CALL US

+91 9116117170

Category: Latest Vulnerabilities

Owasp Top 10:A6: Security Misconfigurations (Impact & Mitigation)

By Annu Choudhari 0 Comment July 11, 2019

What does mean by Security Misconfigurations ? Security Misconfigurations arises when maintaining security settings are the default, Security misconfigurations can happen at any level of an application stack, including the platform, web server, application server, database, framework, and custom code.Security misconfigurations vulnerabilities could occur if a component is vulnerable to attack due to an insecure […]

Owasp Top 10:A5 : Broken Access Control (Impact & Mitigation)

By Annu Choudhari 0 Comment July 11, 2019

what is Broken Access Control ? Broken access control is a very common and very vulnerable vulnerability. Many sites have the potential to accidentally provide access to unauthorized visitors who just cut out a URL that seems to be unsafe and paste it into a browser. Description  Access control, sometimes called authorization, is how a […]

OWASP Top 10 A:4

Owasp Top 10:A4: XML External Entity (Impact & Mitigation)

By Annu Choudhari 0 Comment July 9, 2019

Introduction An XML External Entity attack is a type of attack against an application that parses XML input. Many older or terribly configured XML processors evaluate external entity references within XML documents. External entities may be used to disclose internal files with the help of file URI handler, internal file shares, remote code execution, internal […]

SQL Injection

Owasp Top 10: A1: Injection Vulnerability (Impact & Mitigation)

By Annu Choudhari 0 Comment July 9, 2019

What is an Injection ? An injection is a type of attack which usually occurs when an attacker sends some suspicious data as part of a query or command into the input fields of any website. By this attacker can lead to data theft, data loss, or accessing data without any authorization. Different Types of […]

New OWASP

Owasp Top 10:A2: Broken Authentication (Impact and Mitigation)

By Annu Choudhari 0 Comment July 9, 2019

Owasp Top 10: Broken Authentication (Impact and Mitigation) What is Broken Authentication ? Broken Authentication is a vulnerability, it usually found when the web application gives you unauthorized access to the web application. It may be User authentication credentials Or session IDs and so on. Authentication and session management having all aspects of handling user […]

error: Content is protected by Cyberops !!