The OWASP Top Ten is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web applications. The Top Ten Project creates awareness about the most critical risks to the security of applications.

What is OWASP?

OWASP (Open Web Application Security Project) is a worldwide not-for-profit charitable organization focused on improving the security of software. Our mission is to make software security visible, so that individuals and organizations worldwide can make informed decisions.

Top Ten Risks in 2021

  1. Injection

    • SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of a web application.
    • SQL Injection
  2. Broken Authentication

    • This category includes injection flaws, where the application takes user supplied data and uses it in an unsafe way.
  3. Sensitive Data Exposure

    • This category includes the use of less secure protocols and storing sensitive data without encryption.
  4. XML External Entities (XXE)

    • XXE is a security flaw in XML processors that allows attackers to read and write to arbitrary files, execute commands on the server, and access other sensitive data.
  5. Cross-Site Scripting (XSS)

    • XSS is a type of injection, in which malicious scripts are injected into otherwise benign and trusted web pages viewed by other users.
  6. Using Components with Known Vulnerabilities

    • This category includes the use of components with known vulnerabilities, such as outdated libraries and frameworks.
  7. Insufficient Logging & Monitoring

    • This category includes the lack of proper logging and monitoring mechanisms, which can lead to difficulties in detecting and responding to security incidents.
  8. Security Misconfiguration

    • This category includes the improper configuration of security settings on servers and applications.
  9. Using Deprecated or Weak Cryptographic Algorithms

    • This category includes the use of outdated or weak cryptographic algorithms for data encryption and secure communication.
  10. Identity Forgery

    • This category includes the ability for attackers to impersonate legitimate users or entities.

For more detailed information and resources about the OWASP Top Ten, please visit our OWASP Top Ten page.


Back to Home