Real Life Examples of Web Vulnerabilities (OWASP Top 10) (2024)

UPDATE: This blog was originally published on 15 October 2021, and is updated to include the Log4j2 vulnerability as a real life example of A06:2021 Vulnerable and Outdated Components.

What's new in 2021

  1. Three (3) new categories made it to the Top 10
  2. Some vulnerabilities have been renamed to better reflect the nature and scope of the vulnerabilities
  3. There is a new Number One

These are some real-life examples of each of the Top 10 Vulnerabilities and Cyber Threats for 2021 according to The Open Web Application Security Project (OWASP).

Real Life Examples of Web Vulnerabilities (OWASP Top 10) (1)

  1. Broken Access Control (up from #5 in 2020 to the top spot in 2021)
  2. Cryptographic Failures (up from #3 in 2020 to #2 and was previously categorized as “Sensitive Data Exposure”)
  3. Injection (previously #1 in 2020)
  4. Insecure Design (New category)
  5. Security Misconfiguration (up 1 place from 2020 to #5)
  6. Vulnerable and Outdated Configurations (previously categorized as “Using Components with Known Vulnerabilities” and moved up from #9 in 2017)
  7. Identification and Authentication Failures (previously categorized as “Broken Authentication”, slipped from #2)
  8. Software and Data Integrity Failures (New category)
  9. Security Logging and Monitoring Failures (previously categorized as “Insufficient Monitoring and Logging”, up from #10)
  10. Server-Side Request Forgery (New category)

A01:2021 Broken Access Control 

Broken Access Control happens when access permissions are misconfigured thereby allowing attackers to access, modify or delete data, files and accounts that they should not have access to in the first place.

Snapchat / Facebook Business (Jan 2014 / Aug 2015)

Snapchat

Gibson Securitydetailed vulnerabilities in the snapchat service, which was dismissed as a purely theoretical attack. A week later, brute force enumeration had revealed 4.6 million usernames and phone numbers.

Why was this significant?

The attack seems to be motivated at least partly by Snapchat’s assertion that the attack was theoretical, and they had not taken any action. This resulted in a data leakage of phone numbers and users details that could be valuable for various uses.

Facebook Business Pages

Laxman Muthiyahfound that it was possible for a malicious user to use a request to assign admin permissions to himself for a particular Facebook page. A sample request can be seen below:

Request :-

POST /<page_id>/userpermissions HTTP/1.1

Host : graph.facebook.com

Content-Length: 245

role=MANAGER&user=<target_user_id>&business=<associated_business_id>&access_token=<application_access_token>

Response :-

true

Why was this significant?

Business pages are a widely used function, and by executing this attack, a malicious user could add himself as an administrator and deny access to the actual manager or administrator.

How does this relate to Broken Access Control?

Both issues arose due to the lack of access control measures with a specific function provided.

A02:2021 Cryptographic Failures

Previously known as “Sensitive Data Exposure”, cryptographic failures occur when sensitive data is insufficiently protected and therefore leaked or exposed to unauthorized audiences. Such failures are most common if data is transmitted or stored in clear text or using known-to-be-weak cryptographic algorithms such as MD5 or SHA-1.

Cloudbleed (2017)

Google’s Project Zero foundan issue in Cloudflare’s edge serversmade it possible to dump memory potentially containing sensitive data, some of which were cached by search engines. This security bug was named Cloudbleed.

Why was this significant?

Cloudflare had acknowledged the leak could have started as early as 22 September 2016, and a private key between Cloudflare machines had leaked.As nearly 6 million websites uses Cloudflare’s services, and many web application defenses are built with the assumption of a secure TLS communication channel, the impact could be large. Estimates from Cloudflare state that between 22 September 2016 and 18 February 2017, the bug was triggered 1,242,071 times.

Cloudflare did a small sample study, with a confidence level of 99% and a margin of error of 2.5%, which showed a limited amount of sensitive data exposed.

  • 67.54 Internal Cloudflare Headers
  • 0.44 Cookies
  • 0.04 Authorization Headers / Tokens
  • 0 Passwords
  • 0 Credit Cards / Bitcoin Addresses
  • 0 Health Records
  • 0 Social Security Numbers
  • 0 Customer Encryption Keys

How does this relate to Cryptographic Failures?

This should be clear intuitively. The original flaw was due to the way broken html tags were parsed, causing information from a random portion of the server’s memory to be returned.

A03:2021 Injection

An attacker can execute unintended commands or gain access to sensitive data by injecting malicious data as part of a command or query. This usually happens when a website fails to filter, validate or sanitize users’ inputs or implement parameterization.

The Panama Papers incident (Apr 2016)

The Panama Papers are a collection of 11.5 million records from Mossack Fonseca, originally leaked to German journalist Bastian Obermyer in 2015. Due to the sheer size of the data, the International Consortium of Investigative Journalists were approached.

Why was this significant?

Many public figures, present and past, had their financial dealings exposed, linking them to terrorists, drug cartels and tax havens. Some public figures had their careers affected, and in some instances, the information directly led to public unrest.

Real Life Examples of Web Vulnerabilities (OWASP Top 10) (2)

AFP/Getty images, The Indian Express, The Guardian, Daily Mail, whoar.co.nz

This is also significant from the cybersecuritycybersecurity point of view as it brought to attention the potential vulnerability and relative ease of attacking law firms, compared to the value of the information they carry. Fortune magazine wrote a commentary piece “The Panama Papers Signal A New Kind of Cyber Attack”, citing hacktivism as the motive, with income inequality as the reason. While not (actually) new, the incident did bring this to the public spotlight.

How does this relate to injection/using components with known vulnerabilities?

The documents were leaked in parts, and the site was hosted on outdated software, open to a large number of vulnerabilities. Unfortunately, due to the large number of possible attack vectors, it is hard to pin down the actual method used by the subject(s) who leaked the data.

  • WordPress 4.1 (Released December 18, 2014) — various vulnerabilities
  • Revolution Slider Plugin — unauthenticated remote file upload via ‘upload_plugin’
  • WP SMTP Plugin — mail server login information stored in plaintext
  • ALO EasyMail Newsletter plugin — mail server login information stored in plaintext
  • Drupal 7.23 (Released August 8, 2013) — 23 vulnerabilities, including code execution and privilege escalation via SQL injection of the Drupalgeddon fame
  • Apache 2.2.15, Oracle fork (March 6, 2010) — various vulnerabilities
  • Microsoft Exchange / Outlook Web Access (2009) — various vulnerabilities
  • A SQL injection SQL injection flaw was discovered by 1×0123(Twitter) in their payment system

Real Life Examples of Web Vulnerabilities (OWASP Top 10) (3)

Both the revolution slider’s unauthenticated file upload, which could lead to execution of PHP code, and the code execution via SQL injection on Drupal are trivial to exploit have been pretty thoroughly taken advantage of in the wild.

A04:2021 Insecure Design

Insecure design is a new entry on the OWASP Top 10 in 2021. It is different from insecure implementation in that it has more to do with risks related to design and architectural flaws. A secure implementation might have an insecure design which still renders a web application vulnerable to attacks and exploits.

One good example of insecure design in recent times prevented PC users and gamers from being able to purchase new Nvidia GPUs at recommended retail prices.

Many e-commerce sites did not factor in protection against bots that scalpers used to buy up their entire stocks which were limited to start with.

Scalpers then resold the cards at cut-throat marked up prices on auction websites, meaning those who really needed to obtain a new GPU had to fork out prices that were many times higher than the recommended retail price.

A05:2021 Security Misconfiguration

This category covers a brand range of potential vulnerabilities including insecure default configurations, incomplete configurations, and misconfigured HTTP headers, using insecure default usernames and passwords, etc.

Amazon S3/Mirai (Now / Aug 2016)

Amazon S3

Notably, in recent years, there has been numerous organizations who failed to protect their Amazon S3 storage instance:

  • Australian Broadcasting Corporation (Nov 2017) — Leakage of hashed passwords, keys and internal resources.
  • United States Army Intelligence and Security Command (Nov 2017) — Various files, including Oracle Virtual Appliance (.ova). volumes with portions marked top secret.
  • Accenture (Sept 2017) — Authentication information, including certificates, keys, plaintext passwords, as well as sensitive customer information.

There is an extremely high likelihood that similar issues will continue to be found.

Why was this significant?

A large number of organizations rely on Amazon’s S3 data storage technology, including governments and military organizations. From past examples found, this is a pervasive problem and the information leaked often has a high impact on the organization affected. Having a CSPM solution when you have cloud infrastructurea CSPM solution when you have cloud infrastructure will help monitor common cloud misconfigurations.

Mirai(未来)

Mirai was a botnet utilising IoT devices, managing to execute several high profile attacks after discovery, with the creator going to ground after releasing the code as open source (Anna-senpai).

Why was this significant?

Mirai ran from CCTV cameras, DVRs and routers. Essentially worked by trying common passwords, something that can be easily avoided. The entirety of the password list used is included below:

With such a simple method, the Mirai botnet produced 280 Gbps and 130 Mpps in DDOS capability, attacking DNS provider Dyn, leading to inaccessibility of sites such as GitHub, Twitter, Reddit, Netflix and Airbnb.

How does this relate to Security Misconfiguration?

Security misconfiguration can range from something as simple as allowing excessive permissions to a user account, to failing to restrict resource access to external addresses. In the cases mentioned above, they were caused by misconfiguration of the passwords protecting the systems.

A06:2021 Vulnerable and Outdated Components

This refers to known issues where vulnerabilities exist because developers either do not know the versions of components used including those of nested dependencies, or are not aware that the software used is already unsupported or out of date.

Log4j2 Vulnerability (Dec 2021)

A Remote Code Execution (RCE) vulnerability in the Apache logging package Log4j2 versions 2.14.1 and below was reported on 9 December, 2021.

Why was this significant?

The Log4j2 library is an open-source logging library provided by the Apache Software Foundation that is commonly used in online applications and services to capture logs for development, operational, and security purposes.

Dozens of major online service providers such as Amazon, Microsoft, IBM and Google, use the open-source library in their offerings.

Modern software development methodology drives the adoption of such software libraries, as there is no need to reinvent the wheel, resulting in quicker go-to-market. As a result, the library is sometimes embedded layers deep in applications.

The vulnerability required very little expertise to exploit. Threat actors only need to know how to parse a string into a URL to take over servers to steal data and passwords, install malware and crypto-mining software, and even sell access to third parties such as Ransomware-as-a-Service (RaaS) providers.

Microsoft reported that State-sponsored RaaS and hackers are capitalizing on the Log4j2 vulnerability.

How does this relate to Vulnerable and Outdated Components?

The Apache Software Foundation released an update, Log4j 2.17.1 on 27 December, 2021 to address all known Log4j2 vulnerabilities to date. Below is the release history of updates:

  • 2.15.0 6 December, 2021
  • 2.16.013 December, 2021
  • 2.17.017 December, 2021
  • 2.17.127 December, 2021

Log4j 2.16.0 was found to be vulnerable to DoS attacks, prompting the release of version 2.17.0 to address the new vulnerability.

The widespread use of the Log4j2 library means eradicating the threat will be a long-term exercise.

Besides applying patches from vendors and updating your Log4j2 versions, you can also conduct a compromise assessmentcompromise assessment to ensure that you are not already compromised, and carry out penetration testingpenetration testing to test your network and endpoints.

You can even go one step further to make less exploitation less likely while you are updating Log4j2 by deploying a CSPM such as WardenWarden that will help identify vulnerable workloads and act as defense-in-depthhelp identify vulnerable workloads and act as defense-in-depth to break a chain of attack in the event a vulnerable Log4j2 instance exists.

A07:2021 Identification and Authentication Failures

Previously known as “Broken Authentication”, this category covers weaknesses in authentication and session management in web applications. The resulting vulnerabilities allow attackers to gain unauthorized access to accounts and/or data.

Department of Revenue Hack (2012)

A foreign hacker was reported to have stolen 387,000 credit card numbers and 3.6 million Social Security numbers from the South Carolina Department of Revenue.

Why was this significant?

IRS was hacked again in 2015, exposing people’s social security numbers, address, incomes to more than 700,000 peopleexposing people’s social security numbers, address, incomes to more than 700,000 people. This information was then further used to authenticate themselves to get transcripts of their victims, resulting in more exposed data.

Even though in the first instance credit card data was encrypted, social security numbers and other personally identifiable data were not.

Direct consequences of this incident would be the exposure of these people to identity fraud. The 2017 Identity Fraud Study found that $16 billion was stolen from 15.4 million U.S. consumers in 2016, and in the past six years identity thieves have stolen over $107 billionthieves have stolen over $107 billion.

How does this relate to Identification and Authentication Failures?

The first breach in 2012 resulted from the default password set in the authentication layer. In addition, the lack of encryption on some sensitive data fields including the social security numbers increased the impact of this incident.

A08:2021 Software and Data Integrity Failures

This is the second new category in the Top 10 in 2021, and is concerned with the failure to verify the integrity of software updates and patches prior to implementation on live applications and servers.

Perhaps the most high-profile example of this would be the SolarWinds cyber attack in 2020.

SolarWinds, based in Texas, United States of America, provides a platform called “Onion” which helps numerous companies, many of which are Fortune 500 companies and include government agencies such as the Pentagon, to manage their IT resources.

Hackers managed to hack into the “Onion” and added malicious code which was undetected. As a result, SolarWinds unwittingly sent out updates and patches with the malicious code to its customer base. These compromised updates/patches then created backdoors which the attackers then used to install more malware to spy on the affected companies and government agencies.

A09:2021 Security Logging and Monitoring Failures

Previously categorized as “Insufficient Logging and Monitoring”, Security Logging and Monitoring Failures moved one place up from #10 this year. Logging and monitoring are essential components in ensuring that any suspicious activity can be detected close to real-time, or diagnosed after the fact.

Failure to keep sufficient records in these areas could subsequently lead to slower incident responses, thereby accentuating the potential damages of breaches.

Unfortunately, this is an extremely common issue and one that often does not come to attention unless the company experiences an incident and is unable to triage or diagnose it.

A10:2021 Server-Side Request Forgery (SSRF)

This is the third and final new entry into the Top 10 in 2021. Server-Side Request Forgery (SSRF) occurs when a web application proceeds to fetch data without first validating user-supplied URL.

In a bid to provide end-users with convenience, fetching data using a URL has become more common. The vulnerability allows an attacker to compel the web application to send a crafted request to unexpected destinations even when adequately protected by firewalls, VPNs and Network Access Control List (ACL).

There are two types of SSRF -- basic and blind.

A basic SSRF occurs when a victim server sends data back to the attacker after the latter sends a URL request to the server. A blind SSRF occurs when attackers are able to change data or trigger some action on the victim server.

Both types of SSRF can result in data exposure, internal recon, a Denial-of-Service attack and Remote Code Execution (RCE).

What fell out of the Top 10?

Although these categories have lost their places on the Top 10 list, it does not mean that they no longer exist or are any less of a threat. Organizations will do well to continue monitoring and deploying appropriate measures to mitigate these existing threats.

XML External Entities (XXE)

Android Studio, Eclipse, IntelliJ IDEA, APKTool (2017)

Check Point’s research team found vulnerabilities in popular Android development and reverse engineering tools used by developers, engineers and researchers. The issues found could lead to data exposure, as well as malicious users taking over the devices running APKTool.

The proof-of-concept attack allowed showed that a malicious user could inject the malicious code into shared online repositories such as those on GitHub, and allow the malicious user to obtain files available on the device reading the code. Similarly, the popular compiler APKTool has a vulnerability in the configuration yml file, allowing files to extracted anywhere on the system running it.

Why was this significant?

This vulnerabilities could be used to target developer’s machines and servers attempting to load, run, or decompile code.

In the development community, code or libraries are often shared in open source repositories, and a attack like this could result in sensitive documents such as credentials and source code to be exposed. Developers using these popular IDEs could be led to leak sensitive files in this manner.

In the second scenario, the APKTool exploit can lead to Remote Code Execution and allowing a remote malicious user to take control of the machine. For example, extracting a PHP exploit and calling the web server to run it.

How does this relate to XML External Entities (XXE)?

Both attacks are due to the way XML and YML(a similar human-readable data format) is parsed/read. The external reference contained in the XML is processed without further checks, leading to the above issues.

Cross Site Scripting (XSS) 

Steam Profile Hack (Feb 2017)

This was a simple XSS hack that was discovered on the Steam platform, on user’s profile pages.

Real Life Examples of Web Vulnerabilities (OWASP Top 10) (4)

Why was this significant?

While the Steam profile page feature has existed for many years now, this relatively easy to execute hack was only discovered after a long period of time. The potential impact of this hack is well summarised by Reddit commenter “R3TR1X” and Moderator “DirtDiglett”:

  • Redirecting a user to a website to phish their login.
  • Utilizing CSS trickery to change your profile to trick users.
  • Loading larger payloads
  • Silently draining your Steam Wallet funds.
  • Spreading Malware via an auto-download.

How does this relate to Cross Site Scripting (XSS)?

The vulnerability is a simple XSS flaw, where JavaScript can be input by a user to the profile page, and be executed on the viewer’s browser. This situation is the perfect example of how an innocuous function can hide a potentially damaging flaw for many years due to a minor mistake by a developer or security tester. A simple encoding of user input and display could have prevented this.

Insecure Deserialization

Apache Struts 2 (Sep 2017)

Apache Struts 2, a popular framework used by many enterprise applications, was found to have a Remote Code Execution vulnerability, which could lead to malicious users gaining control over machines running these applications.

Why was this significant?

This issue affects every version of Struts using the REST plugin since 2008, and can be exploited by sending a crafted request remotely. This would allow a remote attacker to run arbitrary code on the machine. Java, and specifically the Struts framework, is popular within the enterprise environment, and this exploit could lead to high risk issues to the companies involved.

How does this relate to Insecure Deserialization?

The vulnerability is due to the XStreamHandler in the REST plugin, and the failure to filter file types from information sent from untrusted source.

Final thoughts

The OWASP Top 10 list is only a literal tip-of-the-iceberg representation of the increasing number of cyber threats facing us today. This list is expected to change as we see more transformations in the ways we work, play, and live our lives in these interesting times.

For instance, increased adoption of the cloud and the advent of new technologies like 5G will likely present more attack surfaces and therefore more cybersecurity challenges to organizations and individuals.

At the end of the day, cybersecurity affects all of us. We should therefore have an awareness of the potential harm to our digital lives.

If your organization is looking for a cybersecurity partner to help secure your business critical assets, contact uscontact us for a discussion.

Originally written by QuanHeng LimQuanHeng Lim

Real Life Examples of Web Vulnerabilities (OWASP Top 10) (2024)

FAQs

Real Life Examples of Web Vulnerabilities (OWASP Top 10)? ›

Real-World Examples for OWASP Top 10 Vulnerabilities
  • Injection. ...
  • Broken Authentication. ...
  • Sensitive Data Exposure. ...
  • XML External Entities (XXE) ...
  • Broken Access Control. ...
  • Security Misconfiguration. ...
  • Cross-Site Scripting XSS: ...
  • Insecure Deserialization:

What are the examples of vulnerability from actual examples? ›

Other examples of vulnerability include these: A weakness in a firewall that lets hackers get into a computer network. Unlocked doors at businesses, and/or. Lack of security cameras.

What vulnerability ranked #1 on the OWASP Top 10? ›

Injection is the number 1 flaw reported by OWASP. Injection can send untrusted data through SQL or other paths such as LDAP, allowing the interpreter to access unauthorized data or execute commands not intended by the application.

Which 2 of the following vulnerabilities are on the 2020 OWASP Top 10 list? ›

OWASP Top 10 Web Application Security Risks and Vulnerabilities to Watch Out for in 2020
  • Injection.
  • Broken Authentication.
  • Sensitive Data Exposure.
  • XML External Entities (XXE)
  • Broken Access Control.
  • Security Misconfiguration.
  • Cross-Site Scripting (XSS)
  • Insecure Deserialization.

Can you give an example of a recent web security vulnerability or threat? ›

Examples of vulnerabilities are SQL injections, cross-site scripting (XSS), and more.

What are vulnerabilities explain and give at least 2 examples? ›

Examples of Vulnerabilities

Below are some examples of vulnerability: A weakness in a firewall that can lead to malicious hackers getting into a computer network. Lack of security cameras. Unlocked doors at businesses.

Can you give me an example of common security vulnerabilities? ›

Another common vulnerability example is a password reset function that relies on user input to determine whose password we're resetting. After clicking the valid URL, an attacker can just modify the username field in the URL to say something like “admin”.

What is Log4j vulnerability? ›

Last week, a vulnerability was found in Log4j, an open-source logging library commonly used by apps and services across the internet. If left unfixed, attackers can break into systems, steal passwords and logins, extract data, and infect networks with malicious software.

What are the OWASP Top 10 vulnerabilities for 2021? ›

The Top 10 OWASP vulnerabilities in 2021 are:
  • Broken Access Control.
  • Cryptographic Failures.
  • Injection.
  • Insecure Design.
  • Security Misconfiguration.
  • Vulnerable and Outdated Components.
  • Identification and Authentication Failures.
  • Software and Data Integrity Failures.
Dec 7, 2021

What are the 4 main types of vulnerability in cyber security? ›

Security Vulnerability Types
  • Network Vulnerabilities. These are issues with a network's hardware or software that expose it to possible intrusion by an outside party. ...
  • Operating System Vulnerabilities. ...
  • Human Vulnerabilities. ...
  • Process Vulnerabilities.

What are the 4 main types of vulnerability? ›

The different types of vulnerability

In the table below four different types of vulnerability have been identified, Human-social, Physical, Economic and Environmental and their associated direct and indirect losses.

What are OWASP Top 10 attacks? ›

What is the OWASP Top 10?
  1. Injection. ...
  2. Broken Authentication. ...
  3. Sensitive Data Exposure. ...
  4. XML External Entities (XEE) ...
  5. Broken Access Control. ...
  6. Security Misconfiguration. ...
  7. Cross-Site Scripting. ...
  8. Insecure Deserialization.

What is the OWASP Top 10 and why is it important? ›

The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. Globally recognized by developers as the first step towards more secure coding.

Which OWASP Top 10 Item best relates to implementing strong password policies? ›

But, the best source to turn to is the OWASP Top 10.
  • Injection. The first vulnerability relates to trusting user input. ...
  • Broken Authentication and Session Management. ...
  • Cross-Site Scripting (XSS) ...
  • XML External Entities (XXE) ...
  • Security Misconfiguration. ...
  • Sensitive Data Exposure. ...
  • Broken Access Control. ...
  • Insecure Deserialization.
Feb 8, 2021

What are the Top 5 web application vulnerabilities you know? ›

10 Common Web Application Security Vulnerabilities and How to Prevent Them
  • Injection Flaws.
  • Broken Authentication.
  • Sensitive Data Exposure.
  • Missing Function Level Access Control.
  • Security Misconfiguration.
  • Cross-Site Scripting XSS.
  • Insecure Direct Object References.
  • Cross-Site Request Forgery.

What are the web based vulnerabilities? ›

Web application vulnerabilities involve a system flaw or weakness in a web-based application. They have been around for years, largely due to not validating or sanitizing form inputs, misconfigured web servers, and application design flaws, and they can be exploited to compromise the application's security.

What are the examples of insecure applications and web based service? ›

Most Common Website Security Vulnerabilities
  • SQL Injections. ...
  • Cross Site Scripting (XSS) ...
  • Broken Authentication & Session Management. ...
  • Insecure Direct Object References. ...
  • Security Misconfiguration. ...
  • Cross-Site Request Forgery (CSRF)
Jan 4, 2021

What are vulnerabilities How do you identify them give some examples? ›

Examples may include:
  • poor design and construction of buildings,
  • inadequate protection of assets,
  • lack of public information and awareness,
  • limited official recognition of risks and preparedness measures, and.
  • disregard for wise environmental management.

What are the most common vulnerabilities in the network and system users? ›

Top computer security vulnerabilities
  • Malware.
  • Phishing.
  • Proxies.
  • Spyware.
  • Adware.
  • Botnets.
  • Spam.

What is the biggest vulnerability to information security? ›

Failing to update software

One of the biggest causes of cyber and information security vulnerabilities is that systems and software are not regularly updated.

What are common vulnerabilities found on web app testing? ›

41 Common Web Application Vulnerabilities Explained
  • Broken access control. ...
  • Broken authentication. ...
  • Carriage Return and Line Feed (CRLF) Injection. ...
  • Cipher transformation insecure. ...
  • Components with known vulnerabilities. ...
  • Cross-Origin Resource Sharing (CORS) Policy. ...
  • Credentials management. ...
  • Cross-site request forgery (CSRF)
Mar 25, 2021

What are the three 3 types of network service vulnerabilities? ›

At the broadest level, network vulnerabilities fall into three categories: hardware-based, software-based, and human-based.

Which applications use Log4j? ›

List of vendors and software affected by the Apache Log4J vulnerability (CVE-2021-44228)
#VendorSoftware
3Amazon Web ServicesAmazon Linux AMI
4Amazon Web ServicesAmazon Linux AMI
5Apache FoundationApache Log4j
6Apache FoundationFlink
116 more rows

What games use Log4j? ›

Log4j is everywhere

In addition to popular games like Minecraft, it's used in cloud services like Apple iCloud and Amazon Web Services, as well as a wide range of programs from software development tools to security tools.

What products use Log4j? ›

Any systems and services that use the Java logging library, Apache Log4j between versions 2.0 and 2.15. This includes Atlassian, Amazon, Microsoft Azure, Cisco, Commvault, ESRI, Exact, Fortinet, JetBrains, Nelson, Nutanix, OpenMRS, Oracle, Red Hat, Splunk, Soft, and VMware.

What are the example attacks of identification and authentication failures? ›

Other examples of Identification and Authentication Failures are: No validation of weak passwords. Weak credential recovery and forgot-password processes. Using plain text or weakly hashed passwords data stores.

What is OWASP used for? ›

OWASP seeks to educate developers, designers, architects and business owners about the risks associated with the most common web application security vulnerabilities. OWASP supports both open source and commercial security products.

Which OWASP Top 10 weakness can be prevented using role based access control? ›

Role-Based Access control helps prevent this OWASP Top 10 weakness.
  • Failure to restrict URL Access.
  • Unvalidated Redirect or Forward.
  • Security Misconfiguration.
  • Insufficient Transport Layer Protection.
Mar 22, 2022

What is a security vulnerability examples? ›

Weak passwords that use common alphanumeric strings (123456, passw0rd, etc.) and those reusing personal data like your name are potential vulnerabilities. These security vulnerabilities can be curbed at two levels – through user awareness and enforced credentialing processes, such as password expiration.

Why are humans the biggest cybersecurity vulnerability? ›

“Humans are the weakest link in the security supply chain.”

This is because humans are the most important part of information security and all humans make mistakes. According to CompTIA, 52% of security breaches are due to human errors.

Which are the two 2 most common ways in which vulnerabilities are introduced to a system? ›

Which are the two (2) most common ways in which vulnerabilities are introduced to a system? Many vulnerabilities are introduced to a system by malware such as Trojan horses. Many systems are shipped with known and unknown security holes, such as insecure default settings.

What is the example of social vulnerability? ›

Vulnerable residential settings (i.e. weak structure, poor protection, poor maintenance, etc.) Lack of or Limited access to critical services such as communication, transportation, power supply, water supply, sanitation, etc.

What is a vulnerability in cyber security? ›

A flaw or weakness in a computer system, its security procedures, internal controls, or design and implementation, which could be exploited to violate the system security policy.

What is the most basic and commonly exploited vulnerability? ›

CVE-2021-26084.

This vulnerability quickly became one of the most routinely exploited vulnerabilities after a POC was released within a week of its disclosure. Attempted mass exploitation of this vulnerability was observed in September 2021.

What is OWASP vulnerability? ›

What Is an OWASP Vulnerability? OWASP vulnerabilities are security weaknesses or problems published by the Open Web Application Security Project. Issues contributed by businesses, organizations, and security professionals are ranked by the severity of the security risk they pose to web applications.

What is OWASP in cybersecurity? ›

The Open Web Application Security Project® (OWASP) is a nonprofit foundation that works to improve the security of software.

Is OWASP still relevant? ›

The OWASP Top Ten Project has been successful because it's easy to understand, it helps users prioritize risk, and its actionable. There's a lot to love: For the most part it focuses on the most critical threats, rather than specific vulnerabilities.

What benefits do developers gain from the OWASP Top 10 choose any two? ›

The OWASP Top 10 is important because it gives organisations a priority over which risks to focus on and helps them understand, identify, mitigate, and fix vulnerabilities in their technology. Each identified risk is prioritised according to prevalence, detectability, impact and exploitability.

What are the most common vulnerabilities found in Windows 10? ›

Top 10 Windows 10 Vulnerabilities
  • Microsoft Windows Journal Vulnerability (MS15-098)
  • Internet Explorer Vulnerabilities (MS15-079) ...
  • Microsoft Graphics Component Vulnerabilities (MS15-080) ...
  • Microsoft Edge Vulnerabilities (MS15-091) ...
  • Windows 10 Mount Manager Vulnerability (CVE-2015-1769, MS15-085) ...
May 11, 2022

How is OWASP implemented? ›

OWASP top 10 Proactive Controls 2020
  1. Define Security Requirements.
  2. Leverage Security Frameworks and Libraries.
  3. Secure Database Access.
  4. Encode and Escape Data.
  5. Validate All Inputs.
  6. Implement Digital Identity.
  7. Enforce Access Controls.
  8. Protect Data Everywhere.
Nov 5, 2020

Can you give an example of a recent web security vulnerability or threat? ›

Examples of vulnerabilities are SQL injections, cross-site scripting (XSS), and more.

What are web application security risks? ›

Web applications that do not properly protect sensitive data could allow threat actors to steal or modify weakly protected data. They could also conduct malicious activities such as credit card fraud and identity theft, among others. Improperly configured or badly coded APIs could also lead to a data breach.

What is SQL injection example? ›

Some common SQL injection examples include: Retrieving hidden data, where you can modify an SQL query to return additional results. Subverting application logic, where you can change a query to interfere with the application's logic. UNION attacks, where you can retrieve data from different database tables.

What are the 4 main types of vulnerability? ›

The different types of vulnerability

In the table below four different types of vulnerability have been identified, Human-social, Physical, Economic and Environmental and their associated direct and indirect losses.

What is social vulnerability and its example? ›

Social vulnerability refers to the resilience of communities when confronted by external stresses on human health, stresses such as natural or human-caused disasters, or disease outbreaks. Reducing social vulnerability can decrease both human suffering and economic loss (http://svi.cdc.gov/). ▪

What is physical vulnerability and its example? ›

Physical Vulnerability may be determined by aspects such as population density levels, remoteness of a settlement, the site, design and materials used for critical infrastructure and for housing (UNISDR). Example: Wooden homes are less likely to collapse in an earthquake, but are more vulnerable to fire.

What are the 4 main types of security vulnerability? ›

Security Vulnerability Types
  • Network Vulnerabilities. These are issues with a network's hardware or software that expose it to possible intrusion by an outside party. ...
  • Operating System Vulnerabilities. ...
  • Human Vulnerabilities. ...
  • Process Vulnerabilities.

What is the top vulnerability leading to data breaches? ›

1. Phishing and Whaling. Phishing attacks are one of the biggest causes of data breaches worldwide. The latest data from the 2019 Verizon Data Breach Investigations Report indicates most successful breaches involve phishing and the use of stolen credentials.

Why are humans the biggest cybersecurity vulnerability? ›

“Humans are the weakest link in the security supply chain.”

This is because humans are the most important part of information security and all humans make mistakes. According to CompTIA, 52% of security breaches are due to human errors.

What is a vulnerability in cyber security? ›

A flaw or weakness in a computer system, its security procedures, internal controls, or design and implementation, which could be exploited to violate the system security policy.

Top Articles
Latest Posts
Article information

Author: Otha Schamberger

Last Updated:

Views: 6080

Rating: 4.4 / 5 (75 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Otha Schamberger

Birthday: 1999-08-15

Address: Suite 490 606 Hammes Ferry, Carterhaven, IL 62290

Phone: +8557035444877

Job: Forward IT Agent

Hobby: Fishing, Flying, Jewelry making, Digital arts, Sand art, Parkour, tabletop games

Introduction: My name is Otha Schamberger, I am a vast, good, healthy, cheerful, energetic, gorgeous, magnificent person who loves writing and wants to share my knowledge and understanding with you.