Web Vulnerabilities Exercise

OWASP Top 10 Vulnerabilities

Each of the exercises below ask you to match a statement with one of the OWASP Top 10 Web Vulnerabilities, as listed above.

(1) Descriptions

Match each of the following descriptions with the vulnerability it describes:

(2) Negative Examples

Match the following examples of incorrect behaviour with the vulnerabilities each enables:

(3) Prevention Strategies

Match the following strategies with the vulnerabilities each helps prevent:

(4) Attack Scenarios

Match the following scenarios with the vulnerabilities each takes advantage of:

(5) Proactive Controls

Match OWASP's Top 10 Proactive Controls with the vulnerabilities each addresses: