Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

OWASP Top 10

10

Flashcards

0/10

Still learning
StarStarStarStar

Rank 2: Broken Authentication

StarStarStarStar

When application functions related to authentication and session management are implemented incorrectly, attackers can compromise passwords, keys, or session tokens, or exploit other implementation flaws to assume users' identities. Example: An attacker could use stolen session tokens to impersonate a user.

StarStarStarStar

Rank 6: Security Misconfiguration

StarStarStarStar

Security Misconfiguration happens when security settings are defined, implemented, and maintained poorly, or when default accounts and unused services are not removed. Example: A server with default admin credentials is left accessible to attackers.

StarStarStarStar

Rank 7: Cross-Site Scripting (XSS)

StarStarStarStar

Cross-Site Scripting occurs when an attacker uses a web application to send malicious scripts to end-users. These vulnerabilities allow attackers to execute scripts in the user's browser, which can hijack user sessions or deface websites. Example: A comment section on a website allows the injection of a script that steals cookies.

StarStarStarStar

Rank 4: XML External Entities (XXE)

StarStarStarStar

XXE vulnerabilities occur when an application processes XML input that references external entities. Attackers can exploit vulnerable XML processors if they accept XML input from an untrusted source. Example: An attacker can use XXE to retrieve files on a server.

StarStarStarStar

Rank 8: Insecure Deserialization

StarStarStarStar

Insecure Deserialization flaws occur when untrusted data is used to abuse the logic of an application, inflict a denial of service (DoS), or execute arbitrary code when objects are deserialized. Example: An attacker modifies serialized objects to grant themselves admin privileges.

StarStarStarStar

Rank 9: Using Components with Known Vulnerabilities

StarStarStarStar

Applications using components with known vulnerabilities may undermine application defenses and enable various attacks. Example: An application using an old, vulnerable version of a library that allows remote code execution.

StarStarStarStar

Rank 10: Insufficient Logging & Monitoring

StarStarStarStar

Insufficient logging and monitoring, coupled with missing or ineffective integration with incident response, allows attackers to further attack systems, maintain persistence, pivot to more systems, and tamper, extract, or destroy data. Example: An attacker dwells in a network undetected due to insufficient monitoring and inadequate alerting protocols.

StarStarStarStar

Rank 3: Sensitive Data Exposure

StarStarStarStar

Sensitive data exposure occurs when an application does not adequately protect sensitive information from being disclosed to attackers. This can include data in transit or at rest. Example: An unencrypted database with personal user information gets leaked.

StarStarStarStar

Rank 1: Injection

StarStarStarStar

Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. Adversaries use it to read or modify data without authorization. Example: An attacker might use SQL injection to manipulate a query to an SQL database.

StarStarStarStar

Rank 5: Broken Access Control

StarStarStarStar

Broken Access Control vulnerabilities are related to failures in restrictions on what authenticated users are allowed to do. Attackers can exploit these flaws to access unauthorized functionality or data. Example: A user changes the URL to access another user's account management page without proper authorization.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.