OWASP Top 10

The OWASP Top 10 is a standard awareness framework for developers and web application security.

A01-2021 - Broken Access Control

Broken access control vulnerabilities arise when an application fails to properly enforce restrictions on what authenticated users are allowed to do. Attackers can exploit broken access controls to gain unauthorized access to sensitive functions and data, such as viewing other users' private information or modifying data.

6

Find out more

A02-2021 - Cryptographic Failures

Cryptographic failures occur when cryptographic algorithms or protocols are used incorrectly, leading to security vulnerabilities. Common cryptographic failures include weak key management, insecure random number generation, and improper usage of cryptographic functions.

5

Find out more

A03-2021 - Injection

Injection flaws, such as SQL, NoSQL, OS, and LDAP injection, occur when untrusted data is sent to an interpreter as part of a command or query. The attacker's hostile data can trick the interpreter into executing unintended commands or accessing data without proper authorization.

6

Find out more

A04-2021 - Insecure Design

Insecure design refers to flaws in the overall design of an application or system that create security vulnerabilities. These flaws may include inadequate threat modeling, lack of secure architecture, or failure to consider security requirements during the design phase.

10

Find out more

A05-2021 - Security Misconfiguration

Security misconfiguration occurs when security settings are not implemented or are configured incorrectly. This can happen at any level of an application stack, including the web server, application server, database, platform, or framework. Attackers can exploit security misconfigurations to gain unauthorized access, escalate privileges, and execute arbitrary code.

6

Find out more

A06-2021 - Vulnerable and Outdated Components

Vulnerable and outdated components refer to the use of third-party libraries, frameworks, or software components that contain known security vulnerabilities or are not up-to-date with security patches. Attackers can exploit these vulnerabilities to compromise the security of the application.

2

Find out more

A07-2021 - Identification and Authentication Failures

Identification and authentication failures occur when an application fails to properly verify the identity of users or fails to adequately authenticate users before granting access to sensitive functionality or data. Attackers can exploit identification and authentication failures to gain unauthorized access to the application.

3

Find out more

A08-2021 - Software and Data Integrity Failures

Software and data integrity failures occur when an application fails to properly validate and protect the integrity of data throughout its lifecycle. This can include failure to detect unauthorized changes to data, improper handling of input data, or lack of sufficient data validation.

4

Find out more

A09-2021 - Security Logging and Monitoring Failures

Security logging and monitoring failures refer to the lack of adequate mechanisms for recording and monitoring security events within an application or environment. Without proper logging and monitoring, attackers can operate undetected, making it difficult to detect security breaches, investigate incidents, and respond effectively to threats.

1

Find out more

A10-2021 - Server Side Request Forgery (SSRF)

Server Side Request Forgery (SSRF) vulnerabilities occur when an attacker can manipulate the requests sent by an application to access resources on the server's internal network or other external systems. Attackers can exploit SSRF vulnerabilities to bypass access controls, access sensitive data, or perform unauthorized actions.

0

Find out more