OWASP - OWASP Top 10: Difference between revisions

From GCA ACT
Jump to navigationJump to search
(Updated description via script)
Tag: Reverted
(Updated via script)
Tag: Manual revert
 
Line 1: Line 1:
=Description=<br>
=Description=
<br>
OWASP Top 10 is a classification of the most common attacks on the web. It has 10 entries, and these are:
OWASP Top 10 is a classification of the most common attacks on the web. It has 10 entries, and these are:


Injection: Injection flaws, such as SQL injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s goal is to trick the interpreter into executing unintended commands or accessing data without proper authorization.=More Information=
Injection: Injection flaws, such as SQL injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s goal is to trick the interpreter into executing unintended commands or accessing data without proper authorization.
 
Broken Authentication and Session Management: Attackers can exploit poorly implemented authentication and
<br>
=More Information=
<br>
<br>
https://owasp.org/Top10/A00_2021_Introduction/
https://owasp.org/Top10/A00_2021_Introduction/

Latest revision as of 05:03, 23 April 2024

Description


OWASP Top 10 is a classification of the most common attacks on the web. It has 10 entries, and these are:

Injection: Injection flaws, such as SQL injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker’s goal is to trick the interpreter into executing unintended commands or accessing data without proper authorization.

Broken Authentication and Session Management: Attackers can exploit poorly implemented authentication and

More Information


https://owasp.org/Top10/A00_2021_Introduction/