We talk about the latest news and changes to the OWASP Top 10, which lists the biggest security holes in web apps, in this section. Keep up with changes, updates, and new information about these top vulnerabilities. This includes new threats, ways to protect against them, and the best ways to secure web apps. Our coverage gives you useful information to help you understand and fix the most important OWASP-identified security problems.
XSS is a very commonly exploited vulnerability type that is very widely spread and easily detectable, and also it is…
Cross Site Request Forgery is one of the most common form of attack by online spammers and scammers. Exploicity of…
Web applications often redirect and forward users to other pages and websites, and use untrusted data to determine the destination…
Exploitability of the risk is average, Attacker needs to identify the weak part through scanning or manual analysis. But the risk…
Function Level Access Control can be exploited easily, if there is an missing access control on resource control, exploiting the…
Sensitive Data Exposure is difficult to exploit wheres prevalence and detect-ability is less common, but the impact is severe. Clearly…
Security Misconfiguration prevalence are quiet common and this risk can be easily exploited,anyway the impact of risk would be moderate.…
Insecure Direct Object References prevalence are quiet common and this risk can be easily exploited, anyway the impact of risk…
Broken Authentication and Session Management vulnerability allow's attackers either to capture or bypass the authentication methods that are used by a web…
A1 Injection vulnerability is currently ranked #1 on the OWASP Top 10 chart which means that it is responsible for…