Lesson Category: OWASP
Conclusion The Top 10 List covers a wide range of risks. But many other risks exist that may be worth considering and evaluating within the specific context of your …
Insufficient Logging And Monitoring If there is insufficient logging and monitoring it could result in delayed or failed detection of a breach. In such cases a robust, timely, and …
Using Components With Known Vulnerabilities There are many scenarios in which you could be vulnerable under this threat classification. For instance, if you do not know the versions of …
Insecure Deserialization If applications and APIs deserialize hostile or tampered objects supplied by an attacker it will make them vulnerable. This can result in two primary types of attacks: …
Cross Site Scripting (XXS) Cross-Site Scripting (XSS) attacks are a type of injection attack, in which malicious scripts are injected into trusted and otherwise benign web sites. An attacker …
Security Misconfiguration If security systems or protocols are misconfigured, it defeats the purpose of having them in the first place. But, quite often that is exactly what happens. Security …
Broken Access Control Access control mechanisms ensure that users cannot perform business or system functions outside of their intended permissions. Access Control failures typically lead to unauthorized information disclosure, …
XML External Entities (XXE) XML-based web services and applications might be vulnerable to this form of attack. Even downstream integrations might be vulnerable. For instance, if the application accepts …
Sensitive Data Exposure It is important to protect Sensitive Data both in transit and at rest. Sensitive information like passwords, credit card numbers, health records, personal information and business …
Broken Authentication This type of vulnerability occurs when there are weaknesses during Authentication, Confirmation of the user’s identity, and session management. There are several simple and easily overlooked ways …