#
OWASP web vulnerabilities
#
Command Injection
Command Injection occurs when server-side code in a webapp makes a system call. An attacker to take advantage of that made system call to execute operating system commands on the server.
#
Broken Authentication
If one can find flaws in an authentication mechanism, they would then successfully gain access to other users’ accounts. This would allow the attacker to access sensitive data.
#
Sensitive Data Exposure
When a webapp accidentally divulges sensitive data.