OWASP API Top 10

API7:2019 Security Misconfiguration: The What, Sample Exploits, and Prevention Methods
Security misconfigurations are very common security risks, not just in web applications but also in APIs. They have been consistently part of the OWASP Top 10 Web Application Vulnerabilities. They. The post ...

API5:2019 Broken Function Level Authorization: The What, Impact, Sample Exploit, and Prevention Methods
Broken function-level authorization vulnerabilities enable unauthorized users to access or execute functions they should not have access to. The post API5:2019 Broken Function Level Authorization: The What, Impact, Sample Exploit, and Prevention ...

API4:2019 – Lack of Resources & Rate Limiting: The What, Sample Exploit, and Prevention Methods
Lack of resources & rate limiting is #4 on the OWASP Top 10 API Security Risks 2019. When the app/ API doesn't have properly defined limits for API calls and resources that ...

API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, and Prevention Methods
API2:2019 Broken User Authentication happens when an attacker bypasses an API's authentication and authorization mechanisms and gains access to sensitive data. The post API2:2019 Broken User Authentication: The What, Impact, Sample Exploit, ...

OWASP API1: 2019 – Broken Object Level Authorization
Are you leaving your APIs vulnerable to attacks? OWASP revealed that Broken Object Level Authorization is among the top 10 most critical API security risks list The post OWASP API1: 2019 – ...