Vulnerability research

Filter by Type...
Filter by Category...
Image for What is IaC Security?
Definition and guide

What is IaC Security?

Discover how to secure Infrastructure as Code with early scanning, policy as code, and effective remediation strategies to prevent cloud vulnerabilities.

Learn more >

Image for Common vulnerabilities and exposures in software development
Article

Common vulnerabilities and exposures in software development

A Common Vulnerabilities and Exposures (CVE) entry is a unique identifier assigned to a publicly known cybersecurity vulnerability in software or firmware.

Learn more >

exploits in software development
Article

Exploits in software development: A guide to prevention

Learn what exploits in software development are, how they differ from vulnerabilities, and practical strategies to detect and prevent them across the SDLC.

Learn more >

Image for Remote Code Execution
Article

Remote Code Execution

Remote code execution (RCE) is a critical software vulnerability that allows an attacker to run arbitrary code on a target system from a remote location.

Learn more >

Image for Open Source Intelligence
Definition and guide

Open Source Intelligence

Open Source Intelligence (OSINT) in software development involves the collection, analysis, and utilization of publicly available information to enhance various stages of the software development lifecycle.

Read Learn articles >

  • Follow SonarSource on Twitter
  • Follow SonarSource on Linkedin
language switcher
日本語 (Japanese)
  • 法的文書
  • トラスト センター

© 2025 SonarSource Sàrl.無断複写・転載を禁じます。