# OWASP web vulnerabilities

# Command Injection

Command Injection occurs when server-side code in a webapp makes a system call. An attacker to take advantage of that made system call to execute operating system commands on the server.

# Broken Authentication

If one can find flaws in an authentication mechanism, they would then successfully gain access to other users’ accounts. This would allow the attacker to access sensitive data.

# Sensitive Data Exposure

When a webapp accidentally divulges sensitive data.

#