Skip to content
Navigation menu
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Nov 19 '24
Prevent Cross-Site Scripting (XSS) in Laravel: Secure Your Code
#
cybersecurity
#
vulnerabilities
#
laravel
#
security
4
 reactions
Comments
Add Comment
2 min read
POC — CVE-2024–10914 Command Injection Vulnerability in `name` parameter for D-Link NAS
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Nov 14 '24
POC — CVE-2024–10914 Command Injection Vulnerability in `name` parameter for D-Link NAS
#
poc
#
exploit
#
vulnerabilities
#
cybersecurity
5
 reactions
Comments
Add Comment
2 min read
Preventing SQL Injection (SQLi) in React.js Apps
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Nov 14 '24
Preventing SQL Injection (SQLi) in React.js Apps
#
cybersecurity
#
vulnerabilities
#
sql
#
react
2
 reactions
Comments
Add Comment
3 min read
Amazon Inspector Deep-Dive : CIS Benchmark, Container image and SBOM
vikasbanage
vikasbanage
vikasbanage
Follow
for
AWS Community Builders
Nov 12 '24
Amazon Inspector Deep-Dive : CIS Benchmark, Container image and SBOM
#
aws
#
cloud
#
security
#
vulnerabilities
3
 reactions
Comments
Add Comment
6 min read
Preventing SQL Injection (SQLi) Attacks in Drupal
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Nov 12 '24
Preventing SQL Injection (SQLi) Attacks in Drupal
#
cybersecurity
#
vulnerabilities
#
sql
#
drupal
Comments
Add Comment
3 min read
How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code
Aivan Carlos Tuquero
Aivan Carlos Tuquero
Aivan Carlos Tuquero
Follow
Nov 10 '24
How to Kill Vulnerabilities in Your Node.js App: A Guide to Writing Secure JavaScript Code
#
javascript
#
vulnerabilities
#
security
#
node
11
 reactions
Comments
Add Comment
6 min read
SQL Injection (SQLi) Vulnerabilities in WordPress: Prevention Tips
Pentest Testing Corp
Pentest Testing Corp
Pentest Testing Corp
Follow
Nov 10 '24
SQL Injection (SQLi) Vulnerabilities in WordPress: Prevention Tips
#
cybersecurity
#
vulnerabilities
#
sql
#
wordpress
1
 reaction
Comments
2
 comments
3 min read
Automating Vulnerability Detection for Your Assets
VĂctor JimĂ©nez Cerrada
VĂctor JimĂ©nez Cerrada
VĂctor JimĂ©nez Cerrada
Follow
Oct 15 '24
Automating Vulnerability Detection for Your Assets
#
security
#
cve
#
vulnerabilities
#
spreadsheet
Comments
Add Comment
13 min read
Exportar u Obtener Hallazgos en AWS Inspector
Willie Reyes
Willie Reyes
Willie Reyes
Follow
Nov 1 '24
Exportar u Obtener Hallazgos en AWS Inspector
#
cloudcomputing
#
vulnerabilities
#
tutorial
#
cloudsecurity
Comments
Add Comment
3 min read
Hotel Booking Data Breach of Taiwan Tourists
Carrie
Carrie
Carrie
Follow
Oct 21 '24
Hotel Booking Data Breach of Taiwan Tourists
#
cybersecurity
#
vulnerabilities
#
opensource
10
 reactions
Comments
Add Comment
3 min read
A Critical Fix for a 5-Year Old Vulnerability through Docker's Security Patch
Dr. Vamsi Mohan Vandrangi
Dr. Vamsi Mohan Vandrangi
Dr. Vamsi Mohan Vandrangi
Follow
Sep 12 '24
A Critical Fix for a 5-Year Old Vulnerability through Docker's Security Patch
#
vulnerabilities
#
docker
#
security
#
containers
Comments
Add Comment
2 min read
DevSecops Tools in CICD Pipeline
akhil mittal
akhil mittal
akhil mittal
Follow
Oct 9 '24
DevSecops Tools in CICD Pipeline
#
devsecops
#
security
#
cicd
#
vulnerabilities
Comments
Add Comment
4 min read
Making Sense of Open-Source Vulnerability Databases: NVD, OSV, etc.
C.J. May
C.J. May
C.J. May
Follow
for
GitGuardian
Oct 7 '24
Making Sense of Open-Source Vulnerability Databases: NVD, OSV, etc.
#
opensource
#
vulnerabilities
#
security
Comments
1
 comment
9 min read
Container Security Scanning: Vulnerabilities, Risks and Tooling
Tiexin Guo
Tiexin Guo
Tiexin Guo
Follow
for
GitGuardian
Oct 7 '24
Container Security Scanning: Vulnerabilities, Risks and Tooling
#
opensource
#
vulnerabilities
#
security
#
containers
Comments
Add Comment
10 min read
Jenkins File Read Vulnerability - CVE-2024-23897
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Oct 1 '24
Jenkins File Read Vulnerability - CVE-2024-23897
#
cybersecurity
#
exploit
#
vulnerabilities
#
jenkins
5
 reactions
Comments
Add Comment
2 min read
VSCode Extension for finding Vulnerabilities and Outdated Dependencies.
Sunil Kumar
Sunil Kumar
Sunil Kumar
Follow
Sep 15 '24
VSCode Extension for finding Vulnerabilities and Outdated Dependencies.
#
vscode
#
extensions
#
auditing
#
vulnerabilities
2
 reactions
Comments
Add Comment
1 min read
Web Application Penetration Testing: An In-Depth Guide
Salman
Salman
Salman
Follow
Aug 19 '24
Web Application Penetration Testing: An In-Depth Guide
#
cybersecurity
#
linux
#
vulnerabilities
#
beginners
Comments
Add Comment
2 min read
Top Security Flaws hiding in your code right now - and how to fix them
Jonathan Vila
Jonathan Vila
Jonathan Vila
Follow
Aug 28 '24
Top Security Flaws hiding in your code right now - and how to fix them
#
security
#
cleancode
#
vulnerabilities
#
java
1
 reaction
Comments
2
 comments
8 min read
Scanning AWS S3 Buckets for Security Vulnerabilities
Ibrahim Salami
Ibrahim Salami
Ibrahim Salami
Follow
for
Aviator
Aug 27 '24
Scanning AWS S3 Buckets for Security Vulnerabilities
#
aws
#
vulnerabilities
#
s3
#
security
3
 reactions
Comments
Add Comment
12 min read
Implementation of Missing Security Header Vulnerability in Apache (Part 1)
Rahul Sarma
Rahul Sarma
Rahul Sarma
Follow
Jul 23 '24
Implementation of Missing Security Header Vulnerability in Apache (Part 1)
#
webdev
#
vulnerabilities
#
apache
Comments
Add Comment
2 min read
Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities
Wallace Freitas
Wallace Freitas
Wallace Freitas
Follow
Aug 2 '24
Techniques for Writing Secure Code: Safeguarding Your Software from Vulnerabilities
#
programming
#
security
#
vulnerabilities
Comments
Add Comment
4 min read
The Data Security Duo: Data Encryption and Vulnerability Scans
Lulu Cheng
Lulu Cheng
Lulu Cheng
Follow
for
jarrid.xyz
Jul 28 '24
The Data Security Duo: Data Encryption and Vulnerability Scans
#
security
#
data
#
encryption
#
vulnerabilities
1
 reaction
Comments
Add Comment
5 min read
Securing the AWS Infrastructure
Hemalatha Ramanujam
Hemalatha Ramanujam
Hemalatha Ramanujam
Follow
Jul 14 '24
Securing the AWS Infrastructure
#
aws
#
security
#
vulnerabilities
#
vpc
2
 reactions
Comments
Add Comment
4 min read
Implementation of Missing Security Header Vulnerability in Apache (Part 2)
Rahul Sarma
Rahul Sarma
Rahul Sarma
Follow
Jul 24 '24
Implementation of Missing Security Header Vulnerability in Apache (Part 2)
#
webdev
#
vulnerabilities
#
apache
Comments
Add Comment
3 min read
API Testing: A Journey into Reconnaissance and Vulnerability Identification using BurpSuite
FFFF:0000h
FFFF:0000h
FFFF:0000h
Follow
Jun 19 '24
API Testing: A Journey into Reconnaissance and Vulnerability Identification using BurpSuite
#
cybersecurity
#
webdev
#
vulnerabilities
#
api
1
 reaction
Comments
Add Comment
5 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account