OWASP top 10 : 2021
this part breaks each OWASP topic down and includes details on the vulnerabilities, how they occur, and how you can exploit them.
Broken Access Control
Cryptographic Failures
Injection
Insecure Design
Security Misconfiguration
Vulnerable and Outdated Components
Identification and Authentication Failures
Software and Data Integrity Failures
Security Logging & Monitoring Failures
Server-Side Request Forgery (SSRF)
Last updated