Professional Documents
Culture Documents
Broken Authentication
Improper Token Management
Valid user's details can be enumerated
Valid account can be brute forced
Application does not have a strong password policy
NTLM Authentication is used in the Application
Weak OTP/PIN implementation
Secure attribute is not set in
Abuse of Send-Mail Functionality
By blocking non-bindable sensitive fields, the application can prevent an attacker from accessing or modifying sensitive data.
If sensitive or critical fields can be modified by an attacker, it can result in unauthorized access, data loss, or other types of atta
API7:2019 Security Misconfiguration
If the website does not properly implement CORS protections, the attacker can use the user's existing session or cookie data to
Misconfigurations in these protocols can result in security vulnerabilities that can be exploited by attackers to gain unauthoriz
This vulnerability arises when an application includes components or libraries with known security vulnerabilities that have no
Allows an attacker to guess the location of sensitive resources or data within a web application.
This occurs when the Content-Type header of a response or request is set incorrectly or is not specified at all.
Security headers provide additional protection to web applications by instructing the browser on how to handle certain types
CSP is a security feature that allows web developers to control which resources (e.g., scripts, stylesheets, images, etc.) are allo
Untrusted file data should be handled accordingly and in a secure manner.
Allow an attacker to guess the location of sensitive resources or data within a web application
This can happen when the application includes IP addresses in error messages, response headers, or in the HTML source code
Occurs when a web application leaks internal file system paths
Checking whether the insecure methods are enabled. Disable methods that are not in use.
Occurs when sensitive information about the web service, such as its configuration settings, API endpoints, or underlying tech
API8:2019 Injection
Occurs when an attacker is able to inject and execute arbitrary commands or scripts on a target operating system through an a
Allows an attacker to execute arbitrary code or commands on a remote system.
Allows an attacker to include and execute remote files on a target system
Allows an attacker to inject malicious input into log files generated by an application.
Server-side validation is a security practice that involves validating user input and enforcing business rules on the server-side b
Allows an attacker to execute malicious SQL statements or commands on a target database
Allows an attacker to inject malicious XML entities into an application that parses XML input.
Allows an attacker to modify or retrieve data from an XML database by injecting malicious XPath queries into an application th
Allows an attacker to inject malicious code into an XML input or output of an application
Allows an attacker to inject arbitrary HTTP headers into a response, potentially leading to various types of attacks.
Allows an attacker to redirect a user from a legitimate website to a malicious website.
If an XML-RPC service is publicly available, it can be a security risk as it can allow unauthorized users to access sensitive inform
Special characters such as quotes, brackets, and semicolons can be used by attackers to inject malicious code
It can reveal sensitive information about the application's underlying architecture and database schema
Arises when a web application deserializes JSON data from an untrusted source without proper validation