Web application vulnerabilities ranked by real-world exploitation frequency — not theoretical risk. Drawn from breach reports, CVE data, and incident response findings.
OWASP does important work. But its list is built on surveys and expert opinion. Ours is built on evidence.
Ranked by confirmed exploitation frequency across breach reports, IR engagements, and public CVE data.
| # | Vulnerability | ||
|---|---|---|---|
| Loading… | |||
Most of the AWASP Top Ten describes vulnerabilities in vendor software that happens to be web-accessible — React Server Components, SharePoint, SAP NetWeaver, Apache Tomcat. The breach data we draw on is structurally poor at telling us what gets exploited in bespoke, custom-built web applications, because SEC filings and breach disclosures almost never specify a vulnerability class. They say “unauthorized access” and leave it there. What follows is what we can reasonably infer from the data we do have — presented in ranked order, with the honest caveat that inference is not evidence.
These OWASP categories don't appear in the AWASP Top Ten because the evidence doesn't support their inclusion as distinct, exploitable findings.
Transparent about our sources, our reasoning, and where the data runs out.
The OWASP Top 10 is built from testing data — what security scanners and pentesters find when they examine applications. That’s useful, but it tells you what’s discoverable, not what’s actually being exploited. We wanted to know what attackers are actually doing, so we went looking for exploitation data instead.
We filtered out anything that isn’t a web application vulnerability. CISA KEV is full of Use After Free bugs, buffer overflows, and kernel privilege escalations — those are real and serious, but they’re not web app security.
We kept the focus on vulnerabilities in things you access over HTTPS: login pages, APIs, web management interfaces, and web application frameworks.
OWASP’s data contributors are security testing vendors (Veracode, Contrast Security, HackerOne). Zero breach investigation firms — Mandiant, CrowdStrike, Palo Alto Unit 42 — contribute data to the OWASP Top 10.
OWASP uses incidence rate (percentage of apps with the vulnerability) rather than exploitation frequency. Two of their ten categories are chosen by community survey to compensate for things testing tools can’t find. Their own documentation says results are “largely limited to what the industry can test for in an automated fashion.”
None of that makes OWASP wrong or useless. It just means it answers a different question to ours.
Every ranking decision traces back to at least one of these primary sources.