Skip to content
Navigation menu
Search
Log in
Create account
CodeNewbie Community 🌱
Close
#
vulnerabilities
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Confirmed: Fortinet FortiOS/FortiProxy Auth Bypass Bug (CVE-2024-55591)
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 24
Confirmed: Fortinet FortiOS/FortiProxy Auth Bypass Bug (CVE-2024-55591)
#
vulnerabilities
#
cybersecurity
#
webdev
5
 reactions
Comments
Add Comment
3 min read
Rsync Under Attack: New Buffer Overflow Flaws Could Leak Server Data
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 23
Rsync Under Attack: New Buffer Overflow Flaws Could Leak Server Data
#
vulnerabilities
#
cybersecurity
#
webdev
5
 reactions
Comments
Add Comment
2 min read
VMware ESXi Under Attack: Zero-Day Exploit Chain Breaks Isolation
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 17
VMware ESXi Under Attack: Zero-Day Exploit Chain Breaks Isolation
#
webdev
#
vulnerabilities
#
cybersecurity
5
 reactions
Comments
Add Comment
3 min read
New Kafka Connect Vulnerability (CVE-2025-27817) Lets Attackers Read Any File
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 12
New Kafka Connect Vulnerability (CVE-2025-27817) Lets Attackers Read Any File
#
webdev
#
vulnerabilities
#
cybersecurity
5
 reactions
Comments
Add Comment
2 min read
WAF or Reverse Proxy? Why Not Both?
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 9
WAF or Reverse Proxy? Why Not Both?
#
websecurity
#
vulnerabilities
5
 reactions
Comments
Add Comment
2 min read
DataEase Hit by Critical RCE Bugs (CVE-2025-49001/49002)
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 6
DataEase Hit by Critical RCE Bugs (CVE-2025-49001/49002)
#
vulnerabilities
#
websecurity
5
 reactions
Comments
Add Comment
2 min read
How to Recognize and Mitigate a DDoS Attack
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 5
How to Recognize and Mitigate a DDoS Attack
#
cybersecurity
#
vulnerabilities
#
webdev
5
 reactions
Comments
Add Comment
3 min read
Next.js Middleware Flaw Lets Hackers Bypass Auth (CVE-2025-29927)
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 10
Next.js Middleware Flaw Lets Hackers Bypass Auth (CVE-2025-29927)
#
webdev
#
cybersecurity
#
vulnerabilities
5
 reactions
Comments
2
 comments
3 min read
GeoServer Vulnerabilities Exposed: What You Need to Know
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 13
GeoServer Vulnerabilities Exposed: What You Need to Know
#
vulnerabilities
#
cybersecurity
5
 reactions
Comments
1
 comment
3 min read
Ollama Vulnerability: Unauthenticated Access Risk to Your LLM Models
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 20
Ollama Vulnerability: Unauthenticated Access Risk to Your LLM Models
#
llm
#
vulnerabilities
#
safeline
#
waf
5
 reactions
Comments
Add Comment
2 min read
CVE-2025-29927: Critical Next.js Auth Bypass—Patch Now!
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 16
CVE-2025-29927: Critical Next.js Auth Bypass—Patch Now!
#
vulnerabilities
#
cybersecurity
5
 reactions
Comments
1
 comment
3 min read
Vite Hit by Critical File Read Vulnerability (CVE-2025-31125)
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 5
Vite Hit by Critical File Read Vulnerability (CVE-2025-31125)
#
vulnerabilities
#
cybersecurity
#
webdev
5
 reactions
Comments
1
 comment
2 min read
CVE-2025-30208: Critical File Read Flaw in Vite Explained
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 9
CVE-2025-30208: Critical File Read Flaw in Vite Explained
#
websecurity
#
vulnerabilities
5
 reactions
Comments
Add Comment
3 min read
RCE in Apusic Application Server Triggered by IIOP Deserialization
Sharon428931
Sharon428931
Sharon428931
Follow
Jun 4
RCE in Apusic Application Server Triggered by IIOP Deserialization
#
vulnerabilities
#
websecurity
10
 reactions
Comments
1
 comment
2 min read
loading...
Log in
Create account