OWASP
OWASP
2. Cryptography Failure
Cryptographic Key failures are critical security risks that can break the security
of an application if not properly implemented.
Weak algorithms and key lengths
Insecure key management
Inadequate encryption during data storage and transmission
3. Injection
It refers to vulnerabilities that occur when untrusted data is sent to an
interpreter as part of a query or command, leading to unexpected and
malicious behavior.
SQL injection
Cross site Scripting
XML Injection
4. Insecure Design
Refers to various security issues resulting from flaws or weaknesses in
the overall design and architecture of a software application.
Lack of Defense in Depth.
Inadequate Authentication and Authorization.
Lack of Secure Communication
5. Security Misconfiguration
Security misconfiguration occurs when an application, server, or framework is
not securely configured.
Excessive permissions
Inadequate security settings
Open ports and services