Wednesday, April 26, 2017
Unvalidated Redirects and Forwards

OWASP A10-Unvalidated Redirects and Forwards

Web applications often redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper validation, attackers can redirect victims to phishing or malware sites, or use forwards to use unauthorized pages. Sometime,...
A-9 Using Components with known Vulnerabilities

A-9 Using Components with known Vulnerabilities – Every Developers Should aware

Exploitability of the risk is average, Attacker needs to identify the weak part through scanning or manual analysis. But the risk is widely spread, Many application has these issues on the grounds that most development teams don't concentrate on guaranteeing their...
Cross Site Request Forgery

A8-Cross-Site Request Forgery (CSRF)

Cross Site Request Forgery is one of the most common form of attack by online spammers and scammers. Exploicity of this attack is bit complex, it's prevalence is common. But CSRF attacks can be predicted easily and their impact is...
access-control

A7 Missing Function Level Access Control

Function Level Access Control can be exploited easily, if there is an missing access control on resource control, exploiting the risk is simple as plugging the URL in browser. Privelance is very common, whereas the detect-ability ratio is Average and...

A6-Sensitive Data Exposure

Sensitive Data Exposure is difficult to exploit wheres prevalence and detect-ability is less common, but the impact is severe. Clearly if some sensitive data is leaked it will cause a severe fall out. Here we have a user login's into...

Most Popular