Does OWASP’s top 10 list cover the majority of potential web application vulnerabilities?

I ask this question because there is a common compliance argument that performing an “OWASP Top 10” scan provides enough coverage to consider it an “in-depth” scan. Is this the case, or are organizations implementing a minimal level of scan coverage?