scanning a Waste of Time in 2026?
#
vulnerabilities
#
scannig
#
appsec
Comments
Add Comment
5 min read
How to Integrate Vulnerability Scanning Into DevSecOps Workflows
James Miller
James Miller
James Miller
Follow
Feb 17
How to Integrate Vulnerability Scanning Into DevSecOps Workflows
#
vulnerabilities
#
devops
#
security
Comments
Add Comment
7 min read
CVE-2026-23655 | Microsoft ACI Confidential Containers Information Disclosure Vulnerability
Aakash Rahsi
Aakash Rahsi
Aakash Rahsi
Follow
Feb 11
CVE-2026-23655 | Microsoft ACI Confidential Containers Information Disclosure Vulnerability
#
cve202623655
#
ai
#
cve
#
vulnerabilities
Comments
Add Comment
1 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account