Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
vulnerability
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Beware of Spring Boot Actuator Endpoint env: A Security Alert
Igor Venturelli
Igor Venturelli
Igor Venturelli
Follow
Oct 30 '24
Beware of Spring Boot Actuator Endpoint env: A Security Alert
#
security
#
spring
#
sactuator
#
vulnerability
1
reaction
Comments
Add Comment
3 min read
OWASP Broken Access Control Vulnerabilities
Sajidur Rahman Shajib
Sajidur Rahman Shajib
Sajidur Rahman Shajib
Follow
Oct 17 '24
OWASP Broken Access Control Vulnerabilities
#
owasp
#
broken
#
access
#
vulnerability
Comments
Add Comment
4 min read
Server side (vulnerability scanning)
BEIDI DINA SAMUEL
BEIDI DINA SAMUEL
BEIDI DINA SAMUEL
Follow
Jul 5 '24
Server side (vulnerability scanning)
#
server
#
dirbuster
#
vulnerability
#
skipfish
6
reactions
Comments
1
comment
10 min read
Patch your servers! It's time of regreSSHion
krzwiatrzyk
krzwiatrzyk
krzwiatrzyk
Follow
Jul 3 '24
Patch your servers! It's time of regreSSHion
#
security
#
vulnerability
#
opensource
2
reactions
Comments
Add Comment
1 min read
buffer Overflow (Application Vulnerability)
BEIDI DINA SAMUEL
BEIDI DINA SAMUEL
BEIDI DINA SAMUEL
Follow
Jun 24 '24
buffer Overflow (Application Vulnerability)
#
bufferoverflo
#
vulnerabilities
#
vulnerability
4
reactions
Comments
Add Comment
3 min read
Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack
AIHxDev
AIHxDev
AIHxDev
Follow
Apr 6 '24
Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack
#
linux
#
xzutils
#
vulnerability
#
hacking
6
reactions
Comments
1
comment
3 min read
Understanding Cross-Site Scripting (XSS)
Geoffrey Kim
Geoffrey Kim
Geoffrey Kim
Follow
Mar 29 '24
Understanding Cross-Site Scripting (XSS)
#
security
#
xss
#
vulnerability
#
cybersecurity
5
reactions
Comments
Add Comment
4 min read
Death to the invincible engineer
Juraj Malenica
Juraj Malenica
Juraj Malenica
Follow
Mar 20 '24
Death to the invincible engineer
#
productivity
#
vulnerability
#
communication
#
softwareengineering
62
reactions
Comments
6
comments
7 min read
Insecure Direct Object Reference (IDOR) vulnerability types
Grzegorz Piechnik
Grzegorz Piechnik
Grzegorz Piechnik
Follow
Nov 30 '23
Insecure Direct Object Reference (IDOR) vulnerability types
#
vulnerability
#
security
#
hacking
#
webdev
Comments
Add Comment
3 min read
Rational Shift-Left Security for Developers
Leon Adato
Leon Adato
Leon Adato
Follow
for
New Relic
Jul 28 '23
Rational Shift-Left Security for Developers
#
shiftleft
#
security
#
vulnerability
#
coding
2
reactions
Comments
1
comment
7 min read
10 Best Vulnerability Scanner Tools For Penetration Testing
Prakash Tiwari
Prakash Tiwari
Prakash Tiwari
Follow
Jun 11 '23
10 Best Vulnerability Scanner Tools For Penetration Testing
#
vulnerability
#
linux
#
tools
2
reactions
Comments
1
comment
4 min read
sudoedit (`sudo -e`) security flaw (CVE-2023-22809)
nabbisen
nabbisen
nabbisen
Follow
Jan 19 '23
sudoedit (`sudo -e`) security flaw (CVE-2023-22809)
#
sudo
#
sudoedit
#
security
#
vulnerability
4
reactions
Comments
7
comments
1 min read
sudoedit (`sudo -e`) に係る脆弱性 (CVE-2023-22809)
nabbisen
nabbisen
nabbisen
Follow
Jan 19 '23
sudoedit (`sudo -e`) に係る脆弱性 (CVE-2023-22809)
#
sudo
#
sudoedit
#
security
#
vulnerability
2
reactions
Comments
Add Comment
1 min read
Top websites for website vulnerability checks online
Mezbah Alam
Mezbah Alam
Mezbah Alam
Follow
Dec 21 '22
Top websites for website vulnerability checks online
#
website
#
vulnerability
#
checks
#
websecurity
3
reactions
Comments
Add Comment
2 min read
Sekurak MSHP CTF Summary - Part 1
Rafal Hofman
Rafal Hofman
Rafal Hofman
Follow
Oct 17 '22
Sekurak MSHP CTF Summary - Part 1
#
security
#
ctf
#
hackathon
#
vulnerability
2
reactions
Comments
Add Comment
3 min read
How I found an S3 vulnerability in a $85 million funded startup and reported it ethically
Ahsan Nabi Dar
Ahsan Nabi Dar
Ahsan Nabi Dar
Follow
Sep 20 '22
How I found an S3 vulnerability in a $85 million funded startup and reported it ethically
#
s3
#
vulnerability
#
security
1
reaction
Comments
Add Comment
4 min read
Forging GraphQL Bombs, the 2022 version of Zip Bombs
Gautier
Gautier
Gautier
Follow
Aug 12 '22
Forging GraphQL Bombs, the 2022 version of Zip Bombs
#
graphql
#
security
#
cybersecurity
#
vulnerability
47
reactions
Comments
2
comments
4 min read
Reconmap 1.1.0 release notes
Santiago L
Santiago L
Santiago L
Follow
for
Reconmap
Mar 4 '22
Reconmap 1.1.0 release notes
#
vulnerability
#
pentesting
#
infosec
#
opensource
5
reactions
Comments
Add Comment
2 min read
Finding a Stack Buffer Overflow
maximilian feldthusen
maximilian feldthusen
maximilian feldthusen
Follow
Feb 7 '22
Finding a Stack Buffer Overflow
#
cpp
#
buffer
#
vulnerability
#
overflow
5
reactions
Comments
Add Comment
7 min read
What a Jar of Buttons Is Teaching Me About Trust
Ashlee (she/her)
Ashlee (she/her)
Ashlee (she/her)
Follow
Jan 21 '22
What a Jar of Buttons Is Teaching Me About Trust
#
mentalhealth
#
trust
#
vulnerability
#
workplacetrauma
10
reactions
Comments
2
comments
5 min read
A new RCE vulnerability on Log4j 2.17.0 (CVE-2021-4483)
nabbisen
nabbisen
nabbisen
Follow
Dec 28 '21
A new RCE vulnerability on Log4j 2.17.0 (CVE-2021-4483)
#
log4j
#
security
#
vulnerability
#
cve
3
reactions
Comments
Add Comment
1 min read
Log4j 2.17.0 に関わる新たな RCE 脆弱性 (CVE-2021-4483)
nabbisen
nabbisen
nabbisen
Follow
Dec 28 '21
Log4j 2.17.0 に関わる新たな RCE 脆弱性 (CVE-2021-4483)
#
log4j
#
security
#
vulnerability
#
cve
3
reactions
Comments
Add Comment
1 min read
What is Log4j Vulnerability and how dangerous is it
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Dec 24 '21
What is Log4j Vulnerability and how dangerous is it
#
java
#
log4j
#
log4shell
#
vulnerability
2
reactions
Comments
Add Comment
3 min read
Log4j 2: New vulnerability on DoS in 2.16.0 and below
nabbisen
nabbisen
nabbisen
Follow
Dec 19 '21
Log4j 2: New vulnerability on DoS in 2.16.0 and below
#
log4j
#
vulnerability
#
security
#
dos
9
reactions
Comments
3
comments
1 min read
Log4j 2: DoS に関わる新たな脆弱性 (2.16.0 とそれ以前のバージョン)
nabbisen
nabbisen
nabbisen
Follow
Dec 19 '21
Log4j 2: DoS に関わる新たな脆弱性 (2.16.0 とそれ以前のバージョン)
#
log4j
#
vulnerability
#
security
#
dos
3
reactions
Comments
Add Comment
1 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account