The OWASP top 10 describes the top 10 vulnerabilities as they were found in production environments for a particular year. While this is a good approach, it fails to take the impact of an issue into account. Broken Access Control (Including IDORs) can exist on any resource that the attacker should not be authorised to see.
Table of contents
1. Broken Access Control (Including IDORs)2. Cryptographic failures3. Injection4. Insecure design5. Security misconfiguration7. Identification and Authentication Failures8. Software and Data Integrity Failures9. Security Logging and Monitoring Failures10. Server-side request forgery (SSRF)1 Comment
Sort: