Skip to content
Navigation menu
Search
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Introduction to OWASP
Jahin Justin
Jahin Justin
Jahin Justin
Follow
Oct 25 '23
Introduction to OWASP
#
owasp
#
nullchapter
#
vulnerabilities
#
cybersecurity
8
reactions
Comments
Add Comment
2 min read
KeePass Memory Leakage Vulnerability Analysis - CVE-2023-32784
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Oct 9 '23
KeePass Memory Leakage Vulnerability Analysis - CVE-2023-32784
#
poc
#
cybersecurity
#
infosec
#
vulnerabilities
7
reactions
Comments
Add Comment
4 min read
A Guide to Common Web Application Security Vulnerabilities and Mitigation
M Mainul Hasan
M Mainul Hasan
M Mainul Hasan
Follow
Apr 7
A Guide to Common Web Application Security Vulnerabilities and Mitigation
#
sqlinjection
#
cybersecurity
#
security
#
vulnerabilities
7
reactions
Comments
Add Comment
16 min read
Vulnerable and Outdated Components
Jahin Justin
Jahin Justin
Jahin Justin
Follow
Oct 27 '23
Vulnerable and Outdated Components
#
programming
#
opensource
#
vulnerabilities
#
cybersecurity
7
reactions
Comments
Add Comment
4 min read
Your Daily CVE Reminder 🦸🏻♀️
Sena Yakut
Sena Yakut
Sena Yakut
Follow
for
AWS Community Builders
Oct 14 '23
Your Daily CVE Reminder 🦸🏻♀️
#
aws
#
security
#
devops
#
vulnerabilities
5
reactions
Comments
Add Comment
3 min read
How to resolve vulnerabilities in Front-End Applications
Utkarsh Tiwari
Utkarsh Tiwari
Utkarsh Tiwari
Follow
Mar 3
How to resolve vulnerabilities in Front-End Applications
#
webdev
#
javascript
#
vulnerabilities
#
security
2
reactions
Comments
Add Comment
4 min read
Descubra como encontrar buckets ocultos na nuvem da Amazon S3! 👀🔍
Higor Diego
Higor Diego
Higor Diego
Follow
Oct 28 '23
Descubra como encontrar buckets ocultos na nuvem da Amazon S3! 👀🔍
#
aws
#
security
#
vulnerabilities
#
gobuster
2
reactions
Comments
Add Comment
10 min read
CloudBees Security Insights Overview
Drew Piland
Drew Piland
Drew Piland
Follow
for
CloudBees
Mar 18
CloudBees Security Insights Overview
#
devsecops
#
vulnerabilities
#
insights
2
reactions
Comments
Add Comment
8 min read
Nmap - Network Mapper
Ibrahim S
Ibrahim S
Ibrahim S
Follow
Jan 23
Nmap - Network Mapper
#
ibbus
#
nmap
#
weakness
#
vulnerabilities
1
reaction
Comments
Add Comment
2 min read
Análisis dinámico de aplicaciones web con OWASP ZAP
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Follow
Sep 25 '23
Análisis dinámico de aplicaciones web con OWASP ZAP
#
cybersecurity
#
vulnerabilities
#
spanish
#
testing
1
reaction
Comments
2
comments
9 min read
Jenkins Upgrade from 2.1x to 2.4x
Bhargavi Chiluka
Bhargavi Chiluka
Bhargavi Chiluka
Follow
Feb 20
Jenkins Upgrade from 2.1x to 2.4x
#
jenkins
#
upgrade
#
security
#
vulnerabilities
1
reaction
Comments
Add Comment
4 min read
Hardcoded secret at the heart of the Dell Compellent VMware vulnerability
Dwayne McDaniel
Dwayne McDaniel
Dwayne McDaniel
Follow
for
GitGuardian
Sep 8 '23
Hardcoded secret at the heart of the Dell Compellent VMware vulnerability
#
dell
#
vmware
#
cybersecurity
#
vulnerabilities
1
reaction
Comments
Add Comment
6 min read
A deep dive into zero-day vulnerability alerts with New Relic APM
Harry Kimpel
Harry Kimpel
Harry Kimpel
Follow
for
New Relic
Feb 23
A deep dive into zero-day vulnerability alerts with New Relic APM
#
devsecops
#
observability
#
apm
#
vulnerabilities
1
reaction
Comments
Add Comment
7 min read
Safeguarding Critical Keys
Kelvin Amoaba
Kelvin Amoaba
Kelvin Amoaba
Follow
Aug 9 '23
Safeguarding Critical Keys
#
security
#
programming
#
vulnerabilities
1
reaction
Comments
1
comment
3 min read
Severity HIGH security problem to be announced with curl 8.4.0 on Oct 11
Deepak Rawte
Deepak Rawte
Deepak Rawte
Follow
Oct 7 '23
Severity HIGH security problem to be announced with curl 8.4.0 on Oct 11
#
curl
#
log4j
#
cve
#
vulnerabilities
1
reaction
Comments
Add Comment
1 min read
Common Security Vulnerabilities in the Blockchain World
oluwatobi2001
oluwatobi2001
oluwatobi2001
Follow
Apr 3
Common Security Vulnerabilities in the Blockchain World
#
blockchain
#
security
#
hacking
#
vulnerabilities
1
reaction
Comments
Add Comment
4 min read
How to rust binding for libFuzzer
Ramin Farajpour Cami
Ramin Farajpour Cami
Ramin Farajpour Cami
Follow
Nov 3 '23
How to rust binding for libFuzzer
#
fuzzing
#
fuzz
#
rust
#
vulnerabilities
1
reaction
Comments
Add Comment
5 min read
Identificando vulnerabilidades en código fuente a través de análisis estático con SonarQube
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Follow
Sep 13 '23
Identificando vulnerabilidades en código fuente a través de análisis estático con SonarQube
#
cybersecurity
#
vulnerabilities
#
beginners
#
spanish
1
reaction
Comments
Add Comment
9 min read
Detect Bugs & Vulnerabilities and get instant feedback. Lumen - Sonarcloud Integration
Iqbal Syahrul Siddiq
Iqbal Syahrul Siddiq
Iqbal Syahrul Siddiq
Follow
Aug 25 '23
Detect Bugs & Vulnerabilities and get instant feedback. Lumen - Sonarcloud Integration
#
laravel
#
sonarcloud
#
vulnerabilities
#
security
1
reaction
Comments
Add Comment
6 min read
Como corrigir vulnerabilidades de software automaticamente com o Veracode Fix
Lucas Santos Ferreira
Lucas Santos Ferreira
Lucas Santos Ferreira
Follow
for
M3Corp
Nov 30 '23
Como corrigir vulnerabilidades de software automaticamente com o Veracode Fix
#
veracode
#
fix
#
vulnerabilities
#
cybersecurity
1
reaction
Comments
Add Comment
2 min read
Symbolic Execution Fuzzing With KLEE
Ramin Farajpour Cami
Ramin Farajpour Cami
Ramin Farajpour Cami
Follow
Oct 10 '23
Symbolic Execution Fuzzing With KLEE
#
fuzzing
#
klee
#
security
#
vulnerabilities
1
reaction
Comments
Add Comment
2 min read
What’s the Deal with CVEs?
Jan Schulte
Jan Schulte
Jan Schulte
Follow
for
Outshift By Cisco
Dec 22 '23
What’s the Deal with CVEs?
#
security
#
devsecops
#
vulnerabilities
1
reaction
Comments
Add Comment
6 min read
Solving Pickle Rick: An Online CTF Challenge on TryHackMe
Sabid Mahmud
Sabid Mahmud
Sabid Mahmud
Follow
Feb 25
Solving Pickle Rick: An Online CTF Challenge on TryHackMe
#
cybersecurity
#
vulnerabilities
#
hacking
Comments
Add Comment
6 min read
Training data poisoning to get what you want in LLMs, A Question
Ali Faraji
Ali Faraji
Ali Faraji
Follow
Mar 2
Training data poisoning to get what you want in LLMs, A Question
#
llm
#
security
#
machinelearning
#
vulnerabilities
Comments
Add Comment
2 min read
The Summary Of Spring Security Authorization Bypass on Java
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Apr 27 '23
The Summary Of Spring Security Authorization Bypass on Java
#
cybersecurity
#
vulnerabilities
#
infosec
#
springboot
Comments
Add Comment
12 min read
Level up your security skillset with New Relic
Harry Kimpel
Harry Kimpel
Harry Kimpel
Follow
for
New Relic
Jun 22 '23
Level up your security skillset with New Relic
#
devsecops
#
applicationsecurity
#
vulnerabilities
#
observability
Comments
Add Comment
6 min read
Zero-day: Server Message Block (SMB) Server in Linux Kernel 5.15 Has a Critical Vulnerability!
SecPod
SecPod
SecPod
Follow
Mar 19
Zero-day: Server Message Block (SMB) Server in Linux Kernel 5.15 Has a Critical Vulnerability!
#
cybersecurity
#
vulnerabilities
#
patch
#
attacksurface
Comments
Add Comment
2 min read
Alert! GitHub Repositories Under Attack: How to Protect Your Code
Gaurav Chaudhary
Gaurav Chaudhary
Gaurav Chaudhary
Follow
Mar 24
Alert! GitHub Repositories Under Attack: How to Protect Your Code
#
github
#
vulnerabilities
#
attack
#
programming
Comments
Add Comment
2 min read
Interesting Software Vulns
Rake
Rake
Rake
Follow
Aug 31 '23
Interesting Software Vulns
#
vulnerabilities
#
infosec
#
appsec
#
cybersecurity
Comments
Add Comment
3 min read
Parte 2 - Descubrimiento de vulnerabilidades en redes IP
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Follow
Sep 9 '23
Parte 2 - Descubrimiento de vulnerabilidades en redes IP
#
spanish
#
cybersecurity
#
vulnerabilities
#
beginners
Comments
Add Comment
16 min read
Fun Infosec Writeups from GH
Rake
Rake
Rake
Follow
Sep 1 '23
Fun Infosec Writeups from GH
#
cybersecurity
#
informationsecurity
#
vulnerabilities
#
appsec
Comments
Add Comment
3 min read
😱 Most Common Vulnerabilities in Solidity: In Deep Part 1
Chandan | Web3
Chandan | Web3
Chandan | Web3
Follow
for
BuildBear
Sep 4 '23
😱 Most Common Vulnerabilities in Solidity: In Deep Part 1
#
solidity
#
vulnerabilities
#
tutorial
Comments
Add Comment
1 min read
What is Cloud Security Posture Management (CSPM)?
CloudDefense.AI
CloudDefense.AI
CloudDefense.AI
Follow
Sep 8 '23
What is Cloud Security Posture Management (CSPM)?
#
cspm
#
cloud
#
vulnerabilities
#
infosec
Comments
Add Comment
2 min read
Beyond CVSS: Project Context, Exploitability, and Reachability of Vulnerabilities - Part 2
Robin Birney
Robin Birney
Robin Birney
Follow
for
Safety Cybersecurity
Sep 25 '23
Beyond CVSS: Project Context, Exploitability, and Reachability of Vulnerabilities - Part 2
#
python
#
vulnerabilities
#
security
#
devops
Comments
Add Comment
4 min read
What do I have to offer?
Christian Stolev
Christian Stolev
Christian Stolev
Follow
Oct 9 '23
What do I have to offer?
#
reverseengineering
#
vulnerabilities
Comments
Add Comment
1 min read
Parte 1 - Configurando una red básica para aprender sobre gestión de vulnerabilidades
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Dilver Huertas Guerrero
Follow
Aug 27 '23
Parte 1 - Configurando una red básica para aprender sobre gestión de vulnerabilidades
#
spanish
#
cybersecurity
#
vulnerabilities
#
beginners
Comments
Add Comment
10 min read
How StoryChief’s CTO uses Aikido Security to sleep better at night
Felix Garriau
Felix Garriau
Felix Garriau
Follow
for
Aikido Security
Oct 24 '23
How StoryChief’s CTO uses Aikido Security to sleep better at night
#
security
#
cybersecurity
#
vulnerabilities
Comments
Add Comment
4 min read
Bypassing PHP WAF to Achieve Remote Code Execution In-Depth Analysis
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Jul 21 '23
Bypassing PHP WAF to Achieve Remote Code Execution In-Depth Analysis
#
php
#
cybersecurity
#
infosec
#
vulnerabilities
Comments
Add Comment
5 min read
Unveiling the Secrets of XSS Bypass: Harnessing JavaScript Symbols for Code Execution
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Nov 5 '23
Unveiling the Secrets of XSS Bypass: Harnessing JavaScript Symbols for Code Execution
#
xss
#
cybersecurity
#
infosec
#
vulnerabilities
Comments
Add Comment
3 min read
[Possible Fix] Inflight reported as a vulnerability in react project (Veracode SCA)
Mark Benjamin
Mark Benjamin
Mark Benjamin
Follow
Nov 10 '23
[Possible Fix] Inflight reported as a vulnerability in react project (Veracode SCA)
#
react
#
veracode
#
security
#
vulnerabilities
Comments
Add Comment
1 min read
Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Nov 23 '23
Confluence Vulnerability (CVE-2023-22515): A Deep Dive into Atlassian Bamboo's Chain Security Landscape
#
cybersecurity
#
vulnerabilities
#
infosec
#
security
Comments
Add Comment
8 min read
ERC-X Miner Contract Exploit on ERC-404 Standard: our Expert Analysis
Crypton Studio
Crypton Studio
Crypton Studio
Follow
Feb 16
ERC-X Miner Contract Exploit on ERC-404 Standard: our Expert Analysis
#
smartcontract
#
security
#
vulnerabilities
#
blockchain
Comments
Add Comment
4 min read
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Feb 21
Analysis of Glibc privilege escalation vulnerability "Looney Tunables" (CVE-2023-4911)
#
cybersecurity
#
infosec
#
vulnerabilities
#
security
Comments
Add Comment
8 min read
Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution Vulnerability
TutorialBoy
TutorialBoy
TutorialBoy
Follow
Feb 24
Analyzing the Google Chrome V8 CVE-2024-0517 Out-of-Bounds Code Execution Vulnerability
#
cybersecurity
#
infosec
#
vulnerabilities
#
cve
Comments
Add Comment
39 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account