A6-Sensitive Data Exposure

Sensitive Data Exposure is difficult to exploit wheres prevalence and detect-ability is less common, but the impact is severe. Clearly if some sensitive data...

OWASP A5- Security Misconfiguration

Security Misconfiguration prevalence are quiet common and this risk can be easily exploited,anyway the impact of risk would be moderate. It completely depends upon...

A4-Insecure Direct Object References

Insecure Direct Object References prevalence are quiet common and this risk can be easily exploited, anyway the impact of risk would be moderate. Here is...

OWASP A2 – Broken Authentication and Session Management

Broken Authentication and Session Management vulnerability allow's attackers either to capture or bypass the authentication methods that are used by a web application. Impact would be severe...

A1 Injection OWSAP

A1 Injection vulnerability is currently ranked #1 on the OWASP Top 10 chart which means that it is responsible for a largeportion of public...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security