A6-Sensitive Data Exposure

Sensitive Data Exposure is difficult to exploit wheres prevalence and detect-ability is less common, but the impact is severe. Clearly if some sensitive data is leaked it will cause a severe fall out. Here we have a user login's into...

OWASP A2 – Broken Authentication and Session Management

Broken Authentication and Session Management vulnerability allow's attackers either to capture or bypass the authentication methods that are used by a web application. Impact would be severe as attacker can able to login account as normal user. When visiting a website to access...
Cross Site Request Forgery

A8-Cross-Site Request Forgery (CSRF)

Cross Site Request Forgery is one of the most common form of attack by online spammers and scammers. Exploicity of this attack is bit complex, it's prevalence is common. But CSRF attacks can be predicted easily and their impact is...

OWASP A5- Security Misconfiguration

Security Misconfiguration prevalence are quiet common and this risk can be easily exploited,anyway the impact of risk would be moderate. It completely depends upon how bad the security Misconfiguration is, it narrow downs the attacker to gain access to unsecured...

A4-Insecure Direct Object References

Insecure Direct Object References prevalence are quiet common and this risk can be easily exploited, anyway the impact of risk would be moderate. Here is the sample scenario, we are having a attacker, webserver and a Database.Here what the attacker...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

DDoS Attack Mitigation Plan - Free Trial

Most Popular

Recommended