OWSAP

Scanning for OWASP Top 10 With w3af – An Open-source Web Application Security Scanner

w3af is an open-source web application security scanner (OWASP Top 10) that enables developers and penetration testers to distinguish and…

1 year ago

Cross-Site Request Forgery (CSRF) – An OWASP Vulnerability – Detailed Explanation

Cross Site Request Forgery is one of the most common form of attack by online spammers and scammers. Exploicity of…

3 years ago

OWASP A10-Unvalidated Redirects and Forwards

Web applications often redirect and forward users to other pages and websites, and use untrusted data to determine the destination…

8 years ago

A-9 Using Components with known Vulnerabilities – Every Developers Should aware

Exploitability of the risk is average, Attacker needs to identify the weak part through scanning or manual analysis. But the risk…

8 years ago