OWASP TOP 10 Flashcards

1
Q

Vuln 1

A

1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Vuln 2

A

1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vuln 3

A

1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

vuln 4

A

1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

vuln 5

A

1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

vuln 6

A

1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

vuln 7

A

1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

vuln 8

A

1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

vuln 9

A

1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

vuln 10

A

1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly