法兰绒是什么面料| 独是什么生肖| 猿是什么动物| 肺大泡有什么症状| 贫血查什么| 什么叫抗氧化| 中班小朋友应该学什么| 凡士林是什么东西| 水痘疫苗叫什么| 孩子鼻子出血什么原因造成的| 农历十月初八是什么星座| essence是什么意思| 什么是根管治疗牙齿| 血糖高可以喝什么饮料| 吃什么补维生素b| 血糖高吃什么饭| 双鱼座最配什么星座| 朋友圈发女朋友照片配什么文字| 产假什么时候开始休| 言尽于此是什么意思| 五行火生什么克什么| 无什么什么什么| 红光对皮肤有什么作用| 来月经肚子疼是什么原因| sg是什么意思| 头孢不能和什么一起吃| 11.15是什么星座| 表白送什么礼物好| 用激素药有什么副作用| 女孩喜欢什么礼物| 印度人口什么时候超过中国| 前列腺炎是什么症状| 透析到什么程度会死亡| 仰天长叹的意思是什么| 小狗不能吃什么| 姐姐的老公叫什么| 月经不正常吃什么药| 孩子咬嘴唇是什么原因| 丁克是什么| 康复治疗学是做什么的| 比心什么意思| 山药煲汤搭配什么好| 潜血阴性是什么意思| 方巾是干什么用的| 吃什么补脾胃| 人流后什么时候来月经| 腿麻脚麻用什么药能治| 跑步腰疼是什么原因| 吃什么可以增强硬度| 唇炎去医院挂什么科| 鱼子酱为什么那么贵| 行代表什么生肖| 户口迁移需要什么手续| vogue是什么牌子| 女生的逼长什么样| 尿蛋白质弱阳性是什么意思| 丽江机场叫什么名字| 补中益气丸治什么病| ta代表什么| 苏格兰牧羊犬吃什么| 为什么身上老是痒| 什么是69| 总胆红素高是怎么回事有什么危害| 农历五月二十是什么星座| 女人腰上有痣代表什么| 手脱皮用什么药膏| 薛之谦为什么离婚| 滑膜炎用什么膏药好| 什么狗不如| 口扫是什么| 农字五行属什么| 血压高会有什么症状| 奇妙是什么意思| 什么是快闪| 11月7号是什么星座| 春天的雨像什么| burberry是什么档次| 例假提前是什么原因| 什么样的土豆不能吃| 龙什么鱼| dei是什么意思| 眼屎多什么原因| 便秘和腹泻交替出现是什么意思| 宁波有什么特产| 什么星空| 川芎有什么功效| 甲硝唑吃多了有什么危害| 什么鱼最好养| 增值税是什么| 尿肌酐高是什么原因| 为什么眼睛老是流泪| 下身有异味用什么药| 6月30号什么星座| 宝宝手足口病吃什么药| a型血和o型血生的孩子是什么血型| 腹部ct能检查出什么| 猕猴桃是什么季节的水果| 唐僧念的紧箍咒是什么| 姝五行属什么| 心里难受想吐是什么原因| 上海元宵节吃什么| 美缝什么时候做| 港澳通行证办理需要什么材料| 钟点房什么意思| 时值是什么意思| 舌苔紫色是什么原因| 可遇不可求什么意思| 前哨是什么意思| 五月天主唱叫什么名字| 爵迹小说为什么不写了| 蚯蚓是什么动物| 会来事是什么意思| 特斯拉是什么电池| 孩子气是什么意思| 男士蛋皮痒用什么药| benny是什么意思| 红参有什么作用| 蛇蝎心肠是什么生肖| 高笋和茭白有什么区别| 过剩是什么意思| 肾结石吃什么比较好| 震颤是什么病| 打疫苗挂什么科| 菠菜和豆腐为什么不能一起吃| 过氧化氢阳性是什么意思| 86岁属什么生肖| 幽门杆菌吃什么药| 三宫六院是什么意思| 什么羊不能吃| 老虎头是什么牌子衣服| 胃气虚吃什么中成药| 什么是脂肪| cin3是什么意思| 拉脱水是什么症状| 约法三章什么意思| 柿子与什么食物相克| 整天想睡觉是什么原因| 家里为什么有小飞虫| 蜻蜓点水是什么生肖| 肌酐高是什么原因| 秋天喝什么粥好| 缺少雌激素吃什么可以补充| 顽疾是什么意思| 血小板低有什么危害| 剌是什么意思| 玻色因是什么| 手抖吃什么药马上控制| 车水马龙是什么意思| 12月8号什么星座| 晴纶是什么材质| cachecache是什么牌子| 七月是什么生肖| 李维斯属于什么档次| 自信过头叫什么| 牙神经拔了对牙齿有什么影响| 去台湾需要什么证件| 很困但是睡不着是什么原因| 寄生虫是什么意思| 医院五行属什么| 知了吃什么东西| 11月27号什么星座| 结婚登记需要什么证件| 面线是什么| 单纯疱疹病毒是什么病| 子宫萎缩是什么原因| 什么是工科| 混圈是什么意思| 1993年什么命| 已知晓是什么意思| 象牙白适合什么肤色| 中午吃什么饭家常菜| 葡萄柚是什么| 女人吃什么排湿气最快| 为什么早上起来恶心想吐| 什么体质容易长肿瘤| 牙龈肿痛吃什么药效果好| 张嘴睡觉有什么危害| 蚊子咬了为什么会痒| 淋巴在什么部位| 米虫是什么意思| crh是什么意思| 皮下紫癜是什么引起的| 硫黄和硫磺有什么区别| 典史是什么官| 尿多是什么病| 吃什么会回奶| 为什么鱼和熊掌不可兼得| m是什么意思| 丝瓜络是什么| 误会是什么意思| 室上性心动过速是什么原因引起的| 女性憋不住尿是什么原因| 半夜饿了吃什么不长胖| 父母坟上长树意味什么| 煮牛骨头放什么调料| 什么蓝牙耳机好| focus什么意思| 胃肠感冒吃什么食物比较好| 旗人是什么意思| 圣罗兰为什么叫杨树林| 生肖龙和什么生肖相冲| 吃西瓜不能吃什么| 为什么会长肥胖纹| 什么食物胶原蛋白含量高| 糊精是什么| 欲哭无泪什么意思| 西红柿和番茄有什么区别| 透明质酸钠是什么东西| 心肌缺血吃什么| 九月十五是什么星座的| 总出虚汗什么原因怎么解决| 斤加一笔是什么字| 巴黎世家是什么| 艺字五行属什么| 苦涩是什么意思| 色彩斑斓是什么意思| 什么是光合作用| 肚子有水声是什么原因| 晚上吃什么水果好| 什么汤好喝又简单| 刚拔完智齿可以吃什么| 胰腺炎有什么症状| 独一无二是什么生肖| 减肥晚上吃什么| 考护士资格证需要什么条件| 叉烧是什么肉做的| 喉咙里痰多是什么原因| 关节发黑是什么原因| 甩货是什么意思| 佩戴貔貅有什么讲究与禁忌| 梦见下大雨是什么预兆| 高育良什么级别| 疱疹不能吃什么食物| 脂肪肝什么意思| 爱吃甜食是什么原因| 牟利什么意思| 十月初七是什么星座| 臭屁多是什么原因| 奥运会五环颜色分别代表什么| 木薯是什么| 脐橙什么意思| 5.19是什么星座| 2.7是什么星座| 黑色搭配什么颜色好看| 属猴是什么命| 1月7号是什么星座| 乳腺癌挂什么科| 什么叫肠易激综合征| 哏是什么意思| 滚床单什么意思| 爆单是什么意思| 吃什么药怀孕最快| 总头晕是什么原因| 脑萎缩是什么原因引起的| 吃什么补羊水| 膳食是什么| 吃什么消炎药可以喝酒| 支气管炎吃什么| 南京大屠杀是什么时候| 2月份生日是什么星座| 泥丸宫在什么位置| 2019属什么生肖| 喉咙干是什么病的前兆| 灵芝不能和什么一起吃| 百度

人民日报看贵州--贵州频道--人民网

百度 各级政府要强化污染减排,坚持绿色发展。

The Open Web Application Security Project maintains a regularly-updated list of the most pressing web application security concerns.

Learning Objectives

After reading this article you will be able to:

  • Define OWASP
  • Summarize each of the OWASP Top 10

Related Content


Want to keep learning?

Subscribe to theNET, Cloudflare's monthly recap of the Internet's most popular insights!

Refer to Cloudflare's Privacy Policy to learn how we collect and process your personal data.

Copy article link

What is OWASP?

The Open Web Application Security Project, or OWASP, is an international non-profit organization dedicated to web application security. One of OWASP’s core principles is that all of their materials be freely available and easily accessible on their website, making it possible for anyone to improve their own web application security. The materials they offer include documentation, tools, videos, and forums. Perhaps their best-known project is the OWASP Top 10.

Report
2025 Security Signals Report

What is the OWASP Top 10?

The OWASP Top 10 is a regularly updated report outlining security concerns for web application security, focusing on the 10 most critical risks. The report is put together by a team of security experts from all over the world. OWASP refers to the Top 10 as an ‘awareness document’ and they recommend that all companies incorporate the report into their processes in order to minimize and/or mitigate security risks.

WAF Protection
Defend against “Top 10” attack techniques

Below are the security risks reported in the OWASP Top 10 2021 report:

1. Broken Access Control

Access control refers a system that controls access to information or functionality. Broken access controls allow attackers to bypass authorization and perform tasks as though they were privileged users such as administrators. For example a web application could allow a user to change which account they are logged in as simply by changing part of a URL, without any other verification.

Access controls can be secured by ensuring that a web application uses authorization tokens* and sets tight controls on them.

*Many services issue authorization tokens when users log in. Every privileged request that a user makes will require that the authorization token be present. This is a secure way to ensure that the user is who they say they are, without having to constantly enter their login credentials.

2. Cryptographic Failures

If web applications do not protect sensitive data such as financial information and passwords using encryption, attackers can gain access to that data and sell or utilize it for nefarious purposes. They can also steal sensitive information by using an on-path attack.

The risk of data exposure can be minimized by encrypting all sensitive data, authenticating all transmissions, and disabling the caching* of any sensitive information. Additionally, web application developers should take care to ensure that they are not unnecessarily storing any sensitive data.

*Caching is the practice of temporarily storing data for re-use. For example, web browsers will often cache webpages so that if a user revisits those pages within a fixed time span, the browser does not have to fetch the pages from the web.

3. Injection

Injection attacks happen when untrusted data is sent to a code interpreter through a form input or some other data submission to a web application. For example, an attacker could enter SQL database code into a form that expects a plaintext username. If that form input is not properly secured, this would result in that SQL code being executed. This is known as an SQL injection attack.

The Injection category also includes cross-site scripting (XSS) attacks, previously their own category in the 2017 report. Mitigation strategies for cross-site scripting include escaping untrusted HTTP requests, as well as using modern web development frameworks like ReactJS and Ruby on Rails, which provide some built-in cross-site scripting protection.

In general, Injection attacks can be prevented by validating and/or sanitizing user-submitted data. (Validation means rejecting suspicious-looking data, while sanitization refers to cleaning up the suspicious-looking parts of the data.) In addition, a database admin can set controls to minimize the amount of information an injection attack can expose.

Learn more about how to prevent SQL injections.

4. Insecure Design

Insecure Design includes a range of weaknesses that can be emdedded in the architecture of an application. It focuses on the design of an application, not its implementation. OWASP lists the use of security questions (e.g. "What street did you grow up on?") for password recovery as one example of a workflow that is insecure by design. No matter how perfectly such a workflow is implemented by its developers, the application will still be vulnerable, because more than one person can know the answer to those security questions.

The use of threat modeling prior to an application's deployment can help mitigate these types of vulnerabilities.

5. Security Misconfiguration

Security misconfiguration is the most common vulnerability on the list, and is often the result of using default configurations or displaying excessively verbose errors. For instance, an application could show a user overly-descriptive errors which may reveal vulnerabilities in the application. This can be mitigated by removing any unused features in the code and ensuring that error messages are more general.

The Security Misconfiguration category includes the XML External Entities (XEE) attack — previously its own category in the 2017 report. This is an attack against a web application that parses XML* input. This input can reference an external entity, attempting to exploit a vulnerability in the parser. An ‘external entity’ in this context refers to a storage unit, such as a hard drive. An XML parser can be duped into sending data to an unauthorized external entity, which can pass sensitive data directly to an attacker. The best ways to prevent XEE attacks are to have web applications accept a less complex type of data, such as JSON, or at the very least to patch XML parsers and disable the use of external entities in an XML application.

*XML or Extensible Markup Language is a markup language intended to be both human-readable and machine-readable. Due to its complexity and security vulnerabilities, it is now being phased out of use in many web applications.

6. Vulnerable and Outdated Components

Many modern web developers use components such as libraries and frameworks in their web applications. These components are pieces of software that help developers avoid redundant work and provide needed functionality; common example include front-end frameworks like React and smaller libraries that used to add share icons or A/B testing. Some attackers look for vulnerabilities in these components which they can then use to orchestrate attacks. Some of the more popular components are used on hundreds of thousands of websites; an attacker finding a security hole in one of these components could leave hundreds of thousands of sites vulnerable to exploit.

Component developers often offer security patches and updates to plug up known vulnerabilities, but web application developers do not always have the patched or most-recent versions of components running on their applications. To minimize the risk of running components with known vulnerabilities, developers should remove unused components from their projects, as well as ensure that they are receiving components from a trusted source that are up to date.

7. Identification and Authentication Failures

Vulnerabilities in authentication (login) systems can give attackers access to user accounts and even the ability to compromise an entire system using an admin account. For example, an attacker can take a list containing thousands of known username/password combinations obtained during a data breach and use a script to try all those combinations on a login system to see if there are any that work.

Some strategies to mitigate authentication vulnerabilities are requiring two-factor authentication (2FA) as well as limiting or delaying repeated login attempts using rate limiting.

8. Software and Data Integrity Failures

Many applications today rely on third-party plugins and other external sources for their functionality, and they do not always make sure that updates and data from those sources have not been tampered with and originate from an expected location. For instance, an application that automatically accepts updates from an outside source could be vulnerable to an attacker uploading their own malicious updates, which would then be distributed to all installations of that application. This category also includes insecure deserialization exploits: these attacks are the result of deserializing data from untrusted sources, and they can result in serious consequences like DDoS attacks and remote code execution attacks.

To help ensure data and updates have not had their integrity violated, application developers should use digital signatures to verify updates, check their software supply chains, and ensure that continuous integration/continuous deployment (CI/CD) pipelines have strong access control and are configured correctly.

9. Security Logging and Monitoring Failures

Many web applications are not taking enough steps to detect data breaches. The average discovery time for a breach is around 200 days after it has happened. This gives attackers a lot of time to cause damage before there is any response. OWASP recommends that web developers should implement logging and monitoring as well as incident response plans to ensure that they are made aware of attacks on their applications.

10. Server-Side Request Forgery

Server-Side Request Forgery (SSRF) is an attack in which someone sends a URL request to a server that causes the server to fetch an unexpected resource, even if that resource is otherwise protected. An attacker might, for example, send a request for www.example.com/super-secret-data/, even though web users are not supposed to be able to navigate to that location, and get access to super secret data from the server's response.

There are a number of possible mitigations for SSRF attacks, and one of the most important is to validate all URLs coming from clients. Invalid URLs should not result in a direct, raw response from the server.

For a more technical and in-depth look at the OWASP Top 10, see the official report.

6月21号什么星座 fd是什么意思 回南天什么意思 肛门周围痒是什么病 1866年属什么生肖
空囊是什么意思 大学硕士点是什么意思 男人吃什么更持久 3a是什么 来例假不能吃什么
强颜欢笑是什么意思 点了斑不能吃什么 chocker是什么意思 至夏什么意思 田此读什么
lala是什么意思 太抽象了是什么意思 什么是oa 赤脚走路有什么好处 CNN什么意思
凤五行属性是什么hcv9jop4ns4r.cn 白细胞低是什么原因造成的hcv8jop1ns7r.cn 头发为什么会变黄bjhyzcsm.com 执念什么意思fenrenren.com 他克莫司是什么药hcv8jop8ns2r.cn
牙龈出血缺什么维生素hcv9jop6ns1r.cn 传导阻滞吃什么药hcv8jop7ns6r.cn 朱顶红什么时候开花hcv8jop4ns9r.cn 上尉军衔是什么级别jasonfriends.com 眼有眼屎是什么原因clwhiglsz.com
不动明王是什么属相的本命佛hcv9jop5ns2r.cn 白醋和小苏打一起用起什么效果hcv9jop7ns3r.cn 得瑟是什么意思hcv9jop5ns6r.cn 吃多了拉肚子是什么原因hcv8jop5ns9r.cn 西安有什么玩的clwhiglsz.com
什么花是白色的0735v.com 十一月二十八是什么星座hcv9jop2ns3r.cn 什么什么似火wzqsfys.com 什么是囊肿hcv9jop5ns4r.cn 皮肤黑穿什么颜色显白hcv9jop8ns3r.cn
百度