OWASP - OWASP Top 10: Difference between revisions
From GCA ACT
Jump to navigationJump to search
(Created via script) |
(Updated via script) Tag: Manual revert |
||
(One intermediate revision by the same user not shown) |
Latest revision as of 05:03, 23 April 2024
Description
OWASP Top 10 is a classification of the most common attacks on the web. It has 10 entries, and these are:
Injection: Injection flaws, such as SQL injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s goal is to trick the interpreter into executing unintended commands or accessing data without proper authorization.
Broken Authentication and Session Management: Attackers can exploit poorly implemented authentication and