About 400 results
Open links in new tab
  1. OWASP Top Ten | OWASP Foundation

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web …

  2. Attacks - OWASP Foundation

    Attacks are the techniques that attackers use to exploit the vulnerabilities in applications. Attacks are often confused with vulnerabilities, so please try to be sure that the attack you are …

  3. Cross Site Request Forgery (CSRF) - OWASP Foundation

    Cross-Site Request Forgery (CSRF) is an attack that forces an end user to execute unwanted actions on a web application in which they’re currently authenticated.

  4. Cross Site Scripting (XSS) - OWASP Foundation

    Reflected XSS exploits occur when an attacker causes a user to supply dangerous content to a vulnerable web application, which is then reflected back to the user and executed by the web …

  5. OWASP Top 10:2021

    To balance that view, we use a community survey to ask application security and development experts on the front lines what they see as essential weaknesses that the data may not show yet.

  6. XSS in “Web 2.0” AJAX and Dynamic Applications require the use of JavaScript

  7. Server-Side Includes (SSI) Injection - OWASP Foundation

    The Server-Side Includes attack allows the exploitation of a web application by injecting scripts in HTML pages or executing arbitrary codes remotely. It can be exploited through manipulation of …

  8. SQL Injection - OWASP Foundation

    Essentially, the attack is accomplished by placing a meta character into data input to then place SQL commands in the control plane, which did not exist there before.

  9. Injection Prevention - OWASP Cheat Sheet Series

    LDAP Injection is an attack used to exploit web based applications that construct LDAP statements based on user input. When an application fails to properly sanitize user input, it's …

  10. Web Parameter Tampering - OWASP Foundation

    When a web application uses hidden fields to store status information, a malicious user can tamper with the values stored on their browser and change the referred information.