Articles by Tag #vulnerability

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Next.js Middleware Bypass Vulnerability (CVE-2025-29927) Affecting Popular AI Applications

This exploit disclosure was originally published by Chaitin Security Emergency Response Center. ...

Learn More 6 0Mar 25

Server side (vulnerability scanning)

Ethical Hacking Visit the github project: https://github.com/samglish/ServerSide ...

Learn More 6 1Jul 5 '24

buffer Overflow (Application Vulnerability)

https://github.com/samglish/bufferOverflow/ In french dépassement de tampon ou débordement de...

Learn More 4 0Jun 24 '24

Patch your servers! It's time of regreSSHion

OpenSSH CVE-2024-6387 vulnerability allows to perform an unauthenticated RCE that grants root access...

Learn More 2 0Jul 3 '24

Beware of Spring Boot Actuator Endpoint env: A Security Alert

As a developer, securing your applications should be a top priority. One area that often goes...

Learn More 1 0Oct 30 '24

10 Free Vulnerability Scanners Every Developer Should Know in 2025

Security is no longer just for security teams. If you're building web apps, deploying APIs, or...

Learn More 0 0Apr 8

OWASP Broken Access Control Vulnerabilities

When it comes to web application security, Broken Access Control stands out as one of the most...

Learn More 0 0Oct 17 '24