DEV Community

# vulnerability

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
CVE-2025-43200: Apple Multiple Products Unspecified Vulnerability

CVE-2025-43200: Apple Multiple Products Unspecified Vulnerability

Comments
1 min read
CVE-2023-33538: TP-Link Multiple Routers Command Injection Vulnerability

CVE-2023-33538: TP-Link Multiple Routers Command Injection Vulnerability

Comments
1 min read
CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability

CVE-2023-0386: Linux Kernel Improper Ownership Management Vulnerability

Comments
1 min read
CVE-2021-27104: Accellion FTA OS Command Injection Vulnerability

CVE-2021-27104: Accellion FTA OS Command Injection Vulnerability

Comments 1
1 min read
The top 11 web application vulnerability scanners with self-hosting and automation

The top 11 web application vulnerability scanners with self-hosting and automation

1
Comments 2
7 min read
10 Free Vulnerability Scanners Every Developer Should Know in 2025

10 Free Vulnerability Scanners Every Developer Should Know in 2025

Comments
2 min read
Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

6
Comments
2 min read
Beware of Spring Boot Actuator Endpoint env: A Security Alert

Beware of Spring Boot Actuator Endpoint env: A Security Alert

1
Comments
3 min read
OWASP Broken Access Control Vulnerabilities

OWASP Broken Access Control Vulnerabilities

Comments
4 min read
Server side (vulnerability scanning)

Server side (vulnerability scanning)

6
Comments 1
10 min read
Patch your servers! It's time of regreSSHion

Patch your servers! It's time of regreSSHion

2
Comments
1 min read
buffer Overflow (Application Vulnerability)

buffer Overflow (Application Vulnerability)

4
Comments
3 min read
Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack

Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack

6
Comments 1
3 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

5
Comments
4 min read
Death to the invincible engineer

Death to the invincible engineer

62
Comments 6
7 min read
Insecure Direct Object Reference (IDOR) vulnerability types

Insecure Direct Object Reference (IDOR) vulnerability types

Comments
3 min read
Rational Shift-Left Security for Developers

Rational Shift-Left Security for Developers

2
Comments 1
7 min read
10 Best Vulnerability Scanner Tools For Penetration Testing

10 Best Vulnerability Scanner Tools For Penetration Testing

2
Comments 1
4 min read
Un Dependabot más inteligente y silencioso

Un Dependabot más inteligente y silencioso

2
Comments
1 min read
Top websites for website vulnerability checks online

Top websites for website vulnerability checks online

3
Comments
2 min read
Sekurak MSHP CTF Summary - Part 1

Sekurak MSHP CTF Summary - Part 1

2
Comments
3 min read
How I found an S3 vulnerability in a $85 million funded startup and reported it ethically

How I found an S3 vulnerability in a $85 million funded startup and reported it ethically

1
Comments
4 min read
Forging GraphQL Bombs, the 2022 version of Zip Bombs

Forging GraphQL Bombs, the 2022 version of Zip Bombs

47
Comments 2
4 min read
Reconmap 1.1.0 release notes

Reconmap 1.1.0 release notes

5
Comments
2 min read
Finding a Stack Buffer Overflow

Finding a Stack Buffer Overflow

5
Comments
7 min read
loading...