HomeVulnerabilities

Vulnerabilities

What You Need to Know About Internal Penetration Tests

Internal Penetration Testing differs from a vulnerability assessment in that it exploits vulnerabilities to determine what information was exposed.

Ensure Your Organization’s Security With Credential-Based Vulnerability Assessment

Authorized (Authenticated) vulnerability scans will provide the most accurate and detailed vulnerability assessment results, regardless of the target platform or application.

What is XPATH Injection and How to Prevent It?

By deliberately sending malformed information to the application, the attacker can determine how XML data is structured or access data that would otherwise not be accessible.

What is LDAP Injection and How to Prevent It?

LDAP Injection is an attack that is used to manipulate web-based apps that create user-input based LDAP expressions. When an application cannot correctly clear user login, it is possible to change LDAP statements using a Local Proxy.

What is OS Command Injection and How to Prevent It?

OS Command Injection is a web vulnerability that could allow an attacker to execute commands from an arbitrary operating system (OS) on the server running an application, often endangering the application and all its information.

What is SQL Injection and How to Prevent It?

SQL Injection is an attack method used to attack applications that are driven by databases. The attacker adds new SQL statements to the relevant field on the standard application screen, using SQL language features.

What is Cross-Site Scripting (XSS) and How to Prevent It?

Cross-Site Scripting (XSS) is a vulnerability that occurs when the software does not pass the input received from the user through the necessary HTML and JavaScript filters.

Want to stay up to date with the latest news?

We would love to hear from you! Please fill in your details and we will stay in touch. It's that simple!