Identification and Authentication Failures: OWASP Top 10 #7 Authentication and, by extension, user identification are central to web applications. These two mechanisms are used to manage rights and access (for ... 15.04 Applications
Security Misconfiguration: OWASP Top 10 #5 Security misconfiguration is a worrying problem, occupying fifth place in the OWASP Top 10. In fact, we frequently encounter many vulnerabilities of t... 25.10 Applications
Vulnerable and Outdated Components: OWASP Top 10 #6 Third-party components are omnipresent in web applications. Libraries, frameworks and other system components are used more and more, because they red... 24.10 Applications
Data Encryption and Cryptographic Failures: OWASP Top 10 #2 In a previous article, we reviewed the most critical and widespread vulnerability in web applications according to the OWASP Top 10: broken access con... 20.05 Applications
OWASP Top 10 #1: Broken Access Control And Security Tips The Open Web Application Security Project (OWASP) is a community working to improve the security of information systems and more specifically applicat... 31.03 Applications