Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)
Sharon
Sharon
Sharon
Follow
Jul 9
Critical RCE Vulnerability in Redis HyperLogLog (CVE-2025-32023)
#
vulnerabilities
#
rce
#
cybersecurity
5
reactions
Comments
Add Comment
2 min read
Spring4Shell Vulnerability: What You Need to Know
Redfox Security
Redfox Security
Redfox Security
Follow
Jul 7
Spring4Shell Vulnerability: What You Need to Know
#
security
#
java
#
spring
#
vulnerabilities
Comments
Add Comment
3 min read
How to Deploy SafeLine WAF on a CyberPanel VPS
Carrie
Carrie
Carrie
Follow
Jul 4
How to Deploy SafeLine WAF on a CyberPanel VPS
#
cyberpanel
#
vulnerabilities
#
bugbounty
#
waf
5
reactions
Comments
Add Comment
2 min read
Nacos Admin Interface RCE — SQLi to Full System Compromise
Sharon
Sharon
Sharon
Follow
Jul 7
Nacos Admin Interface RCE — SQLi to Full System Compromise
#
rce
#
sqli
#
cybersecurity
#
vulnerabilities
6
reactions
Comments
Add Comment
3 min read
Zero-Day Exploits in 2025: Detection, Prevention, and Response Strategies
Sennovate
Sennovate
Sennovate
Follow
Jul 2
Zero-Day Exploits in 2025: Detection, Prevention, and Response Strategies
#
cybersecurity
#
vulnerabilities
#
infosec
Comments
Add Comment
3 min read
Promptfoo vs Deepteam vs PyRIT vs Garak: The Ultimate Red Teaming Showdown for LLMs
Ayush kumar
Ayush kumar
Ayush kumar
Follow
Jul 1
Promptfoo vs Deepteam vs PyRIT vs Garak: The Ultimate Red Teaming Showdown for LLMs
#
opensource
#
llm
#
security
#
vulnerabilities
5
reactions
Comments
Add Comment
10 min read
CVE-2022-46166 - Template Injection - Remote Code Execution
Tim Conrad
Tim Conrad
Tim Conrad
Follow
Jun 30
CVE-2022-46166 - Template Injection - Remote Code Execution
#
security
#
vulnerabilities
#
cve
Comments
Add Comment
3 min read
Stack and Buffer Overflow
Md. Monowarul Amin 200042112
Md. Monowarul Amin 200042112
Md. Monowarul Amin 200042112
Follow
Jun 29
Stack and Buffer Overflow
#
stack
#
bufferoverflow
#
vulnerabilities
#
gdb
Comments
Add Comment
1 min read
Пентестинг: основы, преимущества и применение
CyberSec Pro
CyberSec Pro
CyberSec Pro
Follow
Jul 1
Пентестинг: основы, преимущества и применение
#
pentest
#
cybersecurity
#
infosec
#
vulnerabilities
1
reaction
Comments
Add Comment
1 min read
The Essential Guide to Web Security Scanning: Protecting Your Digital Assets
Freedom Coder
Freedom Coder
Freedom Coder
Follow
Jun 27
The Essential Guide to Web Security Scanning: Protecting Your Digital Assets
#
cybersecurity
#
webscanner
#
websecurity
#
vulnerabilities
Comments
Add Comment
2 min read
CVE-2024-49113: Windows LDAP Flaw Lets Hackers Crash Domain Controllers
Sharon
Sharon
Sharon
Follow
Jun 27
CVE-2024-49113: Windows LDAP Flaw Lets Hackers Crash Domain Controllers
#
vulnerabilities
#
cybersecurity
#
webdev
#
ldap
5
reactions
Comments
Add Comment
3 min read
Ivanti EPM RCE via .NET Remoting Deserialization (CVE-2024-29847)
Sharon
Sharon
Sharon
Follow
Jul 1
Ivanti EPM RCE via .NET Remoting Deserialization (CVE-2024-29847)
#
ivanti
#
epm
#
remotecodeexecution
#
vulnerabilities
5
reactions
Comments
Add Comment
2 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
Akuson Daniel
Akuson Daniel
Akuson Daniel
Follow
Jun 25
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
#
cybersecurity
#
vulnerabilities
#
testing
Comments
Add Comment
1 min read
Critical Gogs RCE Vulnerability Resurfaces — Patch Now
Sharon
Sharon
Sharon
Follow
Jun 26
Critical Gogs RCE Vulnerability Resurfaces — Patch Now
#
rce
#
gogs
#
vulnerabilities
#
cybersecurity
6
reactions
Comments
Add Comment
2 min read
Fortinet Under Fire: New Auth Bypass Bug Actively Exploited (CVE-2024-55591)
Sharon
Sharon
Sharon
Follow
Jun 24
Fortinet Under Fire: New Auth Bypass Bug Actively Exploited (CVE-2024-55591)
#
vulnerabilities
#
cybersecurity
#
websecurity
6
reactions
Comments
Add Comment
3 min read
Rsync Vulnerabilities Open the Door to Remote Exploits
Sharon
Sharon
Sharon
Follow
Jun 23
Rsync Vulnerabilities Open the Door to Remote Exploits
#
vulnerabilities
#
cybersecurity
#
webdev
5
reactions
Comments
Add Comment
2 min read
Critical SQL Injection Flaw Found in E-cology — RCE Possible
Sharon
Sharon
Sharon
Follow
Jun 18
Critical SQL Injection Flaw Found in E-cology — RCE Possible
#
sqlinjection
#
safeline
#
vulnerabilities
#
websecurity
5
reactions
Comments
Add Comment
2 min read
Apache Tomcat RCE on Windows (CVE-2024-50379): Patch Now or Risk Remote Attacks
Sharon
Sharon
Sharon
Follow
Jun 30
Apache Tomcat RCE on Windows (CVE-2024-50379): Patch Now or Risk Remote Attacks
#
webdev
#
cybersecurity
#
vulnerabilities
6
reactions
Comments
Add Comment
3 min read
Critical Next.js Middleware Bypass Affects Popular AI Apps (CVE-2025-29927)
Sharon
Sharon
Sharon
Follow
Jun 16
Critical Next.js Middleware Bypass Affects Popular AI Apps (CVE-2025-29927)
#
nextjs
#
vulnerabilities
#
cybersecurity
6
reactions
Comments
Add Comment
3 min read
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
Akuson Daniel
Akuson Daniel
Akuson Daniel
Follow
Jun 22
Perform basic reconnaissance to gather domain-related information using Vulnerable Web.
#
cybersecurity
#
vulnerabilities
#
testing
Comments
Add Comment
2 min read
Symfony Command Injection: Risks & Secure Coding
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Jul 1
Symfony Command Injection: Risks & Secure Coding
#
cybersecurity
#
vulnerabilities
#
symfony
#
webdev
4
reactions
Comments
Add Comment
3 min read
WAF Checker: False Positive Test
Alex P
Alex P
Alex P
Follow
Jun 4
WAF Checker: False Positive Test
#
webdev
#
security
#
waf
#
vulnerabilities
Comments
Add Comment
1 min read
CVE-2024-49113: Windows LDAP Flaw Lets Hackers Crash Domain Controllers
Sharon
Sharon
Sharon
Follow
Jun 27
CVE-2024-49113: Windows LDAP Flaw Lets Hackers Crash Domain Controllers
#
vulnerabilities
#
cybersecurity
#
webdev
#
ldap
5
reactions
Comments
Add Comment
3 min read
Manipulating JavaScript App code in browser: Is it possible?
Hamdan Khan
Hamdan Khan
Hamdan Khan
Follow
Jul 5
Manipulating JavaScript App code in browser: Is it possible?
#
discuss
#
javascript
#
beginners
#
vulnerabilities
2
reactions
Comments
Add Comment
3 min read
Prevent HTTP Response Splitting in Symfony
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Jun 3
Prevent HTTP Response Splitting in Symfony
#
cybersecurity
#
vulnerabilities
#
symfony
#
webdev
2
reactions
Comments
2
comments
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account