Skip to content

OWASP Top 10

The 10 most critical web application security risks published by OWASP.

OWASP Top 10 Overview

Users can access resources beyond their intended permissions.

# Example: IDOR
GET /api/users/123/profile ← user 456 can access this

Using weak encryption algorithms or failing to encrypt sensitive data.

SQL Injection, XSS, Command Injection…

-- SQL Injection example
SELECT * FROM users WHERE id = '1' OR '1'='1'

Missing security controls in the design phase, not implementation bugs.

Misconfigured servers, frameworks, or cloud services.

Using libraries/frameworks with known vulnerabilities.

Flaws in authentication - brute force, weak passwords, session fixation.

Failing to verify integrity of software updates and CI/CD pipelines.

Insufficient logging and monitoring, making attacks undetectable.

Server is tricked into sending requests to internal resources.