{"id":20019,"date":"2023-02-06T17:21:39","date_gmt":"2023-02-06T22:21:39","guid":{"rendered":"https:\/\/aptgadget.com\/?p=20019"},"modified":"2023-02-07T03:25:48","modified_gmt":"2023-02-07T08:25:48","slug":"worst-web-app-vulnerabilities","status":"publish","type":"post","link":"https:\/\/aptgadget.com\/tr\/worst-web-app-vulnerabilities\/","title":{"rendered":"En K\u00f6t\u00fc Web Uygulamas\u0131 G\u00fcvenlik A\u00e7\u0131klar\u0131 Hemen K\u00f6\u015fede\u00a0"},"content":{"rendered":"<p>Siber sald\u0131r\u0131lar\u0131n g\u00fcc\u00fc ve s\u0131kl\u0131\u011f\u0131 son birka\u00e7 y\u0131ld\u0131r giderek art\u0131yor. Siber su\u00e7lular\u0131n elde etti\u011fi y\u0131ll\u0131k k\u00e2r\u0131n 2025 y\u0131l\u0131na kadar k\u00fcresel uyu\u015fturucu ticaretini bile ge\u00e7ece\u011fi tahmin ediliyor. Bu s\u00fcrekli art\u0131\u015f\u0131n b\u00fcy\u00fck bir bile\u015feni, teknoloji ortam\u0131m\u0131z\u0131n artan karma\u015f\u0131kl\u0131\u011f\u0131d\u0131r.&nbsp;<\/p>\n\n\n\n<p>\u00d6rne\u011fin, en \u00f6nemli web uygulamas\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131, \u00e7ok \u00e7al\u0131\u015fan g\u00fcvenlik ekiplerini atlatan ve bo\u015fa \u00e7\u0131karan k\u00fc\u00e7\u00fck uyarlamalar g\u00f6rmeye devam ediyor. Bu y\u00fck\u00fcn hafifletilmesi, t\u00fcm sekt\u00f6rlerde sa\u011flam bir g\u00fcvenlik protokol\u00fc temeli gerektirir. A\u015fa\u011f\u0131da a\u00e7\u0131kl\u0131yoruz <a href=\"https:\/\/www.imperva.com\/learn\/application-security\/what-is-web-application-firewall-waf\/\" target=\"_blank\" rel=\"noopener\">WAF nedir<\/a> ve benzer sistemler geli\u015fen bir tehdide kar\u015f\u0131 savunmaya nas\u0131l yard\u0131mc\u0131 olabilir?<\/p>\n\n\n\n<p><strong>S\u00fcper \u0130hlal Y\u0131l\u0131<\/strong><\/p>\n\n\n\n<p>2020, dijital ortamda b\u00fcy\u00fck \u00f6l\u00e7ekli de\u011fi\u015fimlere sahne oldu. \u0130\u015f ve e\u011flence hayat\u0131nda, hem kurumlar\u0131n hem de bireylerin kar\u015f\u0131la\u015ft\u0131\u011f\u0131 sald\u0131r\u0131 y\u00fczeyi daha \u00f6nce hi\u00e7 g\u00f6r\u00fclmemi\u015f boyutlara ula\u015ft\u0131. K\u0131smen bulut tabanl\u0131, uzaktan ve hibrit \u00e7al\u0131\u015fma modellerine ge\u00e7i\u015f sayesinde, geleneksel g\u00fcvenlik \u00e7eperinin aniden par\u00e7alanmas\u0131, siber su\u00e7un kay\u0131tlardaki en k\u00e2rl\u0131 y\u0131llar\u0131ndan birinin temellerini att\u0131. Yasad\u0131\u015f\u0131 siber su\u00e7 pazar\u0131n\u0131n y\u0131ll\u0131k 15%'lik b\u00fcy\u00fcme oran\u0131, 2025 y\u0131l\u0131na kadar $10,5 trilyonluk bir k\u00e2r beklentisiyle, \u00e7o\u011fu b\u00fcy\u00fck Bat\u0131 ekonomisinden \u00e7ok daha iyi bir performans g\u00f6stermi\u015ftir.&nbsp;<\/p>\n\n\n\n<p>Sald\u0131rganlar\u0131n \u00f6v\u00fcnd\u00fc\u011f\u00fc y\u00fcksek k\u00e2r, ba\u015far\u0131lar\u0131n\u0131n \u00f6nemli bir g\u00f6stergesi olan veri ihlalleri ile e\u015fle\u015fiyor. Ara\u015ft\u0131rmac\u0131lar 2021 y\u0131l\u0131nda 800'den fazla ihlali analiz ederek <a href=\"https:\/\/spycloud.com\/2021-annual-credential-exposure-report\/\" target=\"_blank\" rel=\"noopener\">4,6 milyar adet ki\u015fisel olarak tan\u0131mlanabilir bilgi<\/a> ve 1,5 milyar kimlik bilgisi \u00e7al\u0131nd\u0131. Bulut ve hibrit veri tabanlar\u0131 giderek daha de\u011ferli bilgiler ve kimlik bilgileri i\u00e7in ya\u011fmaland\u0131k\u00e7a, ihlallerin \u015fiddeti de art\u0131yor.&nbsp;<\/p>\n\n\n\n<p>B\u00fcy\u00fcyen sadece ihlallerin miktar\u0131 de\u011fil, ayn\u0131 zamanda bir veri ihlalinin mimarisi de son birka\u00e7 y\u0131lda \u00f6nemli \u00f6l\u00e7\u00fcde de\u011fi\u015fti. Her ihlalde yer alan ki\u015fisel ve kurumsal veriler aras\u0131ndaki \u00f6rt\u00fc\u015fme hi\u00e7 bu kadar g\u00fc\u00e7l\u00fc olmam\u0131\u015ft\u0131. <a href=\"https:\/\/www.businesswire.com\/news\/home\/20200603005158\/en\/Remote-Work-Study-How-Cyber-Habits-at-Home-Threaten-Corporate-Network-Security\" target=\"_blank\" rel=\"noopener\">77% uzaktan kumanda<\/a> \u00e7al\u0131\u015fanlar s\u00fcrekli olarak kurumsal olmayan, bireysel cihazlara g\u00fcvenmektedir. Uzaktan \u00e7al\u0131\u015fman\u0131n 'Kendi Cihaz\u0131n\u0131 Getir' do\u011fas\u0131, modern ihlalin av t\u00fcfe\u011fi tarz\u0131 patlama yar\u0131\u00e7ap\u0131n\u0131n yolunu a\u00e7m\u0131\u015ft\u0131r. Ki\u015fisel cihazlar kurumsal a\u011flarda oturum a\u00e7mak i\u00e7in kullan\u0131ld\u0131\u011f\u0131ndan, bir ihlal durumunda bireyin verileri de kurumun veri tabanlar\u0131 kadar a\u00e7\u0131kta kalabilir.&nbsp;<\/p>\n\n\n\n<p>\u0130hlallerin tekrarlanma s\u0131kl\u0131\u011f\u0131, 'superbreach' olaylar\u0131n\u0131n y\u00fckseli\u015fini de beraberinde getiriyor. Cit0Day gibi say\u0131s\u0131z site siber su\u00e7lular i\u00e7in \u00f6zel hizmetler sunarak hacklenmi\u015f veri tabanlar\u0131ndan ve s\u0131zd\u0131r\u0131lm\u0131\u015f kimlik bilgilerinden olu\u015fan geni\u015f bir koleksiyona eri\u015fim sa\u011fl\u0131yordu. Ayl\u0131k bir mebla\u011f kar\u015f\u0131l\u0131\u011f\u0131nda bilgisayar korsanlar\u0131na bu eri\u015fim hakk\u0131 veriliyordu.&nbsp;<\/p>\n\n\n\n<p>Ancak Kas\u0131m ay\u0131nda Cit0Day'in on binlerce k\u0131r\u0131lm\u0131\u015f veritaban\u0131 \u00e7al\u0131nd\u0131 ve birden fazla hack forumunda \u00fccretsiz olarak s\u0131zd\u0131r\u0131ld\u0131. Eski s\u0131z\u0131nt\u0131lar\u0131n tek bir s\u00fcper eri\u015fimde paketlenmesi, eski, s\u0131zd\u0131r\u0131lm\u0131\u015f kimlik bilgilerinin bile bir intikamla geri al\u0131nabilece\u011fi anlam\u0131na gelir. Ayr\u0131ca bu kimlik bilgilerinin nereden \u00e7al\u0131nd\u0131\u011f\u0131n\u0131 takip etmek de neredeyse imkans\u0131z hale geliyor.<\/p>\n\n\n\n<p>\u0130hlallerin artt\u0131\u011f\u0131 g\u00fcn\u00fcm\u00fczde, kurulu\u015flar\u0131n en yayg\u0131n web uygulamas\u0131 g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 tan\u0131yarak hem \u00e7al\u0131\u015fanlar\u0131 hem de m\u00fc\u015fterileri korumas\u0131 hayati \u00f6nem ta\u015f\u0131yor.&nbsp;<\/p>\n\n\n\n<p><strong>2023'\u00fcn En \u00d6nemli G\u00fcvenlik A\u00e7\u0131klar\u0131<\/strong><\/p>\n\n\n\n<p>OWASP'\u0131n Top 10'u, sekt\u00f6rdeki en k\u00f6t\u00fc g\u00fcvenlik a\u00e7\u0131klar\u0131na ili\u015fkin en derinlemesine k\u0131lavuzu sunarken, \u015f\u00fcphelenmeyen web uygulamas\u0131 geli\u015ftiricilerini s\u00fcrekli olarak t\u00f6kezleten 5 tekrar eden zay\u0131fl\u0131k vard\u0131r.&nbsp;<\/p>\n\n\n\n<p><strong>#1. SQL Enjeksiyonu<\/strong><\/p>\n\n\n\n<p>SQL, bir cihaz\u0131n \u00fc\u00e7\u00fcnc\u00fc taraf bir veritaban\u0131na geri d\u00f6nmesini sa\u011flayan bir dildir. Bu ve benzeri s\u00f6zdizimi, g\u00fcn\u00fcm\u00fcz\u00fcn hiper \u00e7evik, birbirine ba\u011fl\u0131 d\u00fcnyas\u0131n\u0131n temelini olu\u015fturur. Ancak, sald\u0131rganlar her zaman bu t\u00fcr veritabanlar\u0131na girmenin bir yolunu ararlar; SQL enjeksiyonu, bir sald\u0131rgan\u0131n veritaban\u0131 i\u00e7inde k\u00f6t\u00fc ama\u00e7l\u0131 komut dosyalar\u0131 \u00e7al\u0131\u015ft\u0131rmak i\u00e7in bu dili kulland\u0131\u011f\u0131n\u0131 ve sunucunun kendisini daha derin dahili sistemlere a\u00e7\u0131lan bir arka kap\u0131ya d\u00f6n\u00fc\u015ft\u00fcrd\u00fc\u011f\u00fcn\u00fc g\u00f6r\u00fcr.<\/p>\n\n\n\n<p><strong>#2. \u00c7apraz Site Komut Dosyas\u0131&nbsp;<\/strong><\/p>\n\n\n\n<p>Siteler aras\u0131 komut dosyas\u0131 olu\u015fturma (XSS), bir sald\u0131rgan\u0131n me\u015fru web sitelerini son kullan\u0131c\u0131n\u0131n cihaz\u0131na girmenin bir yolu olarak kulland\u0131\u011f\u0131n\u0131 g\u00f6r\u00fcr. Burada sald\u0131rgan, bir uygulama veya taray\u0131c\u0131 taraf\u0131ndan i\u015flendi\u011finde kullan\u0131c\u0131n\u0131n bilgisi olmadan \u00e7al\u0131\u015ft\u0131r\u0131lan bir URL'ye k\u00f6t\u00fc ama\u00e7l\u0131 bir komut dosyas\u0131 ekler. Bu k\u00f6t\u00fc ama\u00e7l\u0131 URL, son kullan\u0131c\u0131n\u0131n cihaz\u0131n\u0131 fidye yaz\u0131l\u0131mlar\u0131 ve tu\u015f kaydediciler de dahil olmak \u00fczere k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlarla dolu sald\u0131rgan kontrol\u00fcndeki bir sunucuya y\u00f6nlendirebilir.<\/p>\n\n\n\n<p><strong>#3. Yol Ge\u00e7i\u015fi<\/strong><\/p>\n\n\n\n<p>Uygulama geli\u015ftirme ba\u011flam\u0131 genellikle h\u0131zl\u0131d\u0131r ve pazara sunma s\u00fcresi m\u00fcmk\u00fcn olan en k\u0131sa s\u00fcreye \u00e7ekilmektedir. Sald\u0131rganlar her zaman karma\u015f\u0131k uygulamalardaki herhangi bir g\u00f6zetimden faydalanmaya isteklidir; bunlardan en \u00f6nemlisi yol ge\u00e7i\u015fine yol a\u00e7abilir.<\/p>\n\n\n\n<p>Bir uygulama genellikle istemcinin bilgisayar\u0131ndan yerel kaynaklara ihtiya\u00e7 duyabilirken, herhangi bir kullan\u0131c\u0131 giri\u015fi alan\u0131, bir sald\u0131rgan\u0131n dosya referansl\u0131 de\u011fi\u015fkenleri manip\u00fcle etme \u015fans\u0131n\u0131 riske atar. Bu, f\u0131rsat\u00e7\u0131 \"nokta nokta e\u011fik \u00e7izgi (..\/)\" dizileri veya mutlak dosya yollar\u0131 gibi g\u00f6r\u00fcnebilir ve bir sald\u0131rgan\u0131n uygulama kaynak kodu da dahil olmak \u00fczere rastgele dosya ve dizinlere eri\u015fmesine olanak tan\u0131r. Hata mesajlar\u0131 bile bir sald\u0131rgan\u0131n kritik verilerin tam olarak nerede depoland\u0131\u011f\u0131n\u0131 tahmin etmesine yard\u0131mc\u0131 olabilir.&nbsp;<\/p>\n\n\n\n<p><strong>#4. Bozuk Kimlik Do\u011frulama<\/strong><\/p>\n\n\n\n<p>Birka\u00e7 farkl\u0131 g\u00fcvenlik a\u00e7\u0131\u011f\u0131n\u0131 ifade eden daha geni\u015f bir terim olan k\u0131r\u0131k kimlik do\u011frulama, bu y\u0131l en ciddi sorunlardan biri olmaya devam ediyor. Bir sald\u0131rgan\u0131n uygulaman\u0131n me\u015fru kullan\u0131c\u0131lar\u0131n\u0131n kimli\u011fine b\u00fcr\u00fcnmesine olanak tan\u0131yarak genellikle bir uygulaman\u0131n i\u00e7 organlar\u0131 \u00fczerinde tam bir serbestlik sa\u011flar. Bozuk kimlik do\u011frulama, bir uygulaman\u0131n kimlik bilgileri veya oturum y\u00f6netiminde ciddi bir zay\u0131fl\u0131k olarak ortaya \u00e7\u0131kar.<\/p>\n\n\n\n<p>Oturum kimlikleri, web uygulamalar\u0131n\u0131n her bir kullan\u0131c\u0131y\u0131 ve ziyareti nas\u0131l ay\u0131rt etti\u011fini a\u00e7\u0131klar. Bu, bir uygulaman\u0131n o ki\u015fiyle nas\u0131l ileti\u015fim kuraca\u011f\u0131n\u0131n temelini olu\u015fturur. G\u00fcvenli bir \u015fekilde yap\u0131land\u0131r\u0131lmazsa, \u00e7erezler gibi oturum kimlikleri \u00e7al\u0131nabilir ve bir sald\u0131rgan\u0131n savunmas\u0131z oturumu ele ge\u00e7irmesine olanak tan\u0131r. Bu, tam geli\u015fmi\u015f kimlik bilgisi h\u0131rs\u0131zl\u0131\u011f\u0131 kadar ciddi bir durumdur.<\/p>\n\n\n\n<p><strong>#5. G\u00fcvenlik Yanl\u0131\u015f Yap\u0131land\u0131rmalar\u0131<\/strong><\/p>\n\n\n\n<p>Y\u00fczeyde, kusurlardan, eski yaz\u0131l\u0131mlardan ve yanl\u0131\u015f yap\u0131land\u0131rmalardan kurtulmak i\u00e7in sadece yama uygulamak bariz bir \u00e7\u00f6z\u00fcm gibi g\u00f6r\u00fcnmektedir. Ancak, g\u00fcvenlik ekipleri b\u00fcy\u00fck \u00f6l\u00e7\u00fcde bunalm\u0131\u015f ve a\u015f\u0131r\u0131 \u00e7al\u0131\u015fmaktad\u0131r. K\u0131smen modern kurumsal teknoloji y\u0131\u011f\u0131nlar\u0131n\u0131n karma\u015f\u0131kl\u0131\u011f\u0131 ve k\u0131smen de g\u00fcn\u00fcm\u00fcz\u00fcn geli\u015ftirme d\u00f6ng\u00fclerinin s\u00fcrekli \u00e7evik yap\u0131s\u0131 nedeniyle g\u00fcvenlik, her yamay\u0131 h\u0131zla uygulamakta zorlanmaktad\u0131r. Bu durum son 4 sorunu daha da derinle\u015ftirmektedir, \u00e7\u00fcnk\u00fc bir yama kamuya a\u00e7\u0131kland\u0131\u011f\u0131nda sald\u0131rganlar esasen bir a\u00e7\u0131ktan haberdar olmaktad\u0131r.&nbsp;<\/p>\n\n\n\n<p><strong>Web Uygulamalar\u0131n\u0131 Yama \u00d6ncesi G\u00fcvenli Tutmak<\/strong><\/p>\n\n\n\n<p>Geleneksel yama uygulamas\u0131 bozuldu. Ancak baz\u0131 g\u00fcvenlik ara\u00e7lar\u0131, bir yama y\u00fcklenmeden \u00f6nce bile istismar giri\u015fimlerini savu\u015fturmaya yard\u0131mc\u0131 olabilir. \u00d6nemli bir \u00f6rnek Web Uygulamas\u0131 G\u00fcvenlik Duvar\u0131d\u0131r (WAF). Bu ara\u00e7 bir uygulama ile halka a\u00e7\u0131k internet aras\u0131nda yer al\u0131r ve pozitif ya da negatif g\u00fcvenlik modeline g\u00f6re \u00e7al\u0131\u015f\u0131r. Bunlardan ilki, izin verilen eylemler ve davran\u0131\u015flar listesine dayal\u0131 olarak trafi\u011fi filtreler. Bu listelerin d\u0131\u015f\u0131ndaki herhangi bir davran\u0131\u015f, o eylemin engellendi\u011fini g\u00f6r\u00fcr ve XSS ve SQL enjeksiyonu \u00f6rneklerinin ortadan kald\u0131r\u0131lmas\u0131na yard\u0131mc\u0131 olur. WAF'\u0131n negatif g\u00fcvenlik modeliyle \u00e7al\u0131\u015fan di\u011fer versiyonu, engellenecek belirli faaliyetleri belirtir. Benzer koruyucu nitelikler sunan ve ger\u00e7ek kullan\u0131c\u0131lar \u00fczerinde daha az etkisi olan bu g\u00fcvenlik bi\u00e7imi biraz daha fazla bak\u0131m gerektirir.&nbsp;<\/p>\n\n\n\n<p>Model ne olursa olsun, bir WAF f\u0131rsat\u00e7\u0131 sald\u0131rganlar\u0131n \u00e7al\u0131\u015fanlara veya m\u00fc\u015fterilere zarar verme olas\u0131l\u0131\u011f\u0131n\u0131 \u00f6nemli \u00f6l\u00e7\u00fcde azaltabilir ve bir kurulu\u015fun g\u00fcvenlik duru\u015funu gelece\u011fe y\u00f6nelik olarak geli\u015ftirmesine yard\u0131mc\u0131 olabilir.&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Cyberattacks have only grown in strength and frequency over the last few years. It\u2019s projected that, by 2025, the annual profits boasted by cybercriminals will surpass that of even the global drug trade. A large component to this constant increase is the growing complexity of our tech landscape.&nbsp; For instance, top web app vulnerabilities continue &hellip;<\/p>","protected":false},"author":1,"featured_media":20021,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[876],"tags":[],"class_list":["post-20019","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-editorial"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>The Worst Web App Vulnerabilities Are Right Around the Corner\u00a0 - AptGadget.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aptgadget.com\/tr\/worst-web-app-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Worst Web App Vulnerabilities Are Right Around the Corner\u00a0\" \/>\n<meta property=\"og:description\" content=\"Cyberattacks have only grown in strength and frequency over the last few years. It\u2019s projected that, by 2025, the annual profits boasted by cybercriminals will surpass that of even the global drug trade. A large component to this constant increase is the growing complexity of our tech landscape.&nbsp; For instance, top web app vulnerabilities continue &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aptgadget.com\/tr\/worst-web-app-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"AptGadget.com\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-06T22:21:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-07T08:25:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aptgadget.com\/wp-content\/uploads\/2023\/02\/app-vulnerabilities.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"gadgeteer\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"gadgeteer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/\"},\"author\":{\"name\":\"gadgeteer\",\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/b5ec99736bbdc994f64e1445eb6653dc\"},\"headline\":\"The Worst Web App Vulnerabilities Are Right Around the Corner\u00a0\",\"datePublished\":\"2023-02-06T22:21:39+00:00\",\"dateModified\":\"2023-02-07T08:25:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/\"},\"wordCount\":1115,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2023\/02\/app-vulnerabilities.jpg\",\"articleSection\":[\"Editorials\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/\",\"url\":\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/\",\"name\":\"The Worst Web App Vulnerabilities Are Right Around the Corner\u00a0 - AptGadget.com\",\"isPartOf\":{\"@id\":\"https:\/\/aptgadget.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2023\/02\/app-vulnerabilities.jpg\",\"datePublished\":\"2023-02-06T22:21:39+00:00\",\"dateModified\":\"2023-02-07T08:25:48+00:00\",\"author\":{\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/b5ec99736bbdc994f64e1445eb6653dc\"},\"breadcrumb\":{\"@id\":\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#primaryimage\",\"url\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2023\/02\/app-vulnerabilities.jpg\",\"contentUrl\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2023\/02\/app-vulnerabilities.jpg\",\"width\":1024,\"height\":683,\"caption\":\"app-vulnerabilities\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/aptgadget.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Worst Web App Vulnerabilities Are Right Around the Corner\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/aptgadget.com\/#website\",\"url\":\"https:\/\/aptgadget.com\/\",\"name\":\"AptGadget.com\",\"description\":\"Technology Reviews, Products and News\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/aptgadget.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"tr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/b5ec99736bbdc994f64e1445eb6653dc\",\"name\":\"gadgeteer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0a375a65cb3e5864af36a386923874096e1c658e4948b08b3f39feda34840eef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0a375a65cb3e5864af36a386923874096e1c658e4948b08b3f39feda34840eef?s=96&d=mm&r=g\",\"caption\":\"gadgeteer\"},\"url\":\"https:\/\/aptgadget.com\/tr\/author\/gadgeteer\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Worst Web App Vulnerabilities Are Right Around the Corner\u00a0 - AptGadget.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aptgadget.com\/tr\/worst-web-app-vulnerabilities\/","og_locale":"tr_TR","og_type":"article","og_title":"The Worst Web App Vulnerabilities Are Right Around the Corner\u00a0","og_description":"Cyberattacks have only grown in strength and frequency over the last few years. It\u2019s projected that, by 2025, the annual profits boasted by cybercriminals will surpass that of even the global drug trade. A large component to this constant increase is the growing complexity of our tech landscape.&nbsp; For instance, top web app vulnerabilities continue &hellip;","og_url":"https:\/\/aptgadget.com\/tr\/worst-web-app-vulnerabilities\/","og_site_name":"AptGadget.com","article_published_time":"2023-02-06T22:21:39+00:00","article_modified_time":"2023-02-07T08:25:48+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/aptgadget.com\/wp-content\/uploads\/2023\/02\/app-vulnerabilities.jpg","type":"image\/jpeg"}],"author":"gadgeteer","twitter_misc":{"Yazan:":"gadgeteer","Tahmini okuma s\u00fcresi":"5 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/"},"author":{"name":"gadgeteer","@id":"https:\/\/aptgadget.com\/#\/schema\/person\/b5ec99736bbdc994f64e1445eb6653dc"},"headline":"The Worst Web App Vulnerabilities Are Right Around the Corner\u00a0","datePublished":"2023-02-06T22:21:39+00:00","dateModified":"2023-02-07T08:25:48+00:00","mainEntityOfPage":{"@id":"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/"},"wordCount":1115,"commentCount":0,"image":{"@id":"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/aptgadget.com\/wp-content\/uploads\/2023\/02\/app-vulnerabilities.jpg","articleSection":["Editorials"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/","url":"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/","name":"The Worst Web App Vulnerabilities Are Right Around the Corner\u00a0 - AptGadget.com","isPartOf":{"@id":"https:\/\/aptgadget.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/aptgadget.com\/wp-content\/uploads\/2023\/02\/app-vulnerabilities.jpg","datePublished":"2023-02-06T22:21:39+00:00","dateModified":"2023-02-07T08:25:48+00:00","author":{"@id":"https:\/\/aptgadget.com\/#\/schema\/person\/b5ec99736bbdc994f64e1445eb6653dc"},"breadcrumb":{"@id":"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#primaryimage","url":"https:\/\/aptgadget.com\/wp-content\/uploads\/2023\/02\/app-vulnerabilities.jpg","contentUrl":"https:\/\/aptgadget.com\/wp-content\/uploads\/2023\/02\/app-vulnerabilities.jpg","width":1024,"height":683,"caption":"app-vulnerabilities"},{"@type":"BreadcrumbList","@id":"https:\/\/aptgadget.com\/worst-web-app-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aptgadget.com\/"},{"@type":"ListItem","position":2,"name":"The Worst Web App Vulnerabilities Are Right Around the Corner\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/aptgadget.com\/#website","url":"https:\/\/aptgadget.com\/","name":"AptGadget.com","description":"Technology Reviews, Products and News","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aptgadget.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"tr"},{"@type":"Person","@id":"https:\/\/aptgadget.com\/#\/schema\/person\/b5ec99736bbdc994f64e1445eb6653dc","name":"gadgeteer","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/aptgadget.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0a375a65cb3e5864af36a386923874096e1c658e4948b08b3f39feda34840eef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0a375a65cb3e5864af36a386923874096e1c658e4948b08b3f39feda34840eef?s=96&d=mm&r=g","caption":"gadgeteer"},"url":"https:\/\/aptgadget.com\/tr\/author\/gadgeteer\/"}]}},"_links":{"self":[{"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/posts\/20019","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/comments?post=20019"}],"version-history":[{"count":2,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/posts\/20019\/revisions"}],"predecessor-version":[{"id":20022,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/posts\/20019\/revisions\/20022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/media\/20021"}],"wp:attachment":[{"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/media?parent=20019"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/categories?post=20019"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aptgadget.com\/tr\/wp-json\/wp\/v2\/tags?post=20019"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}