Does OWASP’s top 10 list cover the majority of potential web application vulnerabilities?

I ask this question because there is a common compliance argument that performing an “OWASP Top 10” scan provides enough coverage to consider it an “in-depth” scan. Is this the case, or are organizations implementing a minimal level of sca… Continue reading Does OWASP’s top 10 list cover the majority of potential web application vulnerabilities?

What is the best way for OWASP Zap to handle Unique Fields and API Sequences?

First Situation: I proxy through some requests to zap and want to perform an active scan on them. Zap active scan is working on one property at a time, and this particular request requires some of the properties to be unique per request.

Continue reading What is the best way for OWASP Zap to handle Unique Fields and API Sequences?