Vulnerabilities

 Articles

Read about the latest security vulnerabilities that Cybercriminals often exploit to compromise websites, infect users, and gain illicit access to their sensitive data.

Cookie without SameSite Attribute

'Cookie without SameSite Attribute' is a web application vulnerability when cookies can be sent in all cross-site requests, including potentially malicious ones. This can be exploited by attackers to steal session data, perform CSRF attacks, and inject malicious scripts into a user's session.

Vulnerabilities
1
 min read

X-ChromeLogger-Data (XCOLD) Header Information Leak

The 'X-ChromeLogger-Data (XCOLD) Header Information Leak' is a web application vulnerability that occurs when the web application includes sensitive data in the XCOLD header, which can be accessed by attackers.

Vulnerabilities
1
 min read

Relative Path Confusion

'Path traversal' or 'Directory traversal' is a web application vulnerability, where an attacker can access sensitive files and directories outside the intended directory or root directory. One of the types of path traversal vulnerability is called 'Relative Path Confusion.' This vulnerability allows an attacker to access files or directories outside the web application's root directory by exploiting a relative path traversal vulnerability.

Vulnerabilities
2
 min read

Retrieved from Cache

The 'Retrieved from Cache' vulnerability occurs when sensitive information is stored in a cache, and an attacker can retrieve it by accessing the cache directly. This vulnerability can arise when an application caches sensitive data, such as user credentials, session tokens, or personal information, and does not properly clear the cache when the user logs out or the session expires.

Vulnerabilities
1
 min read

Storable and Cacheable Content

Storable and Cacheable Content vulnerability is a type of vulnerability that affects web applications that use caching mechanisms. This vulnerability can allow an attacker to access sensitive information that is stored in the cache.

Vulnerabilities
2
 min read

Storable but Non-Cacheable Content

The Storable but Non-Cacheable Content vulnerability is a type of vulnerability that occurs when web pages or other types of content are stored in a way that makes them accessible to attackers. This vulnerability typically occurs when web pages or other types of content are stored in a way that does not allow them to be cached by the web browser or other caching mechanisms.

Vulnerabilities
2
 min read

Non-Storable Content

Non-Storable Content is a common vulnerability that affects many web applications. This vulnerability arises when the server is unable to store certain types of content, allowing an attacker to upload malicious files or execute arbitrary code. This vulnerability can be exploited to execute various types of attacks, such as Cross-Site Scripting (XSS), Remote Code Execution (RCE), and File Inclusion attacks.

Vulnerabilities
2
 min read

Content Cacheability

Content cacheability vulnerabilities can occur when the cacheability of the website content is not set up correctly, which can lead to the exposure of sensitive data, reduced site performance, and other issues.

Vulnerabilities
2
 min read

Remote Code Execution - Shell Shock

Remote Code Execution (RCE) is a type of security vulnerability that allows an attacker to execute arbitrary code on a target system or application. Shell Shock is a specific type of RCE vulnerability that affects Unix-based systems and is caused by a flaw in the Bash shell.

Vulnerabilities
1
 min read

HTTPS Content Available via HTTP

The vulnerability 'HTTPS Content Available via HTTP' means that while your web application is using HTTPS to encrypt communication, it still allows users to access some resources via HTTP, which is not secure. This can be exploited by attackers to intercept sensitive data or carry out a man-in-the-middle attack.

Vulnerabilities
2
 min read

Insecure Component

Insecure component vulnerabilities are a common type of security issue found in web applications. These vulnerabilities occur when a web application uses a vulnerable or outdated component that can be exploited by attackers to gain unauthorized access to the system or steal sensitive data.

Vulnerabilities
1
 min read

Source Code Disclosure - /WEB-INF folder

Source Code Disclosure is a serious vulnerability that can reveal sensitive information about your web application to attackers. The /WEB-INF folder is one of the most critical folders in a Java web application, as it contains important configuration files, libraries, and other resources that are not intended to be accessible to the public.

Vulnerabilities
1
 min read

Big Redirect Detected (Potential Sensitive Information Leak)

The 'Big Redirect Detected' vulnerability is a common issue that affects web applications. It occurs when an attacker can manipulate the URL or query string parameters in a way that causes the server to redirect to an unintended page. This can be exploited by an attacker to steal sensitive information, such as login credentials or session tokens, or to perform phishing attacks.

Vulnerabilities
1
 min read

User Controllable JavaScript Event (XSS)

Cross-site scripting (XSS) is a type of security vulnerability that allows attackers to inject malicious code into web pages viewed by other users. This can allow the attacker to steal sensitive information such as login credentials or personal data. User controllable JavaScript event (XSS) is a type of XSS vulnerability that occurs when an attacker is able to inject malicious JavaScript code into a web application through user input.

Vulnerabilities
2
 min read

HTTPS to HTTP Insecure Transition in Form Post

The vulnerability known as "HTTPS to HTTP Insecure Transition in Form Post" occurs when a user logs in to a website using a secure HTTPS connection, but then is redirected to an insecure HTTP connection when submitting a form, which can lead to sensitive data being intercepted by attackers.

Vulnerabilities
 min read

Secure Pages Include Mixed Content

The Secure Pages Include Mixed Content vulnerability arises when an HTTPS webpage includes HTTP resources, such as images, scripts, or stylesheets. This can be a security issue because it can allow attackers to modify the content of the page or intercept user data.

Vulnerabilities
1
 min read

X-Backend-Server Header Information Leak

The X-Backend-Server Header Information Leak vulnerability occurs when the application exposes sensitive information about its backend server in the HTTP response headers. Attackers can use this information to launch sophisticated attacks.

Vulnerabilities
2
 min read

Content Security Policy (CSP) Header Not Set

Content Security Policy (CSP) is a security feature that helps prevent code injection attacks by defining and enforcing a whitelist of approved content sources. It does this by defining a policy. If the CSP header is not set correctly, attackers can inject malicious scripts into your web application, leading to potential data theft, or unauthorized access.

Vulnerabilities
 min read

Server Leaks Version Information via 'Server' HTTP Response Header Field

'Server Leaks Version Information via 'Server' HTTP Response Header Field.' This vulnerability occurs when the web server leaks information about the software and its version used in the application through the HTTP response header field, making it easier for attackers to find potential weaknesses to exploit

Vulnerabilities
1
 min read

Server Leaks its Webserver Application via 'Server' HTTP Response Header Field

"Server Leaks its Webserver Application via 'Server' HTTP Response Header Field" vulnerability is a security issue that allows attackers to identify the technology stack of the web server, including its version and operating system, and use this information to launch further attacks.

Vulnerabilities
2
 min read

HTTP Server Response Header

HTTP Server Response Header is a vulnerability that can be exploited by attackers to gather information about the web server and the software it is running, and launch targeted attacks against the web application.

Vulnerabilities
 min read

Viewstate

Viewstate is a feature of ASP.NET web applications that helps maintain the state of the page across postbacks. However, if the Viewstate is not properly protected, it can be easily exploited by attackers to tamper with the state of the application or steal sensitive information.

Vulnerabilities
 min read

Missing Anti-clickjacking Header

One way to protect your web application against clickjacking attacks is to add an anti-clickjacking header to your HTTP responses. If your vulnerability scanner has identified a missing anti-clickjacking header, it means that your website is not currently protected against clickjacking attacks.

Vulnerabilities
 min read

Web Browser XSS Protection Not Enabled

The cross-site scripting (XSS) attack is a type of attack in which an attacker injects malicious code into a website that is executed by a victim's web browser. The attack occurs when the website fails to properly validate user input, allowing the attacker to execute arbitrary code.

Vulnerabilities
 min read

Re-examine Cache-control Directives

The 'Re-examine Cache-control Directives' vulnerability is a common issue found in web applications that use caching to improve website performance. When not configured correctly, caching can expose sensitive information, compromise user privacy, or even result in a full website compromise.

Vulnerabilities
 min read

Vulnerable JS Library

The Vulnerable JS Library is a common security issue that occurs when a web application uses outdated or unpatched JavaScript libraries. Cybercriminals exploit these vulnerabilities to gain access to sensitive data or cause damage to the application.

Vulnerabilities
 min read

Referer Exposes Session ID

The 'Referer Exposes Session ID' vulnerability is a type of security flaw that can allow an attacker to hijack a user's session by exploiting the Referer header in HTTP requests.

Vulnerabilities
 min read

Server Leaks Information via 'X-Powered-By' HTTP Response Header Field(s)

The 'X-Powered-By' HTTP response header is a standard header that web servers include in their responses. It contains information about the technology or software that the server is running. This header can also reveal sensitive information about the server's configuration, which can be exploited by attackers.

Vulnerabilities
1
 min read

Strict-Transport-Security Header

The Strict-Transport-Security (STS) header is a security feature implemented in modern web browsers that enforces the use of HTTPS on a website. If not configured correctly, it can leave your website vulnerable to man-in-the-middle attacks.

Vulnerabilities
2
 min read

Heartbleed OpenSSL Vulnerability (Indicative)

Heartbleed is a serious vulnerability in the OpenSSL cryptographic software library. It allows attackers to obtain sensitive information such as passwords, credit card numbers, and other confidential information from vulnerable servers.

Vulnerabilities
1
 min read

Split Viewstate in Use

The Split Viewstate in Use vulnerability occurs when the viewstate is split across multiple hidden fields on the page. The vulnerability can be exploited by an attacker who can modify one of the hidden fields to change the state of the page.

Vulnerabilities
1
 min read

Viewstate without MAC Signature (Sure)

The Viewstate without MAC Signature (Sure) vulnerability occurs when a web page uses Viewstate but does not include a Message Authentication Code (MAC) to protect it. Without a MAC, an attacker can modify the Viewstate value, which could allow them to perform session hijacking, CSRF attacks, or access sensitive information.

Vulnerabilities
1
 min read

Viewstate without MAC Signature (Unsure)

The Viewstate without MAC Signature (Unsure) vulnerability is a security issue that can affect the integrity of a web application's ViewState data. This vulnerability occurs when ViewState data is transmitted without being signed with a Message Authentication Code (MAC) or the MAC key used to sign the ViewState data is known to the attacker.

Vulnerabilities
1
 min read

Old Asp.Net Version in Use

The 'Old Asp.Net Version in Use' vulnerability is a serious security concern that can leave your web application vulnerable to various cyber attacks. This vulnerability occurs when your web application uses an old and outdated version of the ASP.NET framework. Hackers can exploit the security vulnerabilities present in old versions to launch attacks such as SQL injection and cross-site scripting (XSS).

Vulnerabilities
2
 min read

Emails Found in the Viewstate

The 'Emails Found in the Viewstate' vulnerability occurs when sensitive data, such as email addresses, is stored in the viewstate. This vulnerability can be exploited by attackers to gain access to sensitive data.

Vulnerabilities
1
 min read

Potential IP Addresses Found in the Viewstate

The 'Potential IP Addresses Found in the Viewstate' vulnerability occurs when sensitive data, such as IP addresses, are stored in the view state of a web application. If an attacker gains access to this information, it can be used to launch attacks against the system or other targets.

Vulnerabilities
1
 min read

User Controllable HTML Element Attribute (Potential XSS)

The vulnerability you discovered, 'User Controllable HTML Element Attribute (Potential XSS)', indicates that your web application allows user input to be included in HTML element attributes, which could potentially be exploited by an attacker to perform an XSS attack.

Vulnerabilities
1
 min read

User Controllable Charset

User-controllable charset vulnerability occurs when a user can control the character set that the web application uses to decode data. Attackers can exploit this vulnerability by using different character sets to bypass security measures and execute malicious code. This can lead to data theft, data manipulation, and other security issues.

Vulnerabilities
2
 min read

Cookie Poisoning

Cookie poisoning is a security vulnerability that arises when a malicious user manipulates the cookies used by a web application to gain unauthorized access to sensitive information or perform unauthorized actions.

Vulnerabilities
1
 min read

Open Redirect

Open redirect vulnerability is a security flaw where an attacker can exploit a website's redirection functionality to redirect users to malicious websites or pages that can potentially steal sensitive information.

Vulnerabilities
2
 min read

Information Disclosure - Suspicious Comments

Information disclosure is a vulnerability that can compromise the confidentiality of sensitive information in your web application. The vulnerability "Information Disclosure - Suspicious Comments" refers to comments in the source code that may reveal sensitive information to an attacker.

Vulnerabilities
1
 min read

HTTP Parameter Override

HTTP Parameter Override (HPO) is a security vulnerability that allows an attacker to modify the parameters in an HTTP request, which can lead to various types of attacks, including SQL injection, cross-site scripting (XSS), and session hijacking.

Vulnerabilities
1
 min read

Information Disclosure - Sensitive Information in HTTP Referrer Header

Information Disclosure - Sensitive Information in HTTP Referrer Header is a security vulnerability that occurs when the web application redirects the user to a new page, and the sensitive data is included in the URL of the new page. An attacker can exploit this vulnerability to obtain sensitive information that is not intended to be disclosed.

Vulnerabilities
2
 min read

Information Disclosure - Sensitive Information in URL

'Information Disclosure - Sensitive Information in URL' is a vulnerability that occurs when sensitive information is transmitted via a URL, which can then be accessed by unauthorized parties.

Vulnerabilities
2
 min read

Information Disclosure - Debug Error Messages

Information disclosure through debug error messages is a common vulnerability that can be exploited by attackers to gain sensitive information about your web application such as file paths, database queries, and user credentials.

Vulnerabilities
2
 min read

X-Content-Type-Options Header Missing

The 'X-Content-Type-Options Header Missing' vulnerability is a common security issue in web applications. This vulnerability arises when a web server doesn't set the 'X-Content-Type-Options' header in its response, allowing attackers to perform content-type sniffing attacks.

Vulnerabilities
2
 min read

X-Frame-Options Setting Malformed

If the X-Frame-Options header is not set correctly, it can lead to a vulnerability called "X-Frame-Options Setting Malformed." This vulnerability can be exploited by attackers to load the web page in a frame or iframe, which can lead to clickjacking attacks.

Vulnerabilities
2
 min read

X-Frame-Options Defined via META (Non-compliant with Spec)

The X-Frame-Options HTTP response header is designed to prevent clickjacking attacks. The vulnerability 'X-Frame-Options Defined via META (Non-compliant with Spec)' means that the X-Frame-Options header is being set using the 'meta' tag instead of the HTTP response header. This method can easily be bypassed by an attacker.

Vulnerabilities
1
 min read

Multiple X-Frame-Options Header Entries

The 'Multiple X-Frame-Options Header Entries' vulnerability occurs when a web application sends multiple X-Frame-Options headers with different values in the response. this can make your web application vulnerable to clickjacking attacks.

Vulnerabilities
1
 min read

X-Frame-Options Header Not Set

X-Frame-Options header is not included in the HTTP response to protect against ‘ClickJacking’ attacks.

Vulnerabilities
1
 min read

Content-Type Header Missing

The Content-Type Header Missing vulnerability is a common security flaw that occurs when a web application fails to set the correct MIME type in the Content-Type header of a response. This vulnerability can enable attackers to inject malicious code into the application or cause it to malfunction.

Vulnerabilities
1
 min read

Cross-Domain JavaScript Source File Inclusion

Cross-Domain JavaScript Source File Inclusion occurs when your web application loads JavaScript files from an external domain without proper validation, allowing an attacker to inject their own code and potentially take control of the application.

Vulnerabilities
2
 min read

Incomplete or No Cache-control Header Set

The cache-control header has not been set properly or is missing, allowing the browser and proxies to cache content.

Vulnerabilities
1
 min read

Cookie Without Secure Flag

If a cookie is not secure, it can be vulnerable to man-in-the-middle (MITM) attacks, where an attacker can intercept the data being transmitted between the client and the server, and potentially gain access to sensitive information or hijack the session. To prevent this type of attack, we need to set the 'secure' flag on the cookie.

Vulnerabilities
1
 min read

Cookie No HttpOnly Flag

When the HttpOnly flag is not set, it is possible for attackers to use cross-site scripting (XSS) attacks to steal sensitive data from cookies.

Vulnerabilities
1
 min read

In Page Banner Information Leak

'In Page Banner Information Leak' is a vulnerability that can be exploited by attackers to steal sensitive information from your web application, such as user credentials or other confidential data.

Vulnerabilities
1
 min read

Source Code Disclosure - File Inclusion

Source code disclosure through file inclusion is a serious security vulnerability that can give attackers access to sensitive information like login credentials and other data.

Vulnerabilities
5
 min read

Source Code Disclosure - SVN

Source code disclosure is a severe security vulnerability that can expose sensitive information about your application. In this case, the vulnerability is related to the SVN control system.

Vulnerabilities
1
 min read

Source Code Disclosure - Git

Source code disclosure is a severe security vulnerability that can expose sensitive information about your application. In this case, the vulnerability is related to Git, a popular version control system.

Vulnerabilities
1
 min read

Remote File Inclusion

Remote File Inclusion (RFI) is a type of web application vulnerability that allows attackers to inject and execute arbitrary code on a web server.

Vulnerabilities
5
 min read

Path Traversal

Path Traversal is a common vulnerability found in web applications that allow attackers to access files and directories outside of the intended file system.

Vulnerabilities
5
 min read

Session ID in URL Rewrite

One common vulnerability in session management is the use of session identifiers in the URL, which can be easily intercepted and exposed by attackers. This vulnerability is known as 'Session ID in URL Rewrite'.

Vulnerabilities
1
 min read

Private IP Disclosure

Private IP disclosure is a vulnerability that can be exploited by an attacker to obtain information about the internal IP addresses of a web application.

Vulnerabilities
1
 min read

Directory Browsing

Directory browsing is a vulnerability that can be exploited by an attacker to obtain sensitive information about the contents of your web application directory structure.

Vulnerabilities
1
 min read

Secure Your Startup. Today.

We make your startup secure and compliant by implementing and managing the security controls your customers require.

Get Started