Invalid username or password
This section provides an overview of vulnerability distribution based on severity and CVSS scores.
URL | Vulnerability | Attack Method | CVE ID | Severity | CVSS Score |
---|
This section calculates the DREAD score for each vulnerability and prioritizes them based on risk.
Vulnerability | Damage Potential | Reproducibility | Exploitability | Affected Users | Discoverability | DREAD Score | Priority |
---|
The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications.
Access control enforces policy such that users cannot act outside of their intended permissions. Failures typically lead to unauthorized information disclosure, modification, or destruction of all data or performing a business function outside the user's limits.
Common vulnerabilities include:
Cryptographic failures refer to weaknesses in the implementation of cryptography, which can lead to sensitive data exposure. Such failures can affect passwords, credit card numbers, health records, personal information, and business secrets.
Common issues include:
Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended commands or accessing unauthorized data.
Common injection types:
Insecure design refers to a broad category of flaws expressed as "missing or ineffective control design." These issues cannot be fixed by perfect implementation as the flaws were introduced in the requirements or design phases.
Examples include:
Security misconfiguration is the most commonly seen issue, often resulting from insecure default configurations, incomplete or ad hoc configurations, open cloud storage, misconfigured HTTP headers, and verbose error messages containing sensitive information.
Common examples include:
Components, such as libraries, frameworks, and software modules, run with the same privileges as the application. If a vulnerable component is exploited, such an attack can facilitate serious data loss or server takeover.
You are likely vulnerable if:
Authentication-related attacks can be used to assume other users' identities. Due to the prevalence of authentication in applications, attackers have various methods to compromise authentication.
Common authentication vulnerabilities include:
Software and data integrity failures relate to code and infrastructure that does not protect against integrity violations. Examples include where an application relies upon plugins, libraries, or modules from untrusted sources, repositories, and CDNs.
Common scenarios include:
This category helps detect, escalate, and respond to active breaches. Without logging and monitoring, breaches cannot be detected. Insufficient logging, detection, monitoring, and active response occurs at all stages of a breach.
Organizations should look for:
SSRF flaws occur whenever a web application is fetching a remote resource without validating the user-supplied URL. This enables attackers to force the application to send a crafted request to an unexpected destination, even when protected by a firewall, VPN, or network ACL.
Prevention methods include:
This section showcases real-time threats and attacks happening globally.