OWASP - OWASP Top 10: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Created via script) |
(Updated description via script) Tag: Reverted |
||
Line 1: | Line 1: | ||
=Description= | =Description=<br> | ||
<br> | |||
OWASP Top 10 is a classification of the most common attacks on the web. It has 10 entries, and these are: | OWASP Top 10 is a classification of the most common attacks on the web. It has 10 entries, and these are: | ||
Injection: Injection flaws, such as SQL injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s goal is to trick the interpreter into executing unintended commands or accessing data without proper authorization. | Injection: Injection flaws, such as SQL injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s goal is to trick the interpreter into executing unintended commands or accessing data without proper authorization.=More Information= | ||
=More Information= | |||
<br> | <br> | ||
https://owasp.org/Top10/A00_2021_Introduction/ | https://owasp.org/Top10/A00_2021_Introduction/ |
Revision as of 04:48, 23 April 2024
=Description=
OWASP Top 10 is a classification of the most common attacks on the web. It has 10 entries, and these are:
Injection: Injection flaws, such as SQL injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s goal is to trick the interpreter into executing unintended commands or accessing data without proper authorization.=More Information=
https://owasp.org/Top10/A00_2021_Introduction/