OWASP TOP 10 Flashcards
Vuln 1
1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)
Vuln 2
1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)
Vuln 3
1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)
vuln 4
1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)
vuln 5
1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)
vuln 6
1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)
vuln 7
1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)
vuln 8
1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)
vuln 9
1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)
vuln 10
1Broken Access Control
2Cryptographic Failures
3Injection
4Insecure Design
5Security Misconfiguration
6Vulnerable and Outdated Components
7Identification and Authentication Failures
8Software and Data Integrity Failures
9Security Logging and Monitoring Failures
10Server-Side Request Forgery (SSRF)