Login
Remember
Register
Ask a Question
Recent questions in OWASP Top 10 Vulnerabilities
0
votes
1
answer
Client-side scripts can be allowed to execute in the browsers for needed operations.
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
client-side-script
0
votes
1
answer
Which attack can execute scripts in the user’s browser and is capable of hijacking user sessions, defacing websites or redirecting the user to malicious sites?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
script-execution
0
votes
1
answer
Which of the following are most likely to result in insecure cryptography?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
insecure-cryptography
0
votes
1
answer
What is an attack that exploits the trust a site has in a user’s browser?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
user-browser
0
votes
1
answer
Role-based access control helps prevent which OWASP Top 10 vulnerability?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
owasp
access-control
0
votes
1
answer
What happens when an application takes user inputted data and sends it to a web browser, without proper validation?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
input-data
web
browser
0
votes
1
answer
What is an attack that forces a user’s session credential or session ID to an explicit value?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
session-id
user-credential
0
votes
1
answer
Which of the following languages are the primary targets of cross-site scripting?
asked
Feb 13, 2022
in
OWASP Top 10 Vulnerabilities
by
SakshiSharma
cross-site-scripting
0
votes
1
answer
What is an example of a session-related vulnerability?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which threat can be prevented by having unique usernames generated with a high degree of entropy?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
For a connection that changes from HTTP to HTTPS, what flaw arises if you do not change the session identifier?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What threat arises from not flagging HTTP cookies with tokens, as secure?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What attack can be prevented by links or forms that invoke state-changing functions with an unpredictable token for each user?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which of the following actions should you take to verify the implementation of a web application?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which of the following are the best ways to implement transport layer protection?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
In which of the following scenarios should you use the escaping technique?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What happens when an application takes user inputted data, and sends it to a web browser without proper validation and escaping?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which of the following depict the typical impact of failure to restrict URL access?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What is the attack technique used to exploit websites by altering the backend database queries through inputting manipulated queries?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What flaw arises from session tokens having poor randomness across a range of values?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which of the following consequences are most likely to occur due to an injection attack?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
Which of the following are the best ways to protect against injection attacks?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
0
votes
1
answer
What type of flaw occurs when untrusted user-entered data is sent to the interpreter as part of a query or command?
asked
Feb 12, 2022
in
OWASP Top 10 Vulnerabilities
by
DavidAnderson
owasp-top-10-vulnerabilities-interview-questions-answer
To see more, click for the
full list of questions
or
popular tags
.
Recent questions in OWASP Top 10 Vulnerabilities
...