OWASP Vulnerabilities
0
OWASP Rating
|
Category Rating | Vulnerabilities | ||
---|---|---|---|
A1 | Injection Malicious input (e.g., SQL, NoSQL, OS command injection) is improperly handled, allowing attackers to manipulate databases or execute unintended commands. |
0
|
|
A2 | Broken Authentication Weak authentication mechanisms, such as poor password policies or missing multi-factor authentication (MFA), allow attackers to compromise user accounts. |
0
|
|
A3 | Sensitive Data Exposure Improper encryption or insecure storage/transmission of sensitive data (e.g., passwords, credit card details) leads to data breaches. |
0
|
|
A4 | XML External Entities (XXE) Improper processing of XML input allows attackers to read internal files, execute remote code, or launch DoS attacks. |
0
|
|
A5 | Broken Access Control Weak or missing access controls allow unauthorized users to access or modify restricted data or functions. |
0
|
|
A6 | Security Misconfiguration Default settings, exposed error messages, or unnecessary services create security vulnerabilities. |
0
|
|
A7 | Cross-Site Scripting (XSS) Malicious scripts are injected into web pages, allowing attackers to steal session cookies, deface websites, or redirect users. |
0
|
|
A8 | Insecure Deserialization Untrusted or improperly validated serialized data allows attackers to execute remote code or manipulate objects. |
0
|
|
A9 | Using Components with Known Vulnerabilities Outdated software, libraries, or frameworks with known security flaws can be exploited by attackers. |
0
|
|
A10 | Insufficient Logging & Monitoring Poor or missing logging and alerting mechanisms delay the detection and response to security incidents. |
0
|