Logo
Pattern

Discover published sets by community

Explore tens of thousands of sets crafted by our community.

Common Software Vulnerabilities

25

Flashcards

0/25

Still learning
StarStarStarStar

XML External Entity (XXE) Attack

StarStarStarStar

An attack against an application that parses XML input. This can include disclosing local files, causing DoS, and SSRF attacks. Mitigation includes disabling external entity and DTD processing in all XML parsers.

StarStarStarStar

SQL Injection

StarStarStarStar

An attack technique that exploits a security vulnerability occurring in the database layer of an application. Mitigation includes using prepared statements and parameterized queries.

StarStarStarStar

Race Condition

StarStarStarStar

A condition where the system's substantive behavior is dependent on the sequence or timing of other uncontrollable events. Mitigation includes proper synchronization, atomic transactions, and thread-safe coding practices.

StarStarStarStar

Unvalidated Redirects and Forwards

StarStarStarStar

Web applications frequently redirect and forward users to other pages or websites, and attackers can exploit these unvalidated redirects. Mitigation includes avoiding such redirects if possible, and validating URLs to only allow whitelisted destinations.

StarStarStarStar

Sensitive Data Exposure

StarStarStarStar

Involves unauthorized access to protected data such as financial, healthcare, or personal information. Mitigation includes encrypting data at rest and in transit, and not storing sensitive data unnecessarily.

StarStarStarStar

Insecure Deserialization

StarStarStarStar

A vulnerability that occurs when untrusted data is used to abuse the logic of an application. Mitigation includes using safe serialization libraries and validating serialized objects.

StarStarStarStar

Code Injection

StarStarStarStar

Occurs when an attacker introduces malicious code into a program. Mitigation includes input validation, output encoding, and use of appropriate security mechanisms in the programming language.

StarStarStarStar

Remote Code Execution (RCE)

StarStarStarStar

Allows an attacker to execute arbitrary code on a target machine or in a target process. Mitigation includes input validation, keeping software updated, and using least privilege principles.

StarStarStarStar

Buffer Overflow

StarStarStarStar

Occurs when a program writes more data to a buffer than it was intended to hold. Mitigation includes using memory-safe programming languages and functions, stack canaries, and Address Space Layout Randomization (ASLR).

StarStarStarStar

Component with Known Vulnerabilities

StarStarStarStar

Using components with known vulnerabilities, leading to a weak link in the application. Mitigation involves keeping components updated and regularly checking for vulnerabilities in dependencies.

StarStarStarStar

Cross-Site Request Forgery (CSRF)

StarStarStarStar

A web security vulnerability that allows an attacker to induce users to perform actions that they do not intend to perform. Mitigation includes using anti-CSRF tokens and SameSite cookie attributes.

StarStarStarStar

Insecure Direct Object References (IDOR)

StarStarStarStar

A security flaw that arises when an application provides direct access to objects based on user input. Mitigation includes proper access control checks and avoiding exposure of direct references to internal implementation objects.

StarStarStarStar

Insecure Cryptographic Storage

StarStarStarStar

Failing to adequately protect sensitive data with proper encryption or hashing. Mitigation includes using strong cryptographic algorithms and properly managing keys.

StarStarStarStar

Server-Side Request Forgery (SSRF)

StarStarStarStar

An exploitation where the attacker can make the application send a crafted request to an unexpected destination. Mitigation includes validation of user input, not passing raw responses to interpreters, and restricting server request targets.

StarStarStarStar

Directory Traversal

StarStarStarStar

An HTTP exploit that allows attackers to access restricted directories and execute commands outside of the web server's root directory. Mitigation includes input validation, user access control, and use of chroot jails for file access.

StarStarStarStar

Broken Access Control

StarStarStarStar

Failure to implement proper restrictions on what authenticated users are allowed to do. Mitigation includes enforcing least privilege principles, using access control lists, and proper authentication checks before performing sensitive operations.

StarStarStarStar

Broken Authentication

StarStarStarStar

Occurs when attackers are able to compromise passwords, keys, or session tokens, or exploit other implementation flaws to assume users' identities. Mitigation includes multi-factor authentication, strong password policies, and secure session management.

StarStarStarStar

Insufficient Logging & Monitoring

StarStarStarStar

Inadequate logging of events and lack of monitoring systems that could detect or alert on malicious activities. Mitigation includes implementing comprehensive logging and real-time monitoring, along with incident response plans.

StarStarStarStar

Use of Hardcoded Credentials

StarStarStarStar

Inclusion of sensitive information like passwords or secret keys directly within source code. Mitigation includes using environment variables, secure vaults, or configuration files to handle credentials.

StarStarStarStar

Man-in-the-Middle (MitM) Attack

StarStarStarStar

Occurs when an attacker secretly relays or alters the communication between two parties who believe they are directly communicating with each other. Mitigation includes using HTTPS encryption, certificate pinning, and strong mutual authentication.

StarStarStarStar

Cross-Site Scripting (XSS)

StarStarStarStar

A type of injection where malicious scripts are injected into trusted websites. Mitigation includes using Content Security Policy, validating and sanitizing user input, and using appropriate response headers.

StarStarStarStar

Session Hijacking

StarStarStarStar

The exploitation of a valid computer session to gain unauthorized access to information or services in a computer system. Mitigation includes using HTTPS, secure cookies, and implementing proper session management.

StarStarStarStar

Clickjacking

StarStarStarStar

A technique where the attacker tricks a user into clicking on something different from what the user perceives. Mitigation includes using the X-Frame-Options header, framebusting scripts, and Content Security Policy (CSP).

StarStarStarStar

Security Misconfiguration

StarStarStarStar

Occurs when security settings are defined, implemented, and maintained as defaults. Mitigation includes regular reviews of security configurations and least privilege access policies.

StarStarStarStar

Improper Error Handling

StarStarStarStar

Revealing too much information to the users through error messages, which can lead to further exploitation. Mitigation includes configuring error handling to prevent stack traces from being displayed and implementing custom error pages.

Know
0
Still learning
Click to flip
Know
0
Logo

© Hypatia.Tech. 2024 All rights reserved.