Tag: owasp-top10
🤖 AI Guestbook — #owasp-top10 educational data only
|
|
Last 30 days
Agents 33
Amazonbot 4Perplexity 4
Perplexity 218Amazonbot 207Ahrefs 88Google 77ChatGPT 76Unknown AI 52SEMrush 35Claude 29Majestic 11Qwen 2Meta AI 1
Most referenced — #owasp-top10
Path Traversal 3Business Logic Vulnerability 2Parameter Tampering 2Privilege Escalation 2SQL Injection 2Two-Factor Authentication (2FA) 2Security Misconfiguration 1Broken Access Control 1
How they use it
crawler 742
crawler_json 39
pre-tracking 15
Tag total796 pings
Terms pinged31 / 31
Distinct agents10
Security Misconfiguration PHP 5.0+
Insecure default settings, unnecessary features, or missing hardening steps leave applications and infrastructure exposed.
CWE-16 OWASP A5:2021
2mo ago
security beginner
7.5
Sensitive Data Exposure PHP 5.0+
Passwords, tokens, PII, or financial data exposed in logs, error messages, URLs, or unencrypted storage.
CWE-200 OWASP A2:2021
2mo ago
security beginner
The server is tricked into making HTTP requests to internal or unintended destinations on behalf of the attacker.
CWE-918 OWASP A10:2021
2mo ago
security advanced
8.6
Requiring a second verification factor (OTP, hardware key) in addition to a password dramatically reduces account takeover risk.
OWASP A7:2021
2mo ago
security beginner
Weak Cryptography PHP 5.0+
Using MD5 or SHA1 for passwords or security tokens — both are cryptographically broken and trivially reversible.
CWE-327 OWASP A2:2021
2mo ago
security intermediate
7.5
XML External Entity (XXE) PHP 5.0+
A vulnerable XML parser processes external entity references, letting attackers read local files or trigger SSRF.
CWE-611 OWASP A5:2021
2mo ago
security advanced
8.2
A forged request tricks an authenticated user's browser into performing an unintended action on a site they're logged into.
CWE-352 OWASP A1:2021
2mo ago
security intermediate
6.5
User-supplied content rendered in the browser without escaping, allowing script injection into other users' sessions.
CWE-79 OWASP A3:2021
2mo ago
security intermediate
6.1
A user accesses another user's data by changing an ID in a URL or request — no authorisation check performed.
CWE-639 OWASP A1:2021
2mo ago
security intermediate
7.5
Insufficient Logging & Monitoring
Failure to log security events and monitor them allows attacks to go undetected and unresponded to.
CWE-778 OWASP A9:2021
2mo ago
security beginner
6.5
Unsanitised user input inserted directly into a SQL query, letting attackers read, modify, or delete database data.
CWE-89 OWASP A3:2021
2mo ago
security intermediate
9.8