OWASP Vulnerabilities
0
OWASP Rating
|
Category Rating | Vulnerabilities | ||
---|---|---|---|
A1 | Broken Access Control Improperly enforced access restrictions allow attackers to bypass authentication and access unauthorized data or functions. |
0
|
|
A2 | Cryptographic Failures Weak encryption or improper handling of sensitive data (e.g., passwords, credit card details) can lead to data leaks. |
0
|
|
A3 | Injection Malicious input (e.g., SQL, NoSQL, OS command injection) is improperly handled, allowing attackers to manipulate databases or execute unintended commands. |
0
|
|
A4 | Insecure Design Poor application design choices, such as missing security controls, increase vulnerability risks. |
0
|
|
A5 | Security Misconfiguration Default settings, exposed error messages, or unnecessary services can create security gaps. |
0
|
|
A6 | Vulnerable and Outdated Components Using outdated software, libraries, or frameworks with known vulnerabilities can lead to exploits. |
0
|
|
A7 | Identification and Authentication Failures Weak authentication mechanisms, such as poor password policies or missing multi-factor authentication (MFA), can lead to unauthorized access. |
0
|
|
A8 | Software and Data Integrity Failures Untrusted or malicious updates, dependencies, or CI/CD pipelines can lead to compromised systems. |
0
|
|
A9 | Security Logging and Monitoring Failures Lack of proper logging and alerting mechanisms delays detection and response to security incidents. |
0
|
|
A10 | Server-Side Request Forgery (SSRF) Attackers manipulate web applications to make unauthorized requests to internal or external services. |
0
|