About 761 results
Open links in new tab
  1. OWASP Top Ten - OWASP Foundation

    The OWASP Top 10 is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web …

  2. Vulnerabilities - OWASP Foundation

    A vulnerability is a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an …

  3. OWASP Top 10:2021 - OWASP Foundation

    A01:2021-Broken Access Control moves up from the fifth position to the category with the most serious web application security risk; the contributed data indicates that on average, 3.81% of …

  4. OWASP Foundation, the Open Source Foundation for Application …

    May 12, 2025 · Nettacker – A fast, automated network scanner built for vulnerability detection. Offensive Web Testing Framework (OWTF) – A smart framework for streamlined penetration …

  5. Index Top 10 - OWASP Cheat Sheet Series

    The OWASP Top Ten is a standard awareness document for developers and web application security. It represents a broad consensus about the most critical security risks to web …

  6. Cross Site Scripting (XSS) - OWASP Foundation

    XSS flaws can be difficult to identify and remove from a web application. The best way to find flaws is to perform a security review of the code and search for all places where input from an …

  7. OWASP Vulnerable Web Applications Directory

    The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable web applications currently available for legal …

  8. OWASP Web Security Testing Guide

    The Web Security Testing Guide (WSTG) Project produces the premier cybersecurity testing resource for web application developers and security professionals. The WSTG is a …

  9. Vulnerability Scanning Tools | OWASP Foundation

    Web Application Vulnerability Scanners are automated tools that scan web applications, normally from the outside, to look for security vulnerabilities such as Cross-site scripting, SQL Injection, …

  10. Free for Open Source Application Security Tools

    If your project has a web application component, we recommend running automated scans against it to look for vulnerabilities. OWASP maintains a page of known DAST Tools , and the …