OWASP top 10 : 2021
this part breaks each OWASP topic down and includes details on the vulnerabilities, how they occur, and how you can exploit them.
- Broken Access Control 
- Cryptographic Failures 
- Injection 
- Insecure Design 
- Security Misconfiguration 
- Vulnerable and Outdated Components 
- Identification and Authentication Failures 
- Software and Data Integrity Failures 
- Security Logging & Monitoring Failures 
- Server-Side Request Forgery (SSRF) 
Last updated