CVE-2022-22947: VMware Spring Cloud Gateway Code Injection Vulnerability Post date October 29, 2025 Post author By Freedom Coder Post categories In cybersecurity, springcloudgateway, vmware, vulnerability
CVE-2024-34102: Adobe Commerce and Magento Open Source Improper Restriction of XML External Entity Reference (XXE) Vulnerability Post date October 23, 2025 Post author By Freedom Coder Post categories In Adobe, commerceandmagentoopensource, cybersecurity, vulnerability
CVE-2010-3765: Mozilla Multiple Products Remote Code Execution Vulnerability Post date October 6, 2025 Post author By Freedom Coder Post categories In cybersecurity, Mozilla, multipleproducts, vulnerability
CVE-2010-3765: Mozilla Multiple Products Remote Code Execution Vulnerability Post date October 6, 2025 Post author By Freedom Coder Post categories In cybersecurity, Mozilla, multipleproducts, vulnerability
CVE-2011-3402: Microsoft Windows Remote Code Execution Vulnerability Post date October 6, 2025 Post author By Freedom Coder Post categories In cybersecurity, microsoft, vulnerability, Windows
CVE-2013-3918: Microsoft Windows Out-of-Bounds Write Vulnerability Post date October 6, 2025 Post author By Freedom Coder Post categories In cybersecurity, microsoft, vulnerability, Windows
CVE-2021-43226: Microsoft Windows Privilege Escalation Vulnerability Post date October 6, 2025 Post author By Freedom Coder Post categories In cybersecurity, microsoft, vulnerability, Windows
CVE-2010-3962: Microsoft Internet Explorer Uninitialized Memory Corruption Vulnerability Post date October 6, 2025 Post author By Freedom Coder Post categories In cybersecurity, internetexplorer, microsoft, vulnerability
Large Language Models for One-Day Vulnerability Detection Post date September 16, 2025 Post author By Raj Madisetti Post categories In cybersecurity, langchain, llms, vulnerability
Large Language Models for One-Day Vulnerability Detection Post date September 16, 2025 Post author By Raj Madisetti Post categories In cybersecurity, langchain, llms, vulnerability
Large Language Models for One-Day Vulnerability Detection Post date September 16, 2025 Post author By Raj Madisetti Post categories In cybersecurity, langchain, llms, vulnerability
Large Language Models for One-Day Vulnerability Detection Post date September 16, 2025 Post author By Raj Madisetti Post categories In cybersecurity, langchain, llms, vulnerability
Large Language Models for One-Day Vulnerability Detection Post date September 16, 2025 Post author By Raj Madisetti Post categories In cybersecurity, langchain, llms, vulnerability
Vulnerability Assessment Costs: A Complete Breakdown Post date September 3, 2025 Post author By Sam Bishop Post categories In cost, cybersecurity, security, vulnerability
CVE-2025-8875: N-able N-Central Insecure Deserialization Vulnerability Post date August 13, 2025 Post author By Freedom Coder Post categories In cybersecurity, nable, ncentral, vulnerability
CVE-2025-8876: N-able N-Central Command Injection Vulnerability Post date August 13, 2025 Post author By Freedom Coder Post categories In cybersecurity, nable, ncentral, vulnerability
CVE-2013-3893: Microsoft Internet Explorer Resource Management Errors Vulnerability Post date August 12, 2025 Post author By Freedom Coder Post categories In cybersecurity, internetexplorer, microsoft, vulnerability
CVE-2007-0671: Microsoft Office Excel Remote Code Execution Vulnerability Post date August 12, 2025 Post author By Freedom Coder Post categories In cybersecurity, microsoft, office, vulnerability
CVE-2024-9680: Mozilla Firefox Use-After-Free Vulnerability Post date August 11, 2025 Post author By Freedom Coder Post categories In cybersecurity, Firefox, Mozilla, vulnerability
CVE-2024-49039: Microsoft Windows Task Scheduler Privilege Escalation Vulnerability Post date August 11, 2025 Post author By Freedom Coder Post categories In cybersecurity, microsoft, vulnerability, Windows
CVE-2022-40799: D-Link DNR-322L Download of Code Without Integrity Check Vulnerability Post date August 5, 2025 Post author By Freedom Coder Post categories In cybersecurity, dlink, dnr322l, vulnerability
CVE-2020-25079: D-Link DCS-2530L and DCS-2670L Command Injection Vulnerability Post date August 5, 2025 Post author By Freedom Coder Post categories In cybersecurity, dcs2530landdcs2670ldevices, dlink, vulnerability
CVE-2020-25078: D-Link DCS-2530L and DCS-2670L Devices Unspecified Vulnerability Post date August 5, 2025 Post author By Freedom Coder Post categories In cybersecurity, dcs2530landdcs2670ldevices, dlink, vulnerability
CVE-2024-55550: Mitel MiCollab Path Traversal Vulnerability Post date July 26, 2025 Post author By Freedom Coder Post categories In cybersecurity, micollab, mitel, vulnerability
CVE-2025-49706: Microsoft SharePoint Improper Authentication Vulnerability Post date July 22, 2025 Post author By Freedom Coder Post categories In cybersecurity, microsoft, sharepoint, vulnerability
CVE-2025-49704: Microsoft SharePoint Code Injection Vulnerability Post date July 22, 2025 Post author By Freedom Coder Post categories In cybersecurity, microsoft, sharepoint, vulnerability
CVE-2018-15133: Laravel Deserialization of Untrusted Data Vulnerability Post date July 13, 2025 Post author By Freedom Coder Post categories In cybersecurity, laravel, laravelframework, vulnerability
CVE-2021-34523: Microsoft Exchange Server Privilege Escalation Vulnerability Post date June 24, 2025 Post author By Freedom Coder Post categories In cybersecurity, exchangeserver, microsoft, vulnerability
CVE-2021-34473: Microsoft Exchange Server Remote Code Execution Vulnerability Post date June 24, 2025 Post author By Freedom Coder Post categories In cybersecurity, exchangeserver, microsoft, vulnerability
The Fundamental Vulnerability of Networks: ARP Spoofing Post date January 15, 2025 Post author By Mikhail Chuloshnikov Post categories In code, it, programming, security, vulnerability
buffer Overflow (Application Vulnerability) Post date June 24, 2024 Post author By BEIDI DINA SAMUEL Post categories In bufferoverflo, vulnerabilities, vulnerability
sudoedit (`sudo -e`) に係る脆弱性 (CVE-2023-22809) Post date January 19, 2023 Post author By nabbisen Post categories In security, sudo, sudoedit, vulnerability
sudoedit (`sudo -e`) security flaw (CVE-2023-22809) Post date January 19, 2023 Post author By nabbisen Post categories In security, sudo, sudoedit, vulnerability
6 computer hacking terminology explained Post date March 2, 2022 Post author By Meta Collective Post categories In brute-force-attack, ddos-attack, hacking, trojan-horse, vulnerability
What a Jar of Buttons Is Teaching Me About Trust Post date January 21, 2022 Post author By DEV Community Post categories In mentalhealth, trust, vulnerability, workplacetrauma
Log4j 2.17.0 に関わる新たな RCE 脆弱性 (CVE-2021-4483) Post date December 28, 2021 Post author By Heddi Nabbisen Post categories In cve, log4j, security, vulnerability
A new RCE vulnerability on Log4j 2.17.0 (CVE-2021-4483) Post date December 28, 2021 Post author By Heddi Nabbisen Post categories In cve, log4j, security, vulnerability
What is the Log4j Vulnerability? | Everything You Need to Know Post date December 27, 2021 Post author By Kevin Gabeci Post categories In cyber, cyberattack, cybersecurity, log4j, vulnerability
What is Log4j Vulnerability and how dangerous is it Post date December 24, 2021 Post author By Vijay Patel Post categories In java, log4j, log4shell, vulnerability
Mitigate Log4Shell security risk by using Traefik Post date December 23, 2021 Post author By Paul Knulst Post categories In docker, log4j, security, software-architecture, vulnerability
Log 4j vulnerability Post date December 19, 2021 Post author By Bhagvan Kommadi Post categories In java, log4j, security, vulnerability
How to Hack Ethically Post date October 6, 2021 Post author By Daniel Post categories In be-an-ethical-hacker, cybersecurity, ethical-hacking, get-started-ethical-hacking, how-to-hack, owasp, security, vulnerability
Kubernetes New High Severity Vulnerability CVE-2021-25741 – Are You Exposed? Post date September 24, 2021 Post author By ARMO Post categories In are-you-exposed, business-solutions, good-company, high-severity-vulnerability, kubernetes, kubernetes-problems, kubernetes-vulnerability, vulnerability
A New LinkedIn Vulnerability Exposes Jobseekers to Phishing Attacks Post date August 26, 2021 Post author By Medha Mehta Post categories In cybersecurity, cybersecurity-awareness, linkedin, phishing, phishing-attacks, security, security-top-story, vulnerability
Hunting Exploits by looking for the Author’s fingerprints: Graphology of an Exploit Post date July 27, 2021 Post author By Check Point Software Post categories In checkpoint, exploit, good-company, malware, malware-threat, security, vulnerability, web-security
Addressing Input Sanitization Bugs and CVE 2021-21321 Post date June 23, 2021 Post author By Daniel Post categories In cybersecurity, input-sanitization, open source, sanitize-user-input, security, sql-injection, vulnerability, vulnerability-management
Types of Cross-Site Scripting(XSS) Attacks Post date May 11, 2021 Post author By Beto Muniz Post categories In cybersecurity, HTTP, malware, owasp, security, vulnerability, web-development, xss-attack
Security Research Ethics Review Post date May 6, 2021 Post author By Dave Dittrich Post categories In ethics, linux-kernel, patch-management, Research, vulnerability
WPRecon – Vulnerability recognition tool in CMS WordPress Post date April 22, 2021 Post author By kalilinux Post categories In php, security, vulnerability, wordpress
Leading With Vulnerability Will Make You A Better Leader Post date April 18, 2021 Post author By Vinita Bansal Post categories In communication, growth, leadership, leadership-development, leadership-skills, management, management-and-leadership, vulnerability
What Type Of Manager Are You? Post date March 26, 2021 Post author By Vinita Bansal Post categories In growth-mindset, how-to-be-a-good-manager, leadership, management, management-and-leadership, managing-technical-people, people-skills, vulnerability
“You Can’t Protect What You Can’t See.” Cyber Hygiene and Zero-Day Vulnerability Post date March 7, 2021 Post author By Zen Chan Post categories In cyber-hygiene, cyber-resilience, cybersecurity, hackernoon-top-story, security-vulnerability, vmware, vulnerability, web-monetization, zero-day
Third party CSS is not safe Post date September 2, 2020 Post author By Tan Li Hau's Blog Post categories In css, talk.css, vulnerability
Third party CSS is not safe Post date September 2, 2020 Post author By Tan Li Hau's Blog Post categories In css, talk.css, vulnerability