Statements (30)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Vulnerability
gptkb:Cybersecurity_concept |
| gptkbp:affects |
Web applications
Operating systems Network devices Cloud environments |
| gptkbp:cause |
Unauthorized access
System compromise Data breach |
| gptkbp:describedBy |
gptkb:OWASP_Top_Ten
|
| gptkbp:detects |
Penetration testing
Vulnerability scanning Configuration audits |
| gptkbp:example |
Verbose error messages
Default credentials Improper permissions Unnecessary services enabled Unpatched software |
| gptkbp:firstDescribed |
gptkb:OWASP
|
| gptkbp:mitigatedBy |
Patch management
Least privilege principle Automated configuration management Regular security reviews |
| gptkbp:relatedTo |
OWASP A05:2021
|
| gptkbp:riskFactor |
High
|
| gptkbp:bfsParent |
gptkb:OWASP_Top_10_vulnerabilities
gptkb:OWASP_API_Security_Top_10 gptkb:OWASP_Top_Ten |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Security Misconfiguration
|