A1 - Cross Site Scripting (XSS) | XSS flaws occur whenever an application takes ur supplied data and nds it to a web browr without first validating or encoding that content. XSS allows attackers to execute script in the victim's browr which can hijack ur ssions, deface web sites, possibly introduce worms, etc. |
A2 - Injection Flaws | Injection flaws, particularly SQL injection, are common in web applications. Injection occurs when ur-supplied data is nt to an interpreter as part of a command or query. The attacker's hostile data tricks the interpreter into executing unintended commands or changing data. |
A3 - Malicious File Execution | Code vulnerable to remote file inclusion (RFI) allows attackers to include hostile code and data, resulting in devastating attacks, such as total rver compromi. Malicious file execution attacks affect PHP, XML and any framework which accepts filenames or files from urs. |
A4 - Incure Direct Object Reference | A direct object reference occurs when a developer expos a reference to an internal implementation object, such as a file, directory, databa record, or key, as a URL or form parameter. Attackers can manipulate tho references to access other objects without authorization. |
A5 - Cross Site Request Forgery (CSRF) verifydevice | A CSRF attack forces a logged-on victim's browr to nd a pre-authenticated request to a vulnerable web application, which then forces the victim's browr to perform a hostile action to the benefit of the attacker. CSRF can be as powerful as the web application that it attacks. |
A6 - Information Leakage and Improper Error Handling | airwayApplications can unintentionally leak information about their configuration, internal workings, or violate privacy through a variety of application problems. Attackers u this weakness to steal nsitive data, or conduct more rious attacks. |
A7 - Broken Authentication and Session Management | Account credentials and ssion tokens are often not properly protected. Attackers compromi passwords, keys, or authentication tokens to assume other urs' identities. |
A8 - Incure Cryptographic Storage | 国际贸易专业Web applications rarely u cryptographic functions properly to protect data and credentials. Attackers u weakly protected data to conduct identity theft and other crimes, such as credit card fraud. |
A9 - Incure Communications | Applications frequently fail to encrypt network traffic when it is necessary to protect nsitive communications. |
A10 - Failure to Restrict URL Access简历封面设计 | Frequently, an application only protects nsitive functionality by preventing the display of links or URLs to unauthorized urs. Attackers can u this weakness to access and perform unauthorized operations by accessing tho URLs directly. |
本文发布于:2023-06-22 19:07:58,感谢您对本站的认可!
本文链接:https://www.wtabcd.cn/fanwen/fan/78/1015482.html
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系,我们将在24小时内删除。
留言与评论(共有 0 条评论) |