{"version":"1.0","provider_name":"Cloudkul","provider_url":"https:\/\/cloudkul.com\/blog","author_name":"Amit Yadav","author_url":"https:\/\/cloudkul.com\/blog\/author\/amit-yadav411\/","title":"OWASP Top 10 Vulnerabilities - Cloudkul","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"EO0nYoNvxE\"><a href=\"https:\/\/cloudkul.com\/blog\/what-are-the-owasp-top-10-vulnerabilities\/\">OWASP Top 10 Vulnerabilities<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cloudkul.com\/blog\/what-are-the-owasp-top-10-vulnerabilities\/embed\/#?secret=EO0nYoNvxE\" width=\"600\" height=\"338\" title=\"&#8220;OWASP Top 10 Vulnerabilities&#8221; &#8212; Cloudkul\" data-secret=\"EO0nYoNvxE\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"The OWASP Top 10 Web Application Vulnerabilities is to provide guidance to developers and security professionals about the most critical vulnerabilities that are common in web applications, which can be easily exploited by attackers."}