- Object level authorization – OWASP – A1
- Brocken authentication – OWASP – A2
- Excessive data exposure – OWASP – A3
- Lack of resources and rate limiting – OWASP – A4
- Brocken functional level authorization – OWASP – A5
- Mass assignment- OWASP – A6
- Security misconfiguration – OWASP – A7
- Injection OWASP – A8
- Improper asset management – OWASP – A9
- Insufficient Logging & Monitoring OWASP – A10
- Home
- About Us
- Authors
- Contact Us
- Submit News
- Register
- Sitemap