Detectify
Knowledge Base

Back to Knowledge Base

Support Center

Remediation tips

  • Cross-site Scripting

    Cross-site scripting is a type of attack that can be carried out to compromise users of a website. The exploit...

    Jul 25, 2016 11:47AM CEST
  • SQL Injection

    SQL injection flaws are very critical as they allow a remote attacker to gain access to the underlying databas...

    Jul 25, 2016 11:48AM CEST
  • Local File Inclusion / Path Traversal

    Local file inclusion (LFI) and path traversal vulnerabilities occur when user-supplied data is able to probe t...

    Jul 25, 2016 11:48AM CEST
  • Microsoft IIS Tilde Vulnerability

    This vulnerability is caused by the tilde character (~) with the old DOS 8.3 name convention (SFN) in a HTTP r...

    Sep 12, 2017 02:30PM CEST
  • Input Autocomplete

    Appears when you tell the browser to save your password. The browser stores completed form fields and password...

    Jul 22, 2016 03:43PM CEST
  • PHP NULL Session

    The PHP null session is a vulnerability that enables the attacker to disclose the path of the executing script...

    Aug 05, 2016 12:22PM CEST
  • Mixed Content

    Mixed content issues arise when web sites use HTTPS to deliver their pages, but allow some of the resources to...

    Aug 08, 2016 10:46AM CEST
  • HTTPS Stripping

    HTTPS Stripping forces a victim’s browser into communicating with an adversary in plaintext HTTP instead of th...

    Aug 05, 2016 12:23PM CEST
  • SSL BEAST

    Only SSLv3.0, TLSv1.0 and lower protocol versions of HTTPS are vulnerable. This vulnerability is based on a mi...

    Aug 05, 2016 12:23PM CEST
  • Login CSRF

    Login CSRF is a type of attack where the attacker can force the user to log in to the attacker’s account on a ...

    Jul 06, 2017 04:49PM CEST
support@detectify.com
https://cdn.desk.com/
false
desk
Loading
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
about
false
Invalid characters found
/customer/en/portal/articles/autocomplete