News & Articles

Our articles and guides on how to protect your startup from cybercriminals

Read about all the security issues that we find during our automated security reviews, and how to solve them.

Latest Articles

Timestamp Disclosure

The 'Timestamp Disclosure' vulnerability refers to the disclosure of sensitive system information, such as the timestamp of the server or the underlying technology stack used, which can aid potential attackers in exploiting weaknesses.

Vulnerabilities

Backup File Disclosure

The 'Backup File Disclosure' vulnerability is a critical security issue that can expose sensitive information about your web application. Attackers may exploit this vulnerability to gain unauthorized access to backup files, which can contain sensitive data, configuration files, or even source code.

Vulnerabilities

Base64 Disclosure

The 'Base64 Disclosure' vulnerability occurs when sensitive information is encoded using Base64 and then unintentionally exposed or disclosed within the application's source code or response data.

Vulnerabilities

Use of SAML

SAML is an XML-based standard used for exchanging authentication and authorization data between identity providers and service providers. The 'Use of SAML' vulnerability refers to incorrect usage or misconfigurations of SAML, which can introduce vulnerabilities that can be exploited by attackers.

Vulnerabilities

Deprecated Feature Policy Header Set

The 'Deprecated Feature Policy Header Set' vulnerability refers to the usage of deprecated features in web applications. Deprecated features are those that have been marked as outdated or obsolete and may pose security risks.

Vulnerabilities

Permissions Policy Header Not Set

The 'Permissions Policy Header Not Set' vulnerability is a common issue that affects many web applications. It occurs when the web application does not set the appropriate permissions policy header, which can allow unauthorized access or exploitation of the application.

Vulnerabilities