News & Articles

Our articles and guides on how to protect your startup from cybercriminals

Read about all the security issues that we find during our automated security reviews, and how to solve them.

Latest Articles

SQL Injection - PostgreSQL

SQL injection is a serious vulnerability that allows attackers to manipulate your web application's database queries and gain unauthorized access to data or perform malicious actions. 'SQL Injection - PostgreSQL' refers specifically to this vulnerability in PostgreSQL databases.

Vulnerabilities

SQL Injection - Oracle

SQL injection is a serious security vulnerability that occurs when malicious actors can manipulate an application's database queries to execute unauthorized SQL commands. The 'SQL Injection - Oracle' vulnerability refers specifically to this vulnerability in Oracle databases used in web applications.

Vulnerabilities

SQL Injection - Hypersonic SQL

SQL Injection is a severe security vulnerability that allows attackers to manipulate an application's database by injecting malicious SQL code, which can potentially lead to unauthorized access, data breaches, and data manipulation. This vulnerability occurs when user-supplied data is concatenated directly into SQL queries without proper validation or parameterization.

Vulnerabilities

SQL Injection - MySQL

SQL Injection is a security vulnerability that occurs when untrusted user inputs are directly concatenated into SQL queries without proper validation or sanitization. Attackers can exploit this by injecting malicious SQL code, tricking the application into executing unintended database commands.

SQL Injection

SQL injection is a serious security vulnerability that occurs when an attacker can manipulate input data to execute arbitrary SQL commands on your web application's backend database. This can lead to data breaches, unauthorized access, and potential loss of sensitive information.

Vulnerabilities

Cross Site Scripting (Persistent) - Spider

Cross-Site Scripting (XSS) is a common web application vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users. 'Cross-Site Scripting (Persistent) - Spider' occurs when user-supplied data is improperly handled and stored, leading to malicious code execution when that data is retrieved and displayed, potentially compromising user data or performing unauthorized actions.

Vulnerabilities