Vulnerabilities

 Articles

Read about the latest security vulnerabilities that Cybercriminals often exploit to compromise websites, infect users, and gain illicit access to their sensitive data.

Cross-Domain JavaScript Source File Inclusion

The page includes one or more script files from a third-party domain.

Vulnerabilities
2
 min read

Incomplete or No Cache-control Header Set

The cache-control header has not been set properly or is missing, allowing the browser and proxies to cache content.

Vulnerabilities
1
 min read

Cookie Without Secure Flag

CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute.

Vulnerabilities
1
 min read

Cookie No HttpOnly Flag

CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag.

Vulnerabilities
1
 min read

In Page Banner Information Leak

Preventing Information Leakage (server version banner).

Vulnerabilities
1
 min read

Vulnerable JS Library

CWE-829: Inclusion of Functionality from Untrusted Control Sphere.

Vulnerabilities
1
 min read

Source Code Disclosure - File Inclusion

CWE-541: Inclusion of Sensitive Information in an Include File.

Vulnerabilities
5
 min read

Source Code Disclosure - SVN

CWE-541: Inclusion of Sensitive Information in an Include File.

Vulnerabilities
1
 min read

Source Code Disclosure - Git

CWE-541: Inclusion of Sensitive Information in an Include File.

Vulnerabilities
1
 min read

Remote File Inclusion

CWE-98: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion').

Vulnerabilities
5
 min read

Path Traversal

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal').

Vulnerabilities
5
 min read

Session ID in URL Rewrite

CWE-200: Exposure of Sensitive Information to an Unauthorized Actor.

Vulnerabilities
1
 min read

Private IP Disclosure

CWE-548: Exposure of Information Through Directory Listing.

Vulnerabilities
1
 min read

Directory Browsing

A directory listing is inappropriately exposed, yielding potentially sensitive information to attackers.

Vulnerabilities
1
 min read

Let’s check and protect your website from hackers

Run our expert website security checkup and get your tailored security recommendations to protect your website.

Thank you for registering
Oops! Something went wrong.