OWASP TOP 10

4 Results / Page 1 of 1

using components with known vulnerabilities

todayOctober 15, 2021

close

WordPress + blog + secure coding + DevSecOps + Website security + OWASP TOP 10 Z. Oualid

Using Components with Known Vulnerabilities prevention

With the race to make software development even faster, companies start to adopt a new way technique based on using already developed code components. Unfortunately, this development technique comes with many security vulnerabilities that have made the software even less secure regardless of the enhancement the used development technology has ...

security configuration vulnerabilities

todayAugust 27, 2021

close

blog + secure coding + Systems security + Website security + OWASP TOP 10 Z. Oualid

The most common security misconfiguration vulnerabilities

After years of experience in penetration testing, I can say that one of the best things that can happen during a penetration test is to find a security misconfiguration. Unfortunately, when you look for these vulnerabilities on Google all that you get is theories or discussions and explanations of such ...

insecure deserialization

todayAugust 25, 2021

close

blog + secure coding + OWASP TOP 10 Z. Oualid

Insecure deserialization prevention simplified

After starting to use the object-oriented development concept, new types of vulnerabilities were born. Insecure deserialization vulnerabilities were one of those vulnerabilities. Therefore, what is an Insecure Deserialization vulnerability, and how to prevent it? Insecure deserialization vulnerability happens when the web application serializes or deserializes a user-controllable object. The main ...