Sonar Blog

Home

Blog

Sonar's latest blog posts

Featured Post

What is Clean Code?

If you’ve followed us for a while, you most likely noticed that we changed the way we describe what we do: from “code quality” to “continuous code inspection,” then “code quality and code security”… to Clean Code.


But what is Clean Code, and what does it encompass?

Read More
https://assets-eu-01.kc-usercontent.com:443/a50ea1f1-f62f-0105-db14-5c090004974b/ddb995eb-cb89-4435-82fb-1b937cdf11dc/what_is_clean_code_blog_feature.webp
https://assets-eu-01.kc-usercontent.com:443/a50ea1f1-f62f-0105-db14-5c090004974b/8d960daa-e1d0-4e94-b772-0b0a09889b66/Checkmk-Remote%20Code%20Execution_Hero%402x.png
Blog post

Checkmk: Remote Code Execution by Chaining Multiple Bugs (3/3)

This last article of the series determines how an attacker can chain two further vulnerabilities to fully take over a Checkmk server.

Read Blog post >

KubeCon and CloudNativeCon North America 2022
Blog post

A Look Back at KubeCon 2022

The Sonar Team had a great time sponsoring KubeCon 2022 in Detroit. Read about our takeaways from the event...

Read Blog post >

Get new blogs delivered directly to your inbox!

Stay up-to-date with the latest Sonar content. Subscribe now to receive the latest blog articles.

By submitting this form, you agree to the storing and processing of your personal data as described in the Privacy Policy and Cookie Policy. You can withdraw your consent by unsubscribing at any time.

The second article of this series outlines how an attacker can leverage the ability to forge arbitrary LQL queries to gain access to the NagVis component.
Blog post

Checkmk: Remote Code Execution by Chaining Multiple Bugs (2/3)

The second article of this series outlines how an attacker can leverage the ability to forge arbitrary LQL queries to gain access to the NagVis component.

Read Blog post >

We discovered multiple vulnerabilities in Checkmk, which can be chained together by an unauthenticated, remote attacker to fully take over a vulnerable server.
Blog post

Checkmk: Remote Code Execution by Chaining Multiple Bugs (1/3)

We discovered multiple vulnerabilities in Checkmk, which can be chained together by an unauthenticated, remote attacker to fully take over a vulnerable server.

Read Blog post >

After examining the Rules of Three, Five, and Zero, part 2 of this series looks at the exceptions that prove the rule(s). Some of them may surprise you (no, really)!
Blog post

Beyond the Rules of Three, Five and Zero

After examining the Rules of Three, Five, and Zero, part 2 of this series looks at the exceptions that prove the rule(s). Some of them may surprise you (no, really)!

Read Blog post >

Our AppSec and Vulnerability Research teams had a great time at Hexacon 2022, here's what we enjoyed!
Blog post

Bits from Hexacon 2022

Our AppSec and Vulnerability Research teams had a great time at Hexacon 2022, here's what we enjoyed!

Read Blog post >

This series is dedicated to the small, but common pitfalls and errors you can encounter when writing React code.
Whether an experienced JavaScript | TypeScript developer or just starting ...
Blog post

Lesser spotted React mistakes: Hooked on a feeling

This series is dedicated to the small, but common pitfalls and errors you can encounter when writing React code. Whether an experienced JavaScript | TypeScript developer or just starting out, the results can be surprising.

Read Blog post >

https://assets-eu-01.kc-usercontent.com:443/a50ea1f1-f62f-0105-db14-5c090004974b/91219eab-8901-4331-a736-11e913911084/hero%402x.jpg
Blog post

SonarQube 9.7 is here!

Check out what’s new in SonarQube 9.7 in this quick video.

Read Blog post >

We come back on a critical deserialization vulnerability identified by our SAST engine in the software Melis Platform. Let’s look at how it works under the hood and how we confirmed its e...
Blog post

Remote Code Execution in Melis Platform

We come back on a critical deserialization vulnerability identified by our SAST engine in the software Melis Platform. Let’s look at how it works under the hood and how we confirmed its exploitability.

Read Blog post >

Bad code doesn’t just disappear and the consequences of overlooking it can be costly. 
Blog post

Bad code costs more than just your money

Bad code doesn’t just disappear and the consequences of overlooking it can be costly. 

Read Blog post >

The Rule of Three was coined back in 1991. That expanded to the Rule of Five with C++11's move semantics - and even that was then subsumed by The Rule of Zero. But what are all these rule...
Blog post

The Rules of Three, Five and Zero

The Rule of Three was coined back in 1991. That expanded to the Rule of Five with C++11's move semantics - and even that was then subsumed by The Rule of Zero. But what are all these rules? And do we have to follow them?

Read Blog post >