OWASP
2021:
- Broken Access Control: actually put correct checks in place
- Cryptographic Failures: leaking information in clear text, or weak encryption
- Injection: using untrusted user input - SQL, cross-site scriptiong
- Insecure Design: think about security at the start, not the last minute (kind of a process thing instead of a vulnerability)
- Security Misconfiguration: insecure settings, default things exposed
- Vulnerable and Outdated Components: dependencies. Keep them up to date, especially security vulnerabilities
- Identification and Authentication Failures: breakable auth via credential stuffing, weak passwords, unencrypted, etc
- Software and Data Integrity Failures: prevent vulnerabilities from getting injected by things like spoofed or malicious packages
- Security Logging and Monitoring Failures: log suspicious activity in a way that can be identified
- Server-Side Request Forgery: an attacker gets the server to make an unexpected request to a protected internal resource