Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Addressing NPM Dependency Risks: Strategies for a Secure and Robust Software Ecosystem
Maxim Gerasimov
Maxim Gerasimov
Maxim Gerasimov
Follow
Apr 1
Addressing NPM Dependency Risks: Strategies for a Secure and Robust Software Ecosystem
#
security
#
dependencies
#
npm
#
vulnerabilities
Comments
Add Comment
8 min read
Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 31
Critical MCP Server Vulnerabilities Due to Poor Authentication: Implementing Security Best Practices to Mitigate Risks
#
security
#
authentication
#
vulnerabilities
#
mcp
Comments
Add Comment
9 min read
Why Automated Vulnerability Scanners Miss Most Real Security Vulnerabilities
Kuboid Secure Layer
Kuboid Secure Layer
Kuboid Secure Layer
Follow
Mar 30
Why Automated Vulnerability Scanners Miss Most Real Security Vulnerabilities
#
cybersecurity
#
automation
#
vulnerabilities
#
scanner
Comments
Add Comment
6 min read
Android's March 2026 Security Update: 100+ CVEs, One Under Active Exploitation
Tiamat
Tiamat
Tiamat
Follow
Mar 9
Android's March 2026 Security Update: 100+ CVEs, One Under Active Exploitation
#
android
#
security
#
vulnerabilities
#
privacy
1
 reaction
Comments
Add Comment
5 min read
AI-Generated Code Risks: Addressing Security Threats from Vulnerable Self-Hosted Projects
Elena Burtseva
Elena Burtseva
Elena Burtseva
Follow
Mar 15
AI-Generated Code Risks: Addressing Security Threats from Vulnerable Self-Hosted Projects
#
security
#
ai
#
selfhosting
#
vulnerabilities
1
 reaction
Comments
Add Comment
8 min read
Remediating Critical Security Vulnerabilities in Outdated .NET Application Within One Week for Audit Compliance
Marina Kovalchuk
Marina Kovalchuk
Marina Kovalchuk
Follow
Mar 25
Remediating Critical Security Vulnerabilities in Outdated .NET Application Within One Week for Audit Compliance
#
security
#
remediation
#
compliance
#
vulnerabilities
1
 reaction
Comments
2
 comments
15 min read
How to Prevent Common Security Vulnerabilities in REST APIs
Akshay Kurve
Akshay Kurve
Akshay Kurve
Follow
Mar 20
How to Prevent Common Security Vulnerabilities in REST APIs
#
challenge
#
security
#
vulnerabilities
#
restapi
2
 reactions
Comments
Add Comment
12 min read
AI/ML Infrastructure Vulnerabilities Expose Systems to Security Risks: Patching and Mitigation Strategies Proposed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 20
AI/ML Infrastructure Vulnerabilities Expose Systems to Security Risks: Patching and Mitigation Strategies Proposed
#
security
#
aiml
#
vulnerabilities
#
rce
2
 reactions
Comments
Add Comment
13 min read
66% of MCP Servers Have Critical Security Vulnerabilities: Urgent Patching and Audits Needed
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 15
66% of MCP Servers Have Critical Security Vulnerabilities: Urgent Patching and Audits Needed
#
security
#
vulnerabilities
#
mcp
#
patching
3
 reactions
Comments
Add Comment
13 min read
The State of MCP Server Security — 2026 Audit
Anders
Anders
Anders
Follow
Mar 13
The State of MCP Server Security — 2026 Audit
#
security
#
ai
#
mcp
#
vulnerabilities
1
 reaction
Comments
Add Comment
2 min read
Microsoft's Software Ecosystem Faces 79 Vulnerabilities: Urgent Patching and Mitigation Strategies Required
Ksenia Rudneva
Ksenia Rudneva
Ksenia Rudneva
Follow
Mar 10
Microsoft's Software Ecosystem Faces 79 Vulnerabilities: Urgent Patching and Mitigation Strategies Required
#
cybersecurity
#
vulnerabilities
#
patching
#
zerodays
2
 reactions
Comments
Add Comment
16 min read
Building Secure Blockchain Bridges: Common Vulnerabilities and Solutions.
Progress Ochuko Eyaadah
Progress Ochuko Eyaadah
Progress Ochuko Eyaadah
Follow
Jan 28
Building Secure Blockchain Bridges: Common Vulnerabilities and Solutions.
#
blockchain
#
security
#
vulnerabilities
#
bridges
4
 reactions
Comments
Add Comment
5 min read
Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain
Rez Moss
Rez Moss
Rez Moss
Follow
Feb 4
Beyond Vulnerability Scanning, How SBOM Diff Exposes Shadow Dependencies in Your Supply Chain
#
security
#
vulnerabilities
#
go
#
programming
5
 reactions
Comments
Add Comment
10 min read
Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask
Hafiz Shamnad
Hafiz Shamnad
Hafiz Shamnad
Follow
Feb 21
Day 8 — Insecure Direct Object Reference (IDOR) Vulnerability in Web Applications: A Practical Demonstration with Flask
#
webdev
#
cybersecurity
#
devchallenge
#
vulnerabilities
3
 reactions
Comments
Add Comment
6 min read
Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation
Hafiz Shamnad
Hafiz Shamnad
Hafiz Shamnad
Follow
Feb 20
Day 7 — Cross-Site Request Forgery (CSRF) in Flask: Account Takeover via Session Riding & Proper Mitigation
#
cybersecurity
#
webdev
#
python
#
vulnerabilities
1
 reaction
Comments
Add Comment
6 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account