OWASP · 2021
Top 10 for Web Apps
- 01A01Broken Access ControlIDOR, privilege escalation, cross-tenant leaksFull
- 02A02Cryptographic FailuresJWT misuse, leaked secrets, weak ciphersFull
- 03A03InjectionSQLi, command, NoSQL, template, headerFull
- 04A04Insecure DesignLogic flaws, business-flow abuse, chain analysisFull
- 05A05Security MisconfigurationCORS, headers, exposed admin, defaultsFull
- 06A06Vulnerable ComponentsDaily CISA KEV ingest · slopsquatting heuristicFull
- 07A07Authentication FailuresClerk, Auth0, Okta, Stytch, Cognito, Firebase, Supabase, customFull
- 08A08Data Integrity FailuresWebhook signature replay, deserializationFull
- 09A09Logging & MonitoringSurfaced as side-effect; not a primary domainPartial
- 10A10Server-Side Request ForgeryInternal-IP probes, metadata-endpoint reachabilityFull