News & Articles

Our articles and guides on how to protect your startup from cybercriminals

Read about all the security issues that we find during our automated security reviews, and how to solve them.

Latest Articles

Parameter Tampering

The Parameter tampering vulnerability occurs when an attacker manipulates parameters sent to a web application to gain unauthorized access, alter data, or exploit vulnerabilities.

Vulnerabilities

CRLF Injection

CRLF (Carriage Return Line Feed) injection is a type of web application vulnerability that allows an attacker to manipulate the HTTP response headers by injecting unauthorized line breaks. This can lead to various security risks, such as HTTP response splitting attacks, session hijacking, cross-site scripting (XSS), and more.

Vulnerabilities

Integer Overflow Error

The 'Integer Overflow Error' vulnerability occurs when an integer value exceeds its maximum limit, leading to unexpected behavior and potential security risks, including memory corruption, crashes, and security exploits.

Vulnerabilities

Format String Error

'Format String Error' is a common vulnerability that can be exploited to compromise the security of web applications. This vulnerability occurs when untrusted user input is directly used in a formatted string function without proper validation or sanitization. Attackers can exploit this vulnerability to read sensitive data, modify memory, execute arbitrary code, or cause a denial-of-service (DoS) condition.

Buffer Overflow

Buffer overflow is a common vulnerability that occurs when a program tries to write data beyond the boundaries of a fixed-size buffer. This can lead to overwriting adjacent memory areas, potentially allowing attackers to inject malicious code and gain control over the application.

Vulnerabilities

External Redirect

The 'External Redirect' vulnerability poses a significant risk to web applications, potentially leading to phishing attacks or unauthorized redirection of users to malicious websites. This vulnerability occurs when an application allows user-controlled input to be used in redirecting to external URLs. Attackers can exploit this by crafting malicious URLs and tricking users into visiting harmful websites.

Vulnerabilities