Saturday, September 19, 2020
Cross Site Request Forgery

A8-Cross-Site Request Forgery (CSRF)

Cross Site Request Forgery is one of the most common form of attack by online spammers and scammers. Exploicity of this attack is bit complex, it's prevalence is common. But CSRF attacks can be predicted easily and their impact is...
access-control

A7 Missing Function Level Access Control

Function Level Access Control can be exploited easily, if there is an missing access control on resource control, exploiting the risk is simple as plugging the URL in browser. Privelance is very common, whereas the detect-ability ratio is Average and...

A4-Insecure Direct Object References

Insecure Direct Object References prevalence are quiet common and this risk can be easily exploited, anyway the impact of risk would be moderate. Here is the sample scenario, we are having a attacker, webserver and a Database.Here what the attacker...
A-9 Using Components with known Vulnerabilities

A-9 Using Components with known Vulnerabilities – Every Developers Should aware

Exploitability of the risk is average, Attacker needs to identify the weak part through scanning or manual analysis. But the risk is widely spread, Many application has these issues on the grounds that most development teams don't concentrate on guaranteeing their...

A6-Sensitive Data Exposure

Sensitive Data Exposure is difficult to exploit wheres prevalence and detect-ability is less common, but the impact is severe. Clearly if some sensitive data is leaked it will cause a severe fall out. Here we have a user login's into...
ethicalhackersacademy