GBH
GBH
Home OWASP - Top 10

OWASP - Top 10

Top 10 vulnerabilities with WebApplication

A-9 Using Components with known Vulnerabilities – Every Developers Should aware

0
Exploitability of the risk is average, Attacker needs to identify the weak part through scanning or manual analysis. But the risk is widely spread, Many application...

A7 Missing Function Level Access Control

4
Function Level Access Control can be exploited easily, if there is an missing access control on resource control, exploiting the risk is simple as...

A6-Sensitive Data Exposure

1
Sensitive Data Exposure is difficult to exploit wheres prevalence and detect-ability is less common, but the impact is severe. Clearly if some sensitive data...

OWASP A5- Security Misconfiguration

1
Security Misconfiguration prevalence are quiet common and this risk can be easily exploited,anyway the impact of risk would be moderate. It completely depends upon...

A4-Insecure Direct Object References

2
Insecure Direct Object References prevalence are quiet common and this risk can be easily exploited, anyway the impact of risk would be moderate. Here is...

OWASP A2 – Broken Authentication and Session Management

1
Broken Authentication and Session Management vulnerability allow's attackers either to capture or bypass the authentication methods that are used by a web application. Impact would be severe...

A1 Injection OWSAP

14
A1 Injection vulnerability is currently ranked #1 on the OWASP Top 10 chart which means that it is responsible for a largeportion of public...

Complete Free Website Security Check

Website

Recent Posts