Tech does not just watch: Take action against Russia’s war on Ukraine 🇺🇦, and take action against Israel’s occupation, destruction, and ethnic cleansing of Palestine (history) 🇵🇸 Hide

Frontend Dogma

“vulnerabilities” News Archive

Definition, related topics, and tag feed

Definition · Supertopics: security (non-exhaustive) · “vulnerabilities” RSS feed (per email)

Entry (Sources) and Additional TopicsDate#
Taking Down Next.js Servers for 0.0001 Cents a Pop28
servers, nextjs, security
Introducing the OWASP Top 10:2025 (she+/owa)27
introductions, owasp, security
What Is an Encryption Backdoor? (int)26
security, encryption, concepts
What Is the OWASP Top 10 and How Can Your Team Benchmark Security? (jet)25
owasp, security, qodana, jetbrains
How OWASP Helps You Secure Your Full-Stack Web Applications (eri/sma)24
security, owasp, monitoring, authentication, configuration, csrf, cryptography, authorization
Understanding “npm audit” and Fixing Vulnerabilities23
npm, security, nodejs
Top 4 Web Vulnerabilities With Example and Mitigation22
security, sql, databases, xss, csrf
Why Code Security Matters—Even in Hardened Environments21
security, file-handling, nodejs
Gaining Access to Anyone’s Browser Without Them Even Visiting a Website20
arc, the-browser-company, browsers, security
RegreSSHion: Remote Unauthenticated Code Execution Vulnerability in OpenSSH Server19
security, ssh
Polyfill Supply Chain Attack Embeds Malware in JavaScript CDN Assets18
security, malware
Researchers Uncover npm Registry Vulnerability to Cache Poisoning and DoS Attacks (sar/soc)17
npm, dependencies, caching, security
How a Single Vulnerability Can Bring Down the JavaScript Ecosystem16
javascript, npm, dependencies, caching, security
Node.js Secure Coding: Mitigate and Weaponize Code Injection Vulnerabilities15
books, nodejs, security
An Introduction to Command Injection Vulnerabilities in Node.js and JavaScript14
introductions, security, nodejs, javascript
The Top 10 Security Vulnerabilities for Web Applications13
security, web-apps
Top 5 npm Vulnerability Scanners12
npm, security, tooling
User Vulnerabilities in the Data Cycle (uxd)11
user-experience, privacy, legal
How to Fix Your Security Vulnerabilities With npm Override10
how-tos, security, npm, dependencies
Understanding and Preventing Common Security Vulnerabilities9
security
CSS Security Vulnerabilities (chr/css)8
css, security, privacy
It’s Beginning to Look a Lot Like XSSmas (24w)7
security, csrf, xss
Eliminating Known Vulnerabilities With Snyk (sma)6
security, tooling
A Simple Developer Error Is Exposing Private Information on Thousands of Websites (owe)5
version-control, git, mistakes, security
Top 10 PHP Security Vulnerabilities4
php, security
Web Security: Are You Part of the Problem? (cod/sma)3
security, php, javascript
You Could Be Getting Clickjacked (tec)2
security, frames, w3c
Device Vulnerability Checker1
tools, exploration, security