Skip to the content.

ЁЯМР OWASP Top 10 (Latest Web Security Risks)

ЁЯУМ What is OWASP Top 10?

OWASP Top 10 is a list of the most critical security risks found in web applications. It helps developers and security professionals focus on the most important vulnerabilities.

OWASP Top 10 рд╕рдмрд╕реЗ рдЦрддрд░рдирд╛рдХ web security risks рдХреА list рд╣реИ, рдЬреЛ applications рдореЗрдВ рдЖрдорддреМрд░ рдкрд░ рдкрд╛рдП рдЬрд╛рддреЗ рд╣реИрдВред

flowchart LR
A[User Input] --> B[Application]
B --> C[Database]
A -->|Malicious Input| C

ЁЯФЯ OWASP Top 10 (2021)

1. Broken Access Control

Applications fail to properly restrict what users can access.

A normal user changes the URL and gains access to admin data, which should not be allowed.

рд░рд╡рд┐ URL рдмрджрд▓рдХрд░ admin page рдЦреЛрд▓ рд▓реЗрддрд╛ рд╣реИ, рдЗрд╕рдХрд╛ рдорддрд▓рдм access control рд╕рд╣реА рд╕реЗ рд▓рд╛рдЧреВ рдирд╣реАрдВ рд╣реБрдЖред


2. Cryptographic Failures

Sensitive data is not properly protected using encryption.

If passwords or card details are stored in plain text, attackers can easily read them.

рдЕрдЧрд░ data рдмрд┐рдирд╛ encryption рдХреЗ store рдХрд┐рдпрд╛ рдЧрдпрд╛ рд╣реИ, рддреЛ attacker рдЖрд╕рд╛рдиреА рд╕реЗ рдЙрд╕реЗ рдкрдврд╝ рд╕рдХрддрд╛ рд╣реИред


3. Injection

Untrusted input is executed as a command or query.

An attacker enters malicious SQL code in a login form and extracts database data.

login form рдореЗрдВ code рдбрд╛рд▓рдХрд░ attacker database рд╕реЗ data рдирд┐рдХрд╛рд▓ рд╕рдХрддрд╛ рд╣реИред


4. Insecure Design

The application is not designed with security in mind.

Even if code is correct, poor design can still lead to vulnerabilities.

рдЕрдЧрд░ system рд╢реБрд░реВ рд╕реЗ secure design рдХреЗ рд╕рд╛рде рдирд╣реАрдВ рдмрдирд╛ рд╣реИ, рддреЛ рдмрд╛рдж рдореЗрдВ issues рдЖ рд╕рдХрддреЗ рд╣реИрдВред


5. Security Misconfiguration

Security settings are not properly configured.

Default passwords, open ports, or unnecessary services increase risk.

default settings change рдирд╣реАрдВ рдХрд┐рдП рдЧрдП, рдЬрд┐рд╕рд╕реЗ system vulnerable рд╣реЛ рдЧрдпрд╛ред


6. Vulnerable and Outdated Components

Using old software or libraries with known vulnerabilities.

Attackers exploit publicly known issues in outdated components.

рдкреБрд░рд╛рдирд╛ software use рдХрд░рдиреЗ рд╕реЗ known vulnerabilities рдХрд╛ рдЦрддрд░рд╛ рдмрдврд╝ рдЬрд╛рддрд╛ рд╣реИред


7. Identification and Authentication Failures

Weak authentication allows attackers to compromise accounts.

Using simple passwords makes it easy to gain unauthorized access.

рдХрдордЬреЛрд░ password рдХреА рд╡рдЬрд╣ рд╕реЗ account hack рд╣реЛ рд╕рдХрддрд╛ рд╣реИред


8. Software and Data Integrity Failures

Untrusted or tampered software updates can be executed.

If updates are not verified, attackers can inject malicious code.

рдЕрдЧрд░ update verify рдирд╣реАрдВ рдХрд┐рдпрд╛ рдЧрдпрд╛, рддреЛ malicious code install рд╣реЛ рд╕рдХрддрд╛ рд╣реИред


9. Security Logging and Monitoring Failures

Lack of proper logging delays detection of attacks.

If attacks are not logged, organizations cannot respond in time.

рдЕрдЧрд░ logs maintain рдирд╣реАрдВ рдХрд┐рдП рдЧрдП, рддреЛ attack рдХрд╛ рдкрддрд╛ рджреЗрд░ рд╕реЗ рдЪрд▓рддрд╛ рд╣реИред


10. Server-Side Request Forgery (SSRF)

The server makes requests to unintended locations.

An attacker tricks the server into accessing internal systems.

attacker server рдХреЛ trick рдХрд░рдХреЗ internal resources access рдХрд░ рд╕рдХрддрд╛ рд╣реИред


тЪая╕П Why It Matters

Most real-world cyberattacks happen because of these common issues.


ЁЯОп Interview Tip

Focus on understanding 3 to 5 risks deeply instead of memorizing all.


ЁЯЪА Key Takeaways