Computer Security
What is XSS (Cross-Site Scripting)? – A Detailed Understanding Of the Type of XSS
XSS is a very commonly exploited vulnerability type that is very widely spread and easily detectable, and also it is one of the important vulnerabilities in OWASP TOP 10.Cross-site...
OWASP - Top 10
Cross-Site Request Forgery (CSRF) – An OWASP Vulnerability – Detailed Explanation
Cross Site Request Forgery is one of the most common form of attack by online spammers and scammers. Exploicity of this attack is bit...
OWASP - Top 10
OWASP A10-Unvalidated Redirects and Forwards
Web applications often redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages.Without proper validation, attackers...
OWASP - Top 10
A-9 Using Components with known Vulnerabilities – Every Developers Should aware
Exploitability of the risk is average, Attacker needs to identify the weak part through scanning or manual analysis.But the risk is widely spread, Many application...
OWASP - Top 10
A7 Missing Function Level Access Control
Function Level Access Control can be exploited easily, if there is an missing access control on resource control, exploiting the risk is simple as...
OWASP - Top 10
A6-Sensitive Data Exposure
Sensitive Data Exposure is difficult to exploit wheres prevalence and detect-ability is less common, but the impact is severe. Clearly if some sensitive data...
OWASP - Top 10
OWASP A5- Security Misconfiguration
Security Misconfiguration prevalence are quiet common and this risk can be easily exploited,anyway the impact of risk would be moderate. It completely depends upon...
OWASP - Top 10
A4-Insecure Direct Object References
Insecure Direct Object References prevalence are quiet common and this risk can be easily exploited, anyway the impact of risk would be moderate.Here is...
OWASP - Top 10
OWASP A2 – Broken Authentication and Session Management
Broken Authentication and Session Management vulnerability allow's attackers either to capture or bypass the authentication methods that are used by a web application. Impact would be severe...
OWASP - Top 10
A1 Injection OWSAP
A1 Injection vulnerability is currently ranked #1 on the OWASP Top 10 chart which means that it is responsible for a largeportion of public...