Professional Documents
Culture Documents
OWASP Top 10 Security Risk
OWASP Top 10 Security Risk
Security Risks
Hackercombat.com
OWASP Vulnerabilities
This list represents the most relevant
threats to software security today.
Vulnerability 1
1
Injection
Vulnerability 2
2
Broken Authentication
Vulnerability 3
3
Sensitive Data Exposure
Vulnerability 4
4
XML External Entities (XXE)
OWASP Vulnerabilities
This list represents the most relevant
threats to software security today.
Vulnerability 5
5
Broken Access control
Vulnerability 6
6
Security Misconfigurations
Vulnerability 7
7
Cross-Site Scripting (XSS)
Vulnerability 8
8
Insecure Deserialization
OWASP Vulnerabilities
This list represents the most relevant
threats to software security today.
Vulnerability 9
9 Using Components with
known vulnerabilities
Vulnerability 10
10 Insufficient logging and
monitoring
Injection
Injection flaws, such as SQL injection, LDAP
authorization.
Broken Authentication
Incorrectly configured user and session
identities.
Source: Veracode
XML External Entities (XXE)
Poorly configured XML processors evaluate external
Security Misconfigurations
Source: Veracode
Cross-Site Scripting (XSS)
Cross-site scripting (XSS) flaws give
websites.
Insecure Deserialization
Insecure deserialization flaws can enable
privileges.
Source: Veracode
Using Components with
known vulnerabilities
sensitive data.
Insufficient logging
and monitoring
threats.
Source: Veracode