Thursday, August 13, 2020
A-9 Using Components with known Vulnerabilities

A-9 Using Components with known Vulnerabilities – Every Developers Should aware

Exploitability of the risk is average, Attacker needs to identify the weak part through scanning or manual analysis. But the risk is widely spread, Many application has these issues on the grounds that most development teams don't concentrate on guaranteeing their...
Unvalidated Redirects and Forwards

OWASP A10-Unvalidated Redirects and Forwards

Web applications often redirect and forward users to other pages and websites, and use untrusted data to determine the destination pages. Without proper validation, attackers can redirect victims to phishing or malware sites, or use forwards to use unauthorized pages. Sometime,...

OWASP A2 – Broken Authentication and Session Management

Broken Authentication and Session Management vulnerability allow's attackers either to capture or bypass the authentication methods that are used by a web application. Impact would be severe as attacker can able to login account as normal user. When visiting a website to access...

A6-Sensitive Data Exposure

Sensitive Data Exposure is difficult to exploit wheres prevalence and detect-ability is less common, but the impact is severe. Clearly if some sensitive data is leaked it will cause a severe fall out. Here we have a user login's into...

OWASP A5- Security Misconfiguration

Security Misconfiguration prevalence are quiet common and this risk can be easily exploited,anyway the impact of risk would be moderate. It completely depends upon how bad the security Misconfiguration is, it narrow downs the attacker to gain access to unsecured...
ethicalhackersacademy