OWASP Top Ten Hindi 2023
June 03, 2023
OWASP Top Ten ek list hai jo web application security keTOP !0
- 10 sabse bade risks ko dikhata hai......
- OWASP Top Ten me wo 10 sabse bade risks hai jo web applications ko vulnerable
- bana sakte hai. Is list ko samajhne se developers ko ye pata chalta hai ki wo kis
- tarah se apni applications ko secure kar sakte hai.
inject karte hai. Is tarah se wo sensitive data ko bhi access kar sakte hai.
2. Broken Authentication and Session Management: Ye vulnerability hoti hai jab web application authentication or session management ko sahi se handle nahi karta hai. Is
tarah se attackers ko user accounts ko access karne ke liye exploit karne ka mauka mil
jata hai.
3. Cross-Site Scripting (XSS): Ye vulnerability hoti hai jab attackers web application me malicious javascript code inject karte hai. Is tarah se wo sensitive data ko bhi access kar
sakte hai.
4. Insecure Direct Object References: Ye vulnerability hoti hai jab web application me
user ko access dene ke liye IDs ka istemal kiya jata hai. Is tarah se attackers ko access
mil jata hai jo unhe nahi milna chahiye.
5. Security Misconfiguration: Ye vulnerability hoti hai jab web application ka configuration
sahi se nahi kiya jata hai. Is tarah se attackers ko access mil jata hai jo unhe nahi milna
chahiye.
6. Sensitive Data Exposure: Ye vulnerability hoti hai jab web application me sensitive
data ko protect nahi kiya jata hai. Is tarah se attackers ko sensitive data ka access
mil jata hai.
7. Insufficient Attack Protection: Ye vulnerability hoti hai jab web application me
sufficient security measures nahi hai. Is tarah se attackers ko web application ko
hack karne ke liye exploit karne ka mauka mil jata hai.
8. Cross-Site Request Forgery (CSRF): Ye vulnerability hoti hai jab attackers web
application ke through user ko kisi bhi action ko perform karne ke liye force karte hai.
Is tarah se attackers ko user accounts ko access karne ke liye exploit karne ka
mauka mil jata hai.
9. Using Components with Known Vulnerabilities: Ye vulnerability hoti hai jab web
application me third-party components ka use kiya jata hai jo vulnerabilities ke sath
aata hai. Is tarah se attackers ko web application ko hack karne ke liye exploit karne
ka mauka mil jata hai.
10. Insufficient Logging and Monitoring: Ye vulnerability hoti hai jab web application
me sufficient logging and monitoring nahi hai. Is tarah se attackers ko web application
ko hack karne ke liye exploit karne