OWASP Top 10 Flashcards
A10: Insufficient Logging & Monitoring
Monitoring (Logging) and Detection (IR)
A9: Using Components with known vulnerabilities
Libraries, frameworks, & other software modules run w/same privilege as application. If a vulnerable component is exploited, such attacks facilitate serious data loss or server take over; .i.e. API running w/vulnerable components.
A8: Insecure Deserialization
often leads to remote code execution; they can lead to replay, injection, and privilege escalation attacks.
A7: XSS
When an application includes untrusted data w/out validation.
A6: Security Misconfiguration
insecure default configuration, misconfiguration. (patched & updated)
A5: Broken Access Control
Restriction on what authenticated allows to do are often not properly endorced.
A4: XML External Entities (XXE)
Older or Poorly configured XML processors evaluate external entity reference within XML documents. External Entities can be used to disclose internal files.
A3: Sensitive Data Exposure
Web App & API do not properly protect sensitive data in transit and at rest.
A2: Broken Authentication
Authentication and session management is implemented incorrectly. Allows attacker to compromise passwords, keys, sessions or tokens.
A1: Injection
SQL, NoSQL, OS, and LDAP occurs when untrusted data is sent to an interpreter as part of the command or query.