DEV Community

# vulnerability

Discussions about specific security vulnerabilities and CVEs.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Death to the invincible engineer

Death to the invincible engineer

62
Comments 6
7 min read
Large Language Models for One-Day Vulnerability Detection

Large Language Models for One-Day Vulnerability Detection

4
Comments
7 min read
Deep Dive into Zero-Day Exploits: Part 1

Deep Dive into Zero-Day Exploits: Part 1

Comments
9 min read
Regex Gotchas? Localized Repair to the Rescue! by Arvind Sundararajan

Regex Gotchas? Localized Repair to the Rescue! by Arvind Sundararajan

2
Comments 1
2 min read
Reality Bites: Hardening Your AI Against Physical-World Attacks

Reality Bites: Hardening Your AI Against Physical-World Attacks

Comments
2 min read
Silent Sabotage: When Hardware Flaws Poison Medical AI by Arvind Sundararajan

Silent Sabotage: When Hardware Flaws Poison Medical AI by Arvind Sundararajan

Comments
2 min read
Forging GraphQL Bombs, the 2022 version of Zip Bombs

Forging GraphQL Bombs, the 2022 version of Zip Bombs

47
Comments 2
4 min read
Understanding Cross-Site Scripting (XSS)

Understanding Cross-Site Scripting (XSS)

6
Comments 1
4 min read
Blind XPath Injections: The Path Less Travelled

Blind XPath Injections: The Path Less Travelled

22
Comments
5 min read
The Repository That Steals Your API Key: A Story About Environment Overrides in Claude Code

The Repository That Steals Your API Key: A Story About Environment Overrides in Claude Code

Comments
7 min read
Context Pivoting: A New Attack Vector in Multi-Server MCP Deployments

Context Pivoting: A New Attack Vector in Multi-Server MCP Deployments

Comments
4 min read
What a Jar of Buttons Is Teaching Me About Trust

What a Jar of Buttons Is Teaching Me About Trust

10
Comments 2
5 min read
Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

6
Comments
2 min read
Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack

Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack

6
Comments 1
3 min read
OWASP Broken Access Control Vulnerabilities

OWASP Broken Access Control Vulnerabilities

Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.