
OWASP Top 10 Overview ? #bugbounty #Infosec #bugbountytips See?(1/12)
? Broken access Control Broken access control is a security vulnerability that can occur in many different types of applications and systems. Here are a few examples of broken access control:
? Cryptographic failure Cryptographic failure refers to a situation where a cryptographic system or algorithm fails to provide the intended level of security. Some common causes of cryptographic failure include:
? Injection It's type of security vulnerability that occurs when an attacker able to execute malicious code or commands by injecting them into application or system. occur in applications and systems, and they can have serious consequences if they are not properly mitigated.
? Insecure Design Designing systems and applications in a way that introduces security vulnerabilities or weaknesses. This can happen when designers and developers do not consider security during the design process.
? Security Misconfiguration Security misconfiguration is a type of security vulnerability occurs when an application or system is improperly configured. This can happen when security settings are not properly configured Some common causes of security misconfiguration include:
? Vulnerability and Outdated content Vulnerability and outdated content are two related security issues that can affect applications and systems. Check Out Below IMG for more detail :
? Identification and authentication failures Occur when an application or system fails to properly identify and authenticate users. This can happen when an application or system does not have adequate mechanisms in place for verifying user identities For more detail : IMG?
? Software and data integrity failures Software and data integrity failures are security issues that can occur when an application or system fails to maintain the integrity of its software or data. For more detail : Read IMG?
? Security logging and monitoring failures Security logging and monitoring failures are security issues that can occur when an application or system fails to properly log and monitor security-related events and activities. For more Detail : Read IMG?
? SSRF SSRF stands for Server-Side Request Forgery. It is a type of web security vulnerability that allows attackers to send malicious requests from a vulnerable server to other internal or external systems. Here is an example of how an SSRF vulnerability might occur:
Thanks You So much For Reading this Amazing Thread ?On : OWASP Top 10 Please Comment about how it is If you want : ==== Join My Bugbounty Group :====
Follow us on Twitter
to be informed of the latest developments and updates!
Follow @tivitikothreadYou can easily use to @tivitikothread bot for create more readable thread!