Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
314 commits
Select commit Hold shift + click to select a range
da801b2
Merge pull request #794 from OWASP/add_OSIB
sslHello Nov 22, 2024
c87841a
Add German Version of Top 10:2021 from Repository https://github.com/…
sslHello Nov 23, 2024
7e548c0
Add German Version of Top 10:2021: Update mkdocs.yml to activate the …
sslHello Nov 23, 2024
85362e6
Merge pull request #796 from OWASP/Add_German_Version_of_Top10_2021
sslHello Nov 23, 2024
5abed2b
Rename to 2025
vanderaj Jul 11, 2025
27d983d
Update A00-about-owasp.md (#809)
armanmulani Jul 12, 2025
db896b4
Añadiendo traducción al español de OWASP Top 10 2021 (#804)
palozano07 Jul 12, 2025
e71674a
Comparison of 2003-2021 Releases (#674)
cmlh Jul 12, 2025
d3b1ab5
Update A02_2021-Cryptographic_Failures.md (#658)
raphaelhagi Jul 12, 2025
cc66a2d
Update A09_2021-Security_Logging_and_Monitoring_Failures.md (#703)
fcerullo-cycubix Jul 12, 2025
31bbe5c
Fix #474 - Remove SQL LIMIT Command (#721)
cmlh Jul 12, 2025
5571465
fix conflict A03_2021-Injection.id.md (#756)
adeyosemanputra Jul 12, 2025
ba71ab9
fix conflict A04_2021-Insecure_Design.id.md (#757)
adeyosemanputra Jul 12, 2025
7ad9558
Update A05_2021-Security_Misconfiguration.pt_BR.md (#766)
clbcabral Jul 12, 2025
2ae20a8
fix 2021/docs/A03_2021-Injection.pt_BR.md (#768)
bruno-br Jul 12, 2025
59cd65f
fixed twitter.com (#769)
owasp-maribor Jul 12, 2025
7b16ef2
Fixed for twitter.com domain (#770)
owasp-maribor Jul 12, 2025
d2e9d79
Update link in A06_2021-Vulnerable_and_Outdated_Components.md (#776)
envico801 Jul 12, 2025
58ff190
Fixes the Brazilian Portuguese version of A03:2021 (#777)
tacsio Jul 12, 2025
a92cfa8
Fix percentage typo in A05_2021-Security_Misconfiguration.md (#781)
sbrown17 Jul 12, 2025
32044cd
Removed typo in italian home (#785)
ricsirigu Jul 12, 2025
26a651c
Better italianization (#786)
ricsirigu Jul 12, 2025
fe28569
Update A02_2021-Cryptographic_Failures.md (#799)
stevebanik Jul 12, 2025
e712089
Update A11_2021-Next_Steps.md (#652)
wenz Jul 12, 2025
6743075
First version of OWASP Top 10
vanderaj Jul 12, 2025
5003faf
2004 Top 10
vanderaj Jul 12, 2025
697efb4
OWASP Top 10 2007
vanderaj Jul 12, 2025
e59d8e7
OWASP Top 10 2010
vanderaj Jul 12, 2025
a2f48e8
More 2004 translations
vanderaj Jul 12, 2025
c677be2
First attempt at improving the i18n structure of OWASP Top 10 2021
vanderaj Jul 12, 2025
fe0ee3a
First attempt at fixing i18n to folders
vanderaj Jul 12, 2025
77539ec
Fix TBA and wiki links
vanderaj Jul 12, 2025
b030262
Fix missing decimal place
vanderaj Jul 12, 2025
3bf84c0
Change forces to force
vanderaj Jul 12, 2025
b98fb9b
Fix issue with factors in the Italian translation
vanderaj Jul 12, 2025
45b1d87
Fix frontispiece in multiple languages, update (C) notice, and our name
vanderaj Jul 12, 2025
40dfe5f
Fix TBA link
vanderaj Jul 12, 2025
8680e1e
Fix i18n build with correct locales
vanderaj Jul 12, 2025
e43b7a7
Make i18n use the material theme
vanderaj Jul 12, 2025
f75f312
Add additional info if you get stuck with pip
vanderaj Jul 12, 2025
81f1683
Update pip documentation
vanderaj Jul 12, 2025
60a950a
Update README.md
infosecdad Jul 12, 2025
90859c5
fix: update top 10 proactive controls broken link (#810)
nhumblot Jul 15, 2025
df86b4d
Fix: add space in Markdown heading for proper rendering (#814)
Lyada-Haindav Oct 17, 2025
310ec69
translate(2021): Add new language Turkish-tr (#813)
richsanchez012 Oct 17, 2025
4ebdcf7
fix: translate additional security measures for SSRF into Japanese (#…
hand-dot Oct 17, 2025
f3875e3
Add German translation, reorder the translations menu
vanderaj Oct 17, 2025
0de99ff
Created 2025 skeleton
Neil-Smithline Oct 28, 2025
83c5ebc
Fix top-level Makefile
Neil-Smithline Oct 28, 2025
86477aa
Update build instructions
Neil-Smithline Oct 28, 2025
b250917
First cut at content
Neil-Smithline Oct 30, 2025
25ffe97
add `port` variable to makefile
Neil-Smithline Oct 30, 2025
f7997f2
Started adding images
Neil-Smithline Oct 30, 2025
70cf964
typo fix
Neil-Smithline Oct 30, 2025
6847aeb
moved files to 2025 dir
Neil-Smithline Oct 31, 2025
ad34b33
Neatened up formatting
Neil-Smithline Oct 31, 2025
741941e
Fixed A10 name
Neil-Smithline Oct 31, 2025
7960b91
fixed broken A10 link
Neil-Smithline Nov 1, 2025
ea60ad2
cleanup broken links
Neil-Smithline Nov 1, 2025
87c5d1e
Added 2 introductory sentences
sslHello Nov 1, 2025
736e28a
Merge pull request #1 from 0x02_2025-What_are_Application_Security_Risks
sslHello Nov 1, 2025
c8cd480
Update OWASP About page for clarity and tone
shehackspurple Nov 1, 2025
e949629
Refine language and clarity in security misconfiguration doc
shehackspurple Nov 1, 2025
b3e7301
Added software supply chain failures definition.
shehackspurple Nov 1, 2025
a6d9800
Added security misconfiguration definition at top
shehackspurple Nov 1, 2025
dc9ad6a
Clarify software supply chain failure vulnerabilities
shehackspurple Nov 1, 2025
21ba80e
Added injection vulnerability description to the top
shehackspurple Nov 1, 2025
4148255
Editorial review of A01_2021-Broken_Access_Control.md
sslHello Nov 2, 2025
558231f
Merge pull request #2 from Neil-Smithline/A01_2025-Broken_Access_Control
sslHello Nov 2, 2025
4adcce2
mkdocs.yml: Deactivate the unused German Language
sslHello Nov 2, 2025
52998a6
Merge pull request #3 from mkdocs.yml
sslHello Nov 2, 2025
4101ffb
Editorial review of A04_2025-Cryptographic_Failures.md
sslHello Nov 2, 2025
0fbc00b
Update Next Steps
Neil-Smithline Nov 2, 2025
1ee0c75
Merge pull request #4 from A04_2025-Cryptographic_Failures
sslHello Nov 2, 2025
a06decf
First attempt at publish
Neil-Smithline Nov 2, 2025
3ecf11c
Merge remote-tracking branch 'refs/remotes/origin/master'
Neil-Smithline Nov 2, 2025
78c102e
Editorial review of A06_2025-Insecure_Design.md
sslHello Nov 2, 2025
1056ea0
Merge pull request #5 from A06_2025-Insecure_Design
sslHello Nov 2, 2025
aafd4ee
Cleaned up X01
Neil-Smithline Nov 2, 2025
f8e922e
Merge branch 'master' of github.com:Neil-Smithline/2025-Top10-SECRET
Neil-Smithline Nov 2, 2025
0aef340
Fix naming mistake
Neil-Smithline Nov 2, 2025
2c9afb2
Editorial review of A09_2025-Logging_and_Alerting_Failures.md
sslHello Nov 2, 2025
2f500a2
Merge pull request #6 from A09_2025-Logging_and_Alerting_Failures
sslHello Nov 2, 2025
ec4c222
Cleanup of X02
Neil-Smithline Nov 2, 2025
bb88db6
Merge branch 'master' of github.com:Neil-Smithline/2025-Top10-SECRET
Neil-Smithline Nov 2, 2025
4a28687
linkified references
Neil-Smithline Nov 2, 2025
4204a0a
Editorial review of 0x03_2025-Establishing_a_Modern_Application_Secur…
sslHello Nov 2, 2025
30b4d22
Merge pull request #7 from 0x03_2025-Establishing_a_Modern_Applicatio…
sslHello Nov 2, 2025
ed44bce
Editorial review of A09_2025-Logging_and_Alerting_Failures.md
sslHello Nov 2, 2025
cd1874d
Merge pull request #8 from A09_2025-Logging_and_Alerting_Failures
sslHello Nov 2, 2025
ac17541
repair all icons and review all top level headlines (A01 .. A10)
sslHello Nov 2, 2025
7f01d00
Merge pull request #9 from repair_all_icons
sslHello Nov 2, 2025
20fc773
Update references
Neil-Smithline Nov 3, 2025
15b1d71
Updated contact info
Neil-Smithline Nov 3, 2025
78887e1
Review and clieanup
Neil-Smithline Nov 3, 2025
9066cc2
Add DRAFT watermark
Neil-Smithline Nov 3, 2025
9f31179
A10: Update and add OWASP References
sslHello Nov 3, 2025
509c680
Merge pull request #12 from A10_2025-Mishandling_of_Exceptional_Condi…
sslHello Nov 3, 2025
1bf54f5
[index.md] Added internal and external Links to Top10:2025 and 2021
sslHello Nov 3, 2025
117d02f
Merge pull request #13 from branch 'index'
sslHello Nov 3, 2025
9eb414c
[X01_2025-Next_Steps] Repaired side-internal links (to anchors)
sslHello Nov 3, 2025
5320d72
Merge pull request #14 from X01_2025-Next_Steps
sslHello Nov 3, 2025
def3c69
[X01_2025-Next_Steps] Added links to all OWASP community pages; Edito…
sslHello Nov 3, 2025
60b4de5
Merge pull request #15 from X01_2025-Next_Steps
sslHello Nov 3, 2025
c013ebf
Linkification
Neil-Smithline Nov 4, 2025
053a9d8
Cleanup
Neil-Smithline Nov 4, 2025
2444a2b
Linkification
Neil-Smithline Nov 4, 2025
0f937d5
fix typo
Neil-Smithline Nov 5, 2025
b630da4
Repo name fix
Neil-Smithline Nov 5, 2025
178b2ae
Updated the mappings image and the risks section.
infosecdad Nov 5, 2025
b5879f2
Merge 2021 and 2025 - 1st attempt
Neil-Smithline Nov 5, 2025
8b90e79
Merge 2021 & 2025 - first attempt
Neil-Smithline Nov 5, 2025
1d71853
Merge branch 'master' of github.com:Neil-Smithline/2025-Top10-SECRET
Neil-Smithline Nov 5, 2025
2fd18da
Added Link to Regerence 'OWASP Cheat Sheet: Software Supply Chain Sec…
sslHello Nov 5, 2025
312c7aa
Merge pull request #16 from A08_2025-Software_or_Data_Integrity_Failures
sslHello Nov 5, 2025
cdca315
Cleanup from 2021 & 2025 merge
Neil-Smithline Nov 5, 2025
757f49c
Cleanup from 2021 & 2025 merge
Neil-Smithline Nov 5, 2025
11e63c7
Merge branch 'master' of github.com:Neil-Smithline/2025-Top10-SECRET
Neil-Smithline Nov 5, 2025
a464f38
Fixed internal links and includes of assets
sslHello Nov 5, 2025
2418ddc
Merge pull request #17 from 0x00_2025-Introduction
sslHello Nov 5, 2025
470463d
First fix for i18n plugin and new files structure
sslHello Nov 5, 2025
7fd4685
Merge pull request #18 fromi18n-fix (2021)
sslHello Nov 5, 2025
ee1d478
2nd fix for i18n plugin and new files structure
sslHello Nov 6, 2025
ae7f679
Merge pull request #19 from i18n-fix
sslHello Nov 6, 2025
044c943
Wording tweak on intro page
Neil-Smithline Nov 7, 2025
accbecb
Fix typo in CryptoNet Labs name
infosecdad Nov 7, 2025
311e277
Update to address Issue #841
infosecdad Nov 16, 2025
6e0cc1c
PDF versions of the OWASP DC presentations
infosecdad Nov 17, 2025
1a188e9
docs: correct category code for Supply Chain Failures (A02->A03)
MohammedAnasNathani Nov 25, 2025
9270449
Add SPDX (ISO/IEC 5962:2021) reference to A03:2025
Nov 26, 2025
08e9db5
Merge pull request #858 from adam-dev2/add-spdx-reference
Neil-Smithline Dec 5, 2025
094ed93
Update 0x00_2025-Introduction.md
shehackspurple Dec 5, 2025
fae6c31
Update CWE count in Cryptographic Failures document
shehackspurple Dec 5, 2025
34d8bf4
Fix link formatting in security misconfiguration doc
shehackspurple Dec 5, 2025
d77d19e
Update link for A02:2025-Security Misconfiguration
shehackspurple Dec 5, 2025
e71e90d
Fix link in Software Supply Chain Failures document
shehackspurple Dec 5, 2025
1fe4bd4
Update reference to Cryptographic Failures in doc
shehackspurple Dec 5, 2025
732d3d0
Fix #856 by adding a subtitel
sslHello Dec 5, 2025
10395fb
Merge pull request #860 from OWASP/sslHello-patch-856
sslHello Dec 5, 2025
a93c977
Update A10_2025-Mishandling_of_Exceptional_Conditions.md
shehackspurple Dec 5, 2025
e80ffb0
Add real world example of Snowflake data breach
shehackspurple Dec 5, 2025
88259f1
Add Shai Hulud supply chain attack reference
shehackspurple Dec 5, 2025
341b152
Correct CWE-447 to CWE-477 in documentation
shehackspurple Dec 5, 2025
b101a82
Fix typo in injection detection explanation
shehackspurple Dec 5, 2025
b8ca271
Fix #820 A03:2025 - Does "out of date" really mean anything in software?
sslHello Dec 6, 2025
87322e3
Merge pull request #861 from OWASP/sslHello-patch-820
sslHello Dec 6, 2025
160f841
Reorganize 2021 and 2025 versions with backward-compatible redirects
Neil-Smithline Dec 7, 2025
09176ca
Fix broken link
Neil-Smithline Dec 7, 2025
572ba34
Emphasize the role of awareness and mindset for secure design
ChristophNiehoff Dec 9, 2025
3a839fc
Emphasize the role of design in access control
ChristophNiehoff Dec 9, 2025
7146143
Authentication failures: Respect intended use of credentials
ChristophNiehoff Dec 9, 2025
3d07d01
Fixed formatting in A03
stefan-wenig Dec 10, 2025
8a3d418
Fix typo in A03 'providence' to 'provenance'
stefan-wenig Dec 10, 2025
b304a07
Update README for 2025 presentations
dant24 Dec 11, 2025
2a2effd
Fix #847: Rename A09 to 'Security Logging & Alerting Failures'
sslHello Dec 13, 2025
06fc72e
Merge pull request #868 from OWASP/A09_Security_Logging_and_Alerting_…
sslHello Dec 13, 2025
ac54335
Fixed 'make publish'
sslHello Dec 13, 2025
3b7d10b
Merge pull request #869 from OWASP/make_publish
sslHello Dec 13, 2025
0d0495b
Merge pull request #867 from dant24/patch-1
sslHello Dec 13, 2025
2eea7b8
Merge pull request #866 from stefan-wenig/patch-1
sslHello Dec 13, 2025
257d957
Update X01_2025-Next_Steps.md: Editorial Change
sslHello Dec 19, 2025
1e61fef
Merge pull request #871 from OWASP/sslHello-patch-X01_2025-Next_Steps
sslHello Dec 19, 2025
7dea0a9
Fixes Indent Mapped CWEs in 2025-next-steps #846
sslHello Dec 19, 2025
301453a
Merge pull request #872 from OWASP/sslHello-patch-846
sslHello Dec 19, 2025
6391b14
Fix formatting and clarify scenarios in documentation #837
sslHello Dec 20, 2025
481cf6d
Merge pull request #873 from OWASP/sslHello-patch-837
sslHello Dec 20, 2025
c7f7bc8
Add missing punctuation to A03_2025-Software_Supply_Chain_Failures.md…
sslHello Dec 20, 2025
5b5c382
Merge pull request #874 from OWASP/sslHello-patch-834
sslHello Dec 20, 2025
06af884
Fix typo in A02:2025 Security Misconfiguration section #833
sslHello Dec 20, 2025
1613a78
Merge pull request #875 from OWASP/sslHello-patch-833
sslHello Dec 20, 2025
74c3f79
Update Links to References in A02_2025-Security_Misconfiguration.md
sslHello Dec 20, 2025
442ca91
Merge pull request #864 from ChristophNiehoff/broken_access_control_l…
sslHello Dec 20, 2025
7919189
Merge pull request #863 from ChristophNiehoff/insecure_design_mindset
sslHello Dec 20, 2025
0913e61
Merge pull request #865 from ChristophNiehoff/authentication_failures…
sslHello Dec 20, 2025
ba81f44
Fix: make rc watermark mobile responsive for 2025
ritorhymes Dec 20, 2025
e9e0f73
Add X03:2025 Inappropriate Trust in AI Generated Code ('Vibe Coding')
sslHello Dec 24, 2025
2e06d02
Merge pull request #882 from OWASP/X03_Vibe_Coding
sslHello Dec 24, 2025
7608b7f
Merge pull request #878 from ritovision/fix-rc-css
Neil-Smithline Dec 24, 2025
47cd60c
Merge Makefile
Neil-Smithline Dec 13, 2025
286f699
ignore merge directory
Neil-Smithline Dec 24, 2025
23a2023
Add SPDX (ISO/IEC 5962:2021) reference to A03:2025
Nov 26, 2025
0cac484
Update CWE count in Cryptographic Failures document
shehackspurple Dec 5, 2025
a55a15e
Fix link formatting in security misconfiguration doc
shehackspurple Dec 5, 2025
f1e9d3f
Update link for A02:2025-Security Misconfiguration
shehackspurple Dec 5, 2025
3b11c5c
Fix link in Software Supply Chain Failures document
shehackspurple Dec 5, 2025
b1eecd1
Update reference to Cryptographic Failures in doc
shehackspurple Dec 5, 2025
2f5c141
Fix #856 by adding a subtitel
sslHello Dec 5, 2025
45adaf0
Update A10_2025-Mishandling_of_Exceptional_Conditions.md
shehackspurple Dec 5, 2025
a7f581f
Add real world example of Snowflake data breach
shehackspurple Dec 5, 2025
8b2298b
Add Shai Hulud supply chain attack reference
shehackspurple Dec 5, 2025
c8245d5
Correct CWE-447 to CWE-477 in documentation
shehackspurple Dec 5, 2025
7a40421
Fix typo in injection detection explanation
shehackspurple Dec 5, 2025
9261fea
Fix #820 A03:2025 - Does "out of date" really mean anything in software?
sslHello Dec 6, 2025
af4703c
Reorganize 2021 and 2025 versions with backward-compatible redirects
Neil-Smithline Dec 7, 2025
67d2f3e
Fix broken link
Neil-Smithline Dec 7, 2025
f999bc2
Fix #847: Rename A09 to 'Security Logging & Alerting Failures'
sslHello Dec 13, 2025
902d33c
Fixed 'make publish'
sslHello Dec 13, 2025
fa87079
Update README for 2025 presentations
dant24 Dec 11, 2025
cfc6ef9
Fixed formatting in A03
stefan-wenig Dec 10, 2025
d70f1a6
Fix typo in A03 'providence' to 'provenance'
stefan-wenig Dec 10, 2025
aaee9b0
Update X01_2025-Next_Steps.md: Editorial Change
sslHello Dec 19, 2025
099b890
Fixes Indent Mapped CWEs in 2025-next-steps #846
sslHello Dec 19, 2025
5a4898b
Fix formatting and clarify scenarios in documentation #837
sslHello Dec 20, 2025
e671878
Add missing punctuation to A03_2025-Software_Supply_Chain_Failures.md…
sslHello Dec 20, 2025
a36084c
Fix typo in A02:2025 Security Misconfiguration section #833
sslHello Dec 20, 2025
18c4aef
Emphasize the role of design in access control
ChristophNiehoff Dec 9, 2025
f430c56
Emphasize the role of awareness and mindset for secure design
ChristophNiehoff Dec 9, 2025
3de6f6c
Authentication failures: Respect intended use of credentials
ChristophNiehoff Dec 9, 2025
688c52b
Add X03:2025 Inappropriate Trust in AI Generated Code ('Vibe Coding')
sslHello Dec 24, 2025
6654db7
Fix: make rc watermark mobile responsive for 2025
ritorhymes Dec 20, 2025
221be7c
Merge Makefile
Neil-Smithline Dec 13, 2025
de5caf2
ignore merge directory
Neil-Smithline Dec 24, 2025
07dac34
Merge branch 'MohammedAnasNathani-master'
Neil-Smithline Dec 24, 2025
7dfca92
A03 feedback: improve wording, add OSV, update examples
Dec 24, 2025
8604896
A03: Broaden untrusted components vulnerability criteria
gavjl Dec 24, 2025
7886875
A03: Add OWASP Dependency Track to inventory tools
Dec 24, 2025
2616377
A01: Improve clarity and streamline content
gavjl Dec 24, 2025
22a44ed
A05: Improve injection definition and fix typo
gavjl Dec 24, 2025
f8508ce
A04: Update crypto guidance for PQC and modern standards
drwetter Dec 24, 2025
1a295e4
Merge pull request #886 from OWASP/pr-818-rebased
Neil-Smithline Dec 24, 2025
77d694d
Fix A08_2025 Example attack scenarios numbering inconsistency
Neil-Smithline Dec 24, 2025
8e6eacd
Add announcement for OWASP Top 10 2025
Neil-Smithline Dec 24, 2025
6565ca1
Fix Probely supporter typo
Neil-Smithline Dec 24, 2025
253a06c
Add blank lines for list formatting in A03, add credential guidance t…
Neil-Smithline Dec 24, 2025
fd0016a
Fix minor wording issues in A07 Authentication Failures
Neil-Smithline Dec 24, 2025
fb9bb6a
Fix A10 background formatting
Neil-Smithline Dec 24, 2025
8536304
Fix typos in A08: integety -> integrity, OneAnother -> Another
Neil-Smithline Dec 24, 2025
5b6069f
Update mapping image for 09 change
infosecdad Dec 24, 2025
a6f0594
Fix A05 Injection example scenarios for technical accuracy
Neil-Smithline Dec 24, 2025
d705984
Update CVE statistics and add CWE-1357 reference
infosecdad Dec 24, 2025
08ed785
Add staged rollout guidance for supply chain defense in A03
Neil-Smithline Dec 24, 2025
b13866f
Add steps for updating www-project-top-ten and redirects
Neil-Smithline Dec 24, 2025
29134c8
Merge pull request #876 from OWASP/sslHello-patch-A02-Links
Neil-Smithline Dec 24, 2025
08494c5
Fix typos and broken CWE links in 2025 docs
Neil-Smithline Dec 24, 2025
cbb7ae9
Update root redirect to point to 2025 version
Neil-Smithline Dec 24, 2025
f7439d4
Remove Release Candidate CSS from 2025 site
Neil-Smithline Dec 24, 2025
da67237
updated for 2025
Neil-Smithline Dec 24, 2025
d4d000e
Remove RC notice
Neil-Smithline Dec 24, 2025
ba953be
Removed RC from ttitle
Neil-Smithline Dec 24, 2025
cd2d585
Removed RC
Neil-Smithline Dec 24, 2025
5e9a5a6
Added A10 icon
Neil-Smithline Dec 25, 2025
c27990d
Update 0x02_2025-What_are_Application_Security_Risks.md
sslHello Jan 6, 2026
d51e5a8
fix 'Typos in the 2025 version #898': Update 0x03_2025-Establishing_a…
sslHello Jan 6, 2026
6b922a0
Fix 'Typos in the 2025 version #898': Update 0x03_2025-Establishing_a…
sslHello Jan 6, 2026
656821e
fix 'Typos in the 2025 version #898': Update X01_2025-Next_Steps.md
sslHello Jan 6, 2026
494be56
fix 'Typos in the 2025 version #898': Update A10_2025-Mishandling_of_…
sslHello Jan 6, 2026
3de5142
Update README: update states, links to top10 and leaders list
sslHello Mar 9, 2026
5b475c1
Merge pull request #938 from OWASP/sslHello-patch-README
sslHello Mar 9, 2026
57db8ec
Update A06_2025-Insecure_Design.md [Typos in the 2025 version #898]
sslHello Apr 6, 2026
d9dc5eb
Merge pull request #945 from OWASP/sslHello-patch-898
sslHello Apr 6, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
The table of contents is too big for display.
Diff view
Diff view
  •  
  •  
  •  
23 changes: 20 additions & 3 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -71,10 +71,27 @@ $RECYCLE.BIN/
# IDE folders
.idea/

# Python Cache files
__pycache__/
*.py[cod]

# Python virtual environments
venv/
.env
.env.*

generated/
bin/
lib/

# mkdocs site (this is built using mkdocs gh-deploy
2021/site/
2021/site/0x00-notice/index.html
*/site/

# mkdocs build output (contains nested git repo for gh-pages deployment)
build/

# Pipenv
Pipfile
2021/site/0x00-notice/index.html

# osib library
osib
3 changes: 3 additions & 0 deletions .vscode/settings.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
{
"makefile.configureOnOpen": false
}
Binary file added 2004/OWASP_Top_Ten_2004.doc
Binary file not shown.
Binary file added 2004/OWASP_Top_Ten_2004.docx
Binary file not shown.
Binary file added 2004/OWASP_Top_Ten_2004.odt
Binary file not shown.
File renamed without changes.
Binary file added 2004/OWASP_Top_Ten_2004_Chinese.pdf
Binary file not shown.
Binary file added 2004/OWASP_Top_Ten_2004_French.doc
Binary file not shown.
Binary file added 2004/OWASP_Top_Ten_2004_French.pdf
Binary file not shown.
Binary file added 2004/OWASP_Top_Ten_2004_Japanese.doc
Binary file not shown.
Binary file added 2004/OWASP_Top_Ten_2004_Japanese.pdf
Binary file not shown.
Binary file added 2004/OWASP_Top_Ten_2004_Korean.doc
Binary file not shown.
Binary file added 2004/OWASP_Top_Ten_2004_Spanish.pdf
Binary file not shown.
Binary file added 2007/OWASP Top 10 2007.doc
Binary file not shown.
Binary file added 2007/OWASP Top 10 2007.docx
Binary file not shown.
Binary file added 2007/OWASP Top 10 2007.pdf
Binary file not shown.
Binary file added 2007/OWASP_Top_10_2007_Korean.doc
Binary file not shown.
Binary file added 2007/OWASP_Top_10_2007_Korean.pdf
Binary file not shown.
Binary file added 2007/Presentations/OWASP Intro and Top 10.ppt
Binary file not shown.
Binary file added 2007/Presentations/OWASP Intro and Top 10.pptx
Binary file not shown.
Binary file added 2007/data/2006 issues.xls
Binary file not shown.
Binary file added 2007/data/2006 issues.xlsx
Binary file not shown.
Binary file added 2007/data/OWASP Top Ten Survey.doc
Binary file not shown.
1 change: 1 addition & 0 deletions 2007/data/vtrend-ALL.html

Large diffs are not rendered by default.

Binary file added 2007/drafts/OWASP Top 10 2007 RC1.doc
Binary file not shown.
Binary file added 2007/drafts/OWASP Top 10 2007 RC2.doc
Binary file not shown.
Binary file added 2007/drafts/OWASP Top 10 2007 dw.doc
Binary file not shown.
Binary file added 2007/drafts/OWASP Top 10 2007.doc
Binary file not shown.
Binary file not shown.
Binary file added 2007/drafts/OWASP Top 10 RC2.pdf
Binary file not shown.
Binary file added 2007/drafts/OWASP Top 10 RC3 post dw.docx
Binary file not shown.
Binary file added 2007/drafts/OWASP Top 10 RC3.docx
Binary file not shown.
Binary file added 2007/drafts/OWASP Top 10 post dw sc.docx
Binary file not shown.
Binary file added 2007/drafts/OWASP Top 10.docx
Binary file not shown.
Binary file added 2007/drafts/OWASP_Top_10_2007_RC2 dw.doc
Binary file not shown.
Binary file added 2007/drafts/OWASP_Top_10_2007_RC2-christey.doc
Binary file not shown.
Binary file added 2007/drafts/owasp-top10-rc1-christey.doc
Binary file not shown.
Binary file added 2010/OWASP Top 10 - 2010 English.pdf
Binary file not shown.
Binary file added 2010/OWASP Top 10 - 2010 French.pdf
Binary file not shown.
Binary file added 2010/OWASP Top 10 - 2010 Indonesian.pdf
Binary file not shown.
Binary file added 2010/OWASP Top 10 - 2010 Japanese-A4.pdf
Binary file not shown.
Binary file added 2010/OWASP Top 10 - 2010 Korean.pdf
Binary file not shown.
Binary file added 2010/OWASP Top 10 - 2010 Spanish.pdf
Binary file not shown.
Binary file added 2010/OWASP Top 10 2010 Chinese.pdf
Binary file not shown.
Binary file added 2010/OWASP Top 10 2010 German.pdf
Binary file not shown.
Binary file added 2010/OWASP Top 10 2010 Hebrew.pdf
Binary file not shown.
Binary file added 2010/OWASP Top 10 2010 Italian.pdf
Binary file not shown.
Binary file added 2010/OWASP Top 10 2010 Spanish.pdf
Binary file not shown.
Binary file added 2010/OWASP Top 10 2010 Spanish.pptx
Binary file not shown.
Binary file added 2010/OWASPTop 10 2010 Vietnamese.pdf
Binary file not shown.
Binary file added 2010/drafts/OWASP_T10_-_2010_rc1.pdf
Binary file not shown.
Binary file not shown.
Binary file not shown.
220 changes: 110 additions & 110 deletions 2017/OWASP-Top-10-2017-en.html

Large diffs are not rendered by default.

218 changes: 109 additions & 109 deletions 2017/OWASP-Top-10-2017-fr.html

Large diffs are not rendered by default.

214 changes: 107 additions & 107 deletions 2017/OWASP-Top-10-2017-pt-br.html

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion 2017/de/readme.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
# OWASP Top 10 2017 de

This folder contains the German version of the OWASP Top 10 - 2017.<br>
The official website is here: https://www.owasp.org/index.php/Germany/Projekte/Top_10
The official website is here: https://wiki.owasp.org/index.php/Germany/Projekte/Top_10

* [OWASP Top 10 2017 German Version (PPTX)](https://github.com/OWASP/Top10/blob/master/2017/de/OWASP%20Top%2010-2017_de_V1.0.pptx)
* [OWASP Top 10 2017 German Version (PDF)](https://github.com/OWASP/Top10/blob/master/2017/de/OWASP%20Top%2010-2017_de_V1.0.pdf)
Expand Down
6 changes: 3 additions & 3 deletions 2017/en/0x01-about-owasp.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,11 +9,11 @@ At OWASP, you'll find free and open:
* Application security tools and standards.
* Complete books on application security testing, secure code development, and secure code review.
* Presentations and [videos](https://www.youtube.com/user/OWASPGLOBAL).
* [Cheat sheets](https://www.owasp.org/index.php/OWASP_Cheat_Sheet_Series) on many common topics.
* [Cheat sheets](https://wiki.owasp.org/index.php/OWASP_Cheat_Sheet_Series) on many common topics.
* Standard security controls and libraries.
* [Local chapters worldwide](https://www.owasp.org/index.php/OWASP_Chapter).
* [Local chapters worldwide](https://wiki.owasp.org/index.php/OWASP_Chapter).
* Cutting edge research.
* Extensive [conferences worldwide](https://www.owasp.org/index.php/Category:OWASP_AppSec_Conference).
* Extensive [conferences worldwide](https://wiki.owasp.org/index.php/Category:OWASP_AppSec_Conference).
* [Mailing lists](https://lists.owasp.org/mailman/listinfo).

Learn more at: [https://www.owasp.org](https://www.owasp.org).
Expand Down
4 changes: 2 additions & 2 deletions 2017/en/0x02-foreword.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ A great deal of feedback was received during the creation of the OWASP Top 10 -

Although the original goal of the OWASP Top 10 project was simply to raise awareness amongst developers and managers, it has become the de facto application security standard. 

In this release, issues and recommendations are written concisely and in a testable way to assist with the adoption of the OWASP Top 10 in application security programs. We encourage large and high performing organizations to use the [OWASP Application Security Verification Standard (ASVS)](https://www.owasp.org/index.php/ASVS) if a true standard is required, but for most, the OWASP Top 10 is a great start on the application security journey.
In this release, issues and recommendations are written concisely and in a testable way to assist with the adoption of the OWASP Top 10 in application security programs. We encourage large and high performing organizations to use the [OWASP Application Security Verification Standard (ASVS)](https://wiki.owasp.org/index.php/ASVS) if a true standard is required, but for most, the OWASP Top 10 is a great start on the application security journey.

We have written up a range of suggested next steps for different users of the OWASP Top 10, including "What's Next for Developers", "What's Next for Security Testers", "What's Next for Organizations“, which is suitable for CIOs and CISOs, and "What's Next for Application Managers", which is suitable for application managers or anyone responsible for the lifecycle of the application.

Expand All @@ -18,7 +18,7 @@ We hope that the OWASP Top 10 is useful to your application security efforts. Pl

You can find the OWASP Top 10 project and translations here:

* [https://www.owasp.org/index.php/top10](https://www.owasp.org/index.php/top10)
* [https://wiki.owasp.org/index.php/top10](https://wiki.owasp.org/index.php/top10)

Lastly, we wish to thank the founding leadership of the OWASP Top 10 project, Dave Wichers and Jeff Williams, for all their efforts, and believing in us to get this finished with the community's help. Thank you!

Expand Down
6 changes: 3 additions & 3 deletions 2017/en/0x05-introduction.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,15 +10,15 @@ A primary aim of the OWASP Top 10 is to educate developers, designers, architect

## Roadmap for future activities

**Don't stop at 10**. There are hundreds of issues that could affect the overall security of a web application as discussed in the [OWASP Developer's Guide](https://www.owasp.org/index.php/OWASP_Guide_Project) and the [OWASP Cheat Sheet Series](https://www.owasp.org/index.php/Category:Cheatsheets). These are essential reading for anyone developing web applications and APIs. Guidance on how to effectively find vulnerabilities in web applications and APIs is provided in the [OWASP Testing Guide](https://www.owasp.org/index.php/OWASP_Testing_Project).
**Don't stop at 10**. There are hundreds of issues that could affect the overall security of a web application as discussed in the [OWASP Developer's Guide](https://wiki.owasp.org/index.php/OWASP_Guide_Project) and the [OWASP Cheat Sheet Series](https://wiki.owasp.org/index.php/Category:Cheatsheets). These are essential reading for anyone developing web applications and APIs. Guidance on how to effectively find vulnerabilities in web applications and APIs is provided in the [OWASP Testing Guide](https://wiki.owasp.org/index.php/OWASP_Testing_Project).

**Constant change**. The OWASP Top 10 will continue to change. Even without changing a single line of your application's code, you may become vulnerable as new flaws are discovered and attack methods are refined. Please review the advice at the end of the Top 10 in What's Next For Developers, Testers, Organizations and Application Managers for more information.

**Think positive**. When you're ready to stop chasing vulnerabilities and focus on establishing strong application security controls, the [OWASP Proactive Controls](https://www.owasp.org/index.php/OWASP_Proactive_Controls) project provides a starting point to help developers build security into their applications and the [OWASP Application Security Verification Standard (ASVS)](https://www.owasp.org/index.php/ASVS) is a guide for organizations and application reviewers on what to verify.
**Think positive**. When you're ready to stop chasing vulnerabilities and focus on establishing strong application security controls, the [OWASP Proactive Controls](https://wiki.owasp.org/index.php/OWASP_Proactive_Controls) project provides a starting point to help developers build security into their applications and the [OWASP Application Security Verification Standard (ASVS)](https://wiki.owasp.org/index.php/ASVS) is a guide for organizations and application reviewers on what to verify.

**Use tools wisely**. Security vulnerabilities can be quite complex and deeply buried in code. In many cases, the most cost-effective approach for finding and eliminating these weaknesses is human experts armed with advanced tools. Relying on tools alone provides a false sense of security and is not recommended.

**Push left, right, and everywhere**. Focus on making security an integral part of your culture throughout your development organization. Find out more in the [OWASP Software Assurance Maturity Model (SAMM)](https://www.owasp.org/index.php/OWASP_SAMM_Project).
**Push left, right, and everywhere**. Focus on making security an integral part of your culture throughout your development organization. Find out more in the [OWASP Software Assurance Maturity Model (SAMM)](https://wiki.owasp.org/index.php/OWASP_SAMM_Project).

## Attribution

Expand Down
4 changes: 2 additions & 2 deletions 2017/en/0x06-release-notes.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ Over the last few years, the fundamental technology and architecture of applicat

## New issues, supported by data

* **A4:2017-XML External Entities (XXE)** is a new category primarily supported by source code analysis security testing tools ([SAST](https://www.owasp.org/index.php/Source_Code_Analysis_Tools)) data sets.
* **A4:2017-XML External Entities (XXE)** is a new category primarily supported by source code analysis security testing tools ([SAST](https://wiki.owasp.org/index.php/Source_Code_Analysis_Tools)) data sets.

## New issues, supported by the community

Expand All @@ -24,7 +24,7 @@ We asked the community to provide insight into two forward looking weakness cate
## Merged or retired, but not forgotten

* **A4-Insecure Direct Object References** and **A7-Missing Function Level Access Control** merged into **A5:2017-Broken Access Control**.
* **A8-Cross-Site Request Forgery (CSRF)**, as many frameworks include [CSRF defenses](https://www.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)), it was found in only 5% of applications.
* **A8-Cross-Site Request Forgery (CSRF)**, as many frameworks include [CSRF defenses](https://wiki.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)), it was found in only 5% of applications.
* **A10-Unvalidated Redirects and Forwards**, while found in approximately in 8% of applications, it was edged out overall by XXE.

![0x06-release-notes-1](images/0x06-release-notes-1.png)
6 changes: 3 additions & 3 deletions 2017/en/0x10-app-security-risks.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ Sometimes these paths are trivial to find and exploit, and sometimes they are ex

## What's My Risk

The [OWASP Top 10](https://www.owasp.org/index.php/Top10) focuses on identifying the most serious web application security risks for a broad array of organizations. For each of these risks, we provide generic information about likelihood and technical impact using the following simple ratings scheme, which is based on the OWASP Risk Rating Methodology.  
The [OWASP Top 10](https://wiki.owasp.org/index.php/Top10) focuses on identifying the most serious web application security risks for a broad array of organizations. For each of these risks, we provide generic information about likelihood and technical impact using the following simple ratings scheme, which is based on the OWASP Risk Rating Methodology.  

| Threat Agents | Exploitability | Weakness Prevalence | Weakness Detectability | Technical Impacts | Business Impacts |
| -- | -- | -- | -- | -- | -- |
Expand All @@ -28,8 +28,8 @@ Where possible, the names of the risks in the Top 10 are aligned with [Common We

### OWASP

* [OWASP Risk Rating Methodology](https://www.owasp.org/index.php/OWASP_Risk_Rating_Methodology)
* [Article on Threat/Risk Modeling](https://www.owasp.org/index.php/Threat_Risk_Modeling)
* [OWASP Risk Rating Methodology](https://wiki.owasp.org/index.php/OWASP_Risk_Rating_Methodology)
* [Article on Threat/Risk Modeling](https://wiki.owasp.org/index.php/Threat_Risk_Modeling)

### External

Expand Down
25 changes: 12 additions & 13 deletions 2017/en/0xa1-injection.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
| Threat agents/Attack vectors | Security Weakness | Impacts |
| -- | -- | -- |
| Access Lvl : Exploitability 3 | Prevalence 2 : Detectability 3 | Technical 3 : Business |
| Almost any source of data can be an injection vector, environment variables, parameters, external and internal web services, and all types of users. [Injection flaws](https://www.owasp.org/index.php/Injection_Flaws) occur when an attacker can send hostile data to an interpreter. | Injection flaws are very prevalent, particularly in legacy code. Injection vulnerabilities are often found in SQL, LDAP, XPath, or NoSQL queries, OS commands, XML parsers, SMTP headers, expression languages, and ORM queries. Injection flaws are easy to discover when examining code. Scanners and fuzzers can help attackers find injection flaws. |Injection can result in data loss, corruption, or disclosure to unauthorized parties, loss of accountability, or denial of access. Injection can sometimes lead to complete host takeover. The business impact depends on the needs of the application and data.|
| Almost any source of data can be an injection vector, environment variables, parameters, external and internal web services, and all types of users. [Injection flaws](https://wiki.owasp.org/index.php/Injection_Flaws) occur when an attacker can send hostile data to an interpreter. | Injection flaws are very prevalent, particularly in legacy code. Injection vulnerabilities are often found in SQL, LDAP, XPath, or NoSQL queries, OS commands, XML parsers, SMTP headers, expression languages, and ORM queries. Injection flaws are easy to discover when examining code. Scanners and fuzzers can help attackers find injection flaws. |Injection can result in data loss, corruption, or disclosure to unauthorized parties, loss of accountability, or denial of access. Injection can sometimes lead to complete host takeover. The business impact depends on the needs of the application and data.|


## Is the Application Vulnerable?
Expand All @@ -14,7 +14,7 @@ An application is vulnerable to attack when:
* Dynamic queries or non-parameterized calls without context-aware escaping are used directly in the interpreter.
* Hostile data is used within object-relational mapping (ORM) search parameters to extract additional, sensitive records.
* Hostile data is directly used or concatenated, such that the SQL or command contains both structure and hostile data in dynamic queries, commands, or stored procedures.
* Some of the more common injections are SQL, NoSQL, OS command, Object Relational Mapping (ORM), LDAP, and Expression Language (EL) or Object Graph Navigation Library (OGNL) injection. The concept is identical among all interpreters. Source code review is the best method of detecting if applications are vulnerable to injections, closely followed by thorough automated testing of all parameters, headers, URL, cookies, JSON, SOAP, and XML data inputs. Organizations can include static source ([SAST](https://www.owasp.org/index.php/Source_Code_Analysis_Tools)) and dynamic application test ([DAST](https://www.owasp.org/index.php/Category:Vulnerability_Scanning_Tools)) tools into the CI/CD pipeline to identify newly introduced injection flaws prior to production deployment.
* Some of the more common injections are SQL, NoSQL, OS command, Object Relational Mapping (ORM), LDAP, and Expression Language (EL) or Object Graph Navigation Library (OGNL) injection. The concept is identical among all interpreters. Source code review is the best method of detecting if applications are vulnerable to injections, closely followed by thorough automated testing of all parameters, headers, URL, cookies, JSON, SOAP, and XML data inputs. Organizations can include static source ([SAST](https://wiki.owasp.org/index.php/Source_Code_Analysis_Tools)) and dynamic application test ([DAST](https://wiki.owasp.org/index.php/Category:Vulnerability_Scanning_Tools)) tools into the CI/CD pipeline to identify newly introduced injection flaws prior to production deployment.

## How To Prevent

Expand All @@ -23,7 +23,6 @@ Preventing injection requires keeping data separate from commands and queries.
* The preferred option is to use a safe API, which avoids the use of the interpreter entirely or provides a parameterized interface, or migrate to use Object Relational Mapping Tools (ORMs). **Note**: Even when parameterized, stored procedures can still introduce SQL injection if PL/SQL or T-SQL concatenates queries and data, or executes hostile data with EXECUTE IMMEDIATE or exec().
* Use positive or "whitelist" server-side input validation. This is not a complete defense as many applications require special characters, such as text areas or APIs for mobile applications.
* For any residual dynamic queries, escape special characters using the specific escape syntax for that interpreter. **Note**: SQL structure such as table names, column names, and so on cannot be escaped, and thus user-supplied structure names are dangerous. This is a common issue in report-writing software.
* Use LIMIT and other SQL controls within queries to prevent mass disclosure of records in case of SQL injection.

## Example Attack Scenarios

Expand All @@ -35,24 +34,24 @@ Preventing injection requires keeping data separate from commands and queries.

`Query HQLQuery = session.createQuery("FROM accounts WHERE custID='" + request.getParameter("id") + "'");`

In both cases, the attacker modifies the ‘id’ parameter value in their browser to send: ' or '1'='1. For example:
In both cases, the attacker modifies the ‘id’ parameter value in their browser to send: ' UNION SELECT SLEEP(10);--. For example:

`http://example.com/app/accountView?id=' or '1'='1`
`http://example.com/app/accountView?id=' UNION SELECT SLEEP(10);--`

This changes the meaning of both queries to return all the records from the accounts table. More dangerous attacks could modify or delete data, or even invoke stored procedures.

## References

### OWASP

* [OWASP Proactive Controls: Parameterize Queries](https://www.owasp.org/index.php/OWASP_Proactive_Controls#2:_Parameterize_Queries)
* [OWASP ASVS: V5 Input Validation and Encoding](https://www.owasp.org/index.php/ASVS_V5_Input_validation_and_output_encoding)
* [OWASP Testing Guide: SQL Injection](https://www.owasp.org/index.php/Testing_for_SQL_Injection_(OTG-INPVAL-005)), [Command Injection](https://www.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)), [ORM injection](https://www.owasp.org/index.php/Testing_for_ORM_Injection_(OTG-INPVAL-007))
* [OWASP Cheat Sheet: Injection Prevention](https://www.owasp.org/index.php/Injection_Prevention_Cheat_Sheet)
* [OWASP Cheat Sheet: SQL Injection Prevention](https://www.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet)
* [OWASP Cheat Sheet: Injection Prevention in Java](https://www.owasp.org/index.php/Injection_Prevention_Cheat_Sheet_in_Java)
* [OWASP Cheat Sheet: Query Parameterization](https://www.owasp.org/index.php/Query_Parameterization_Cheat_Sheet)
* [OWASP Automated Threats to Web Applications – OAT-014](https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications)
* [OWASP Proactive Controls: Parameterize Queries](https://wiki.owasp.org/index.php/OWASP_Proactive_Controls#2:_Parameterize_Queries)
* [OWASP ASVS: V5 Input Validation and Encoding](https://wiki.owasp.org/index.php/ASVS_V5_Input_validation_and_output_encoding)
* [OWASP Testing Guide: SQL Injection](https://wiki.owasp.org/index.php/Testing_for_SQL_Injection_(OTG-INPVAL-005)), [Command Injection](https://wiki.owasp.org/index.php/Testing_for_Command_Injection_(OTG-INPVAL-013)), [ORM injection](https://wiki.owasp.org/index.php/Testing_for_ORM_Injection_(OTG-INPVAL-007))
* [OWASP Cheat Sheet: Injection Prevention](https://wiki.owasp.org/index.php/Injection_Prevention_Cheat_Sheet)
* [OWASP Cheat Sheet: SQL Injection Prevention](https://wiki.owasp.org/index.php/SQL_Injection_Prevention_Cheat_Sheet)
* [OWASP Cheat Sheet: Injection Prevention in Java](https://wiki.owasp.org/index.php/Injection_Prevention_Cheat_Sheet_in_Java)
* [OWASP Cheat Sheet: Query Parameterization](https://wiki.owasp.org/index.php/Query_Parameterization_Cheat_Sheet)
* [OWASP Automated Threats to Web Applications – OAT-014](https://wiki.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications)

### External

Expand Down
Loading