OWASP Top Vulnerabilities Sample Clauses

OWASP Top Vulnerabilities. Here is Oxygis' position on the main web application security issues, as listed by the Open Web Application Security Project (OWASP): • Injection flaws: Injection flaws, including SQL injection, are common in web applications. Injection occurs when user-supplied data is sent to an interpreter as part of a command or query. The attacker's hostile data causes the interpreter to execute unwanted commands or modify data. Oxygis uses an ORM that abstracts the construction of queries and prevents SQL injections. Normally, developers do not manually build SQL queries, which are generated by the ORM, and the parameters are always correctly escaped. • Cross Site Scripting (XSS): XSS flaws occur when an application takes user-supplied data and sends it to a web browser without first validating or encoding that content. XSS allows attackers to execute scripts in the victim's browser, which can hijack user sessions, deface websites, possibly introduce worms, etc. Oxygis escapes all data which prevents XSS. • Cross Site Request Forgery (CSRF): A CSRF attack forces a logged-in victim's browser to send a fake HTTP request, including the victim's session cookie and any other automatically included authentication information, to a vulnerable web application. This allows the attacker to force the victim's browser to generate requests that the vulnerable application thinks are legitimate requests from the victim. Oxygis includes a built-in CSRF protection mechanism. It prevents any HTTP controller from receiving a request without the corresponding security token. This is the recommended technique for CSRF prevention. • Malicious file execution: Remote File Inclusion (RFI) vulnerable code allows attackers to include hostile code and data, resulting in devastating attacks, such as total server compromise. Oxygis does not expose functions for remote file inclusion. • Insecure direct object reference: A direct object reference occurs when a developer exposes a reference to an internal implementation object, such as a file, directory, database record, or key, as a URL or form parameter. Attackers can manipulate these references to gain unauthorised access to other objects. Access control to Oxygis is not implemented at the user interface, so there is no risk of exposing references to internal objects in URLs. Attackers cannot bypass the access control layer by manipulating these references, as each request must always pass through the data access validation layer.
AutoNDA by SimpleDocs

Related to OWASP Top Vulnerabilities

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Non-Grievability No dispute over a claim for any benefits extended by this Health and Welfare Fund shall be subject to the grievance procedure.

  • Benchmarks for Measuring Accessibility For the purposes of this Agreement, the accessibility of online content and functionality will be measured according to the W3C’s Web Content Accessibility Guidelines (WCAG) 2.0 Level AA and the Web Accessibility Initiative Accessible Rich Internet Applications Suite (WAI-ARIA) 1.0 for web content, which are incorporated by reference. Adherence to these accessible technology standards is one way to ensure compliance with the College’s underlying legal obligations to ensure that people with disabilities are able to acquire the same information, engage in the same interactions, and enjoy the same benefits and services within the same timeframe as their nondisabled peers, with substantially equivalent ease of use; that they are not excluded from participation in, denied the benefits of, or otherwise subjected to discrimination in any College programs, services, and activities delivered online, as required by Section 504 and the ADA and their implementing regulations; and that they receive effective communication of the College’s programs, services, and activities delivered online.

  • MANAGEMENT OF EVALUATION OUTCOMES 12.1 The evaluation of the Employee’s performance will form the basis for rewarding outstanding performance or correcting unacceptable performance.

  • Fill, Backfill and Landscaping No soil found on Site, or transported to the Site from remote locations, which contains debris or waste or Hazardous Materials shall be used for fill, backfill or landscaping topsoil.

  • Technical Requirements for SCPs/Databases 10.5.3.1 BellSouth shall provide physical access to SCPs through the SS7 network and protocols with TCAP as the application layer protocol.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • Service Level Expectations Without limiting any other requirements of the Agreement, the Service Provider shall meet or exceed the following standards, policies, and guidelines:

  • Solicitations for Subcontracts, Including Procurement of Materials and Equipment In all solicitation, either by competitive bidding or negotiation, made by the Contractor for work to be performed under a subcontract, including procurement of materials or leases of equipment, each potential Subcontractor or supplier shall be notified by the Contractor of the Contractor’s obligations under this Agreement and the Regulations relative to non-discrimination on the grounds of race, color, or national origin.

Time is Money Join Law Insider Premium to draft better contracts faster.