News & Articles

Our articles and guides on how to protect your startup from cybercriminals

Read about all the security issues that we find during our automated security reviews, and how to solve them.

Latest Articles

Storable but Non-Cacheable Content

The Storable but Non-Cacheable Content vulnerability is a type of vulnerability that occurs when web pages or other types of content are stored in a way that makes them accessible to attackers. This vulnerability typically occurs when web pages or other types of content are stored in a way that does not allow them to be cached by the web browser or other caching mechanisms.

Vulnerabilities

Non-Storable Content

Non-Storable Content is a common vulnerability that affects many web applications. This vulnerability arises when the server is unable to store certain types of content, allowing an attacker to upload malicious files or execute arbitrary code. This vulnerability can be exploited to execute various types of attacks, such as Cross-Site Scripting (XSS), Remote Code Execution (RCE), and File Inclusion attacks.

Vulnerabilities

Content Cacheability

Content cacheability vulnerabilities can occur when the cacheability of the website content is not set up correctly, which can lead to the exposure of sensitive data, reduced site performance, and other issues.

Vulnerabilities

Remote Code Execution - Shell Shock

Remote Code Execution (RCE) is a type of security vulnerability that allows an attacker to execute arbitrary code on a target system or application. Shell Shock is a specific type of RCE vulnerability that affects Unix-based systems and is caused by a flaw in the Bash shell.

Vulnerabilities

HTTPS Content Available via HTTP

The vulnerability 'HTTPS Content Available via HTTP' means that while your web application is using HTTPS to encrypt communication, it still allows users to access some resources via HTTP, which is not secure. This can be exploited by attackers to intercept sensitive data or carry out a man-in-the-middle attack.

Vulnerabilities

Insecure Component

Insecure component vulnerabilities are a common type of security issue found in web applications. These vulnerabilities occur when a web application uses a vulnerable or outdated component that can be exploited by attackers to gain unauthorized access to the system or steal sensitive data.

Vulnerabilities