OWASP Top 10

OWASP Vulnerabilities and Attacks Simplified: Business Manager Series ÔÇô Part II

OWASP Vulnerabilities and Attacks Simplified: Business Manager Series ÔÇô Part II

Following the same approach as in Part 1, we aim to break down vulnerabilities and simplify them to the basic level of their nature and implications with examples and illustrations.

In this second of this four-part series, we are going to take next five of OWASP Top 10 web application vulnerabilities, which are:
  • Sensitive Data Exposure
  • Missing Function Level Access Control
  • Cross-Site Request Forgery (CSRF)
  • Using Components with Known Vulnerabilities
  • Unvalidated Redirects and Forwards
Please read the complete article in attached pdf.
 
Article Sponsored by Indusface
 

Hacking, OWASP Top 10 and Business Impact: Business Manager Series - Part I

Hacking, OWASP Top 10 and Business Impact: Business Manager Series - Part I

With this OWASP educative series on web and mobile applications, we aim to break down vulnerabilities and simplify them to the basic level of their nature and implications with examples and illustrations.

In the first of this four-part series, we are going to take first five of OWASP Top 10 web application vulnerabilities, which are:

  • Injection
  • Broken Authentication and Session Management
  • Cross-Site Scripting
  • Insecure Direct Object References
  • Security Misconfiguration

Please read the complete article in attached pdf.

You may like to read Part 2 of this series

Subscribe to RSS - OWASP Top 10