Security Notes
search
Ctrlk
  • redhatWhoami
  • Pentestingchevron-right
    • WEP-Penchevron-right
      • Reconnaissance
      • Enumeration
      • OWASP Top 10:2025chevron-right
        • A10 Mishandling of Exceptional Conditionschevron-right
        • A09 Security Logging and Alerting Failureschevron-right
        • A08 Software or Data Integrity Failureschevron-right
        • A07 Authentication Failureschevron-right
        • A06 Insecure Designchevron-right
        • A05 Injectionchevron-right
        • A04 Cryptographic Failureschevron-right
        • A03 Software Supply Chain Failureschevron-right
        • A02 Security Misconfigurationchevron-right
          • Cookie Security
          • XML External Entity
          • Improper Model Validation
          • Data Transmission Without Encryption
          • CORS Miscofigration
          • Mail Server Misconfiguration
          • Debug Binary Misconfiguration
          • Exposure of Sensitive Information Through Environment Variables
        • A01 Broken Access Controlchevron-right
      • Checklistschevron-right
    • API-Penchevron-right
    • NET-Penchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Pentestingchevron-right
  2. WEP-Penchevron-right
  3. OWASP Top 10:2025

A02 Security Misconfiguration

Cookie Securitychevron-rightXML External Entitychevron-rightImproper Model Validationchevron-rightData Transmission Without Encryptionchevron-rightCORS Miscofigrationchevron-rightMail Server Misconfigurationchevron-rightDebug Binary Misconfigurationchevron-rightExposure of Sensitive Information Through Environment Variableschevron-right
PreviousVulnerable and Outdated Componentschevron-leftNextCookie Securitychevron-right