What Is Bug Vulnerability

A bug is when a system isn't behaving as it's designed to behave. A vulnerability
is a way of abusing the system (most commonly in a security-related
way) - whether that's due to a design fault or an implementation fault.
What is a vulnerability?
Vulnerability is a cyber-security term that refers to a flaw in a system that can leave it open to attack.
In computer security, a vulnerability is a hole or a weakness in the application, which can be
a design flaw or an implementation bug, that allows an attacker to
cause harm to the stakeholders of an application. Stakeholders include
the application owner, application users, and other entities that rely
on the application.
Most Common WEB Security Vulnerabilities
SQL Injections
SQL injection is a type of web application security vulnerability in which an attacker attempts to use application code to access or corrupt database content. If successful, this allows the attacker to create, read, update, alter, or delete data stored in the back-end database. SQL injection is one of the most prevalent types of web application security vulnerabilities.
Cross Site Scripting (XSS)
Cross-site scripting (XSS) targets an application's users by injecting code, usually a client-side script such as JavaScript, into a web application's output. The concept of XSS is to manipulate client-side scripts of a web application to execute in the manner desired by the attacker. XSS allows attackers to execute scripts in the victim's browser which can hijack user sessions, deface websites, or redirect the user to malicious sites.Broken Authentication & Session Management
Broken authentication and session management encompass several security issues, all of them having to do with maintaining the identity of a user. If authentication credentials and session identifiers are not protected at all times an attacker can hijack an active session and assume the identity of a user.Security Misconfiguration
Security misconfiguration encompasses several types of vulnerabilities all centered on a lack of maintenance or a lack of attention to the web application configuration. A secure configuration must be defined and deployed for the application, frameworks, application server, web server, database server, and platform. Security misconfiguration gives hackers access to private data or features and can result in a complete system compromise.Cross-Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) is a malicious attack where a user is tricked into performing an action he or she didn't intend to do. A third-party website will send a request to a web application that a user is already authenticated against (e.g. their bank). The attacker can then access functionality via the victim's already authenticated browser. Targets include web applications like social media, in browser email clients, online banking, and web interfaces for network devices.So there are many types of web vulnerabilities and browser and android vulnerabilities. This article means to give some common information about website security for those who have no info about this.Hope you like this.
Comments
Post a Comment