<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jonathan+Carter</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jonathan+Carter"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jonathan_Carter"/>
		<updated>2026-05-17T17:20:38Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M1-Improper_Platform_Usage&amp;diff=226470</id>
		<title>Mobile Top 10 2016-M1-Improper Platform Usage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M1-Improper_Platform_Usage&amp;diff=226470"/>
				<updated>2017-02-17T23:53:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M2-{{Mobile_Top_10_2016:ByTheNumbers               |2               |year=2016               |langua...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M2-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |2&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Nothing&lt;br /&gt;
    |prev=&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
  &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;This category covers misuse of a platform feature or failure to use platform security controls. It might include Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The attack vectors correspond to the same attack vectors available through the traditional OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;In order for this vulnerability to be exploited, the organization must expose a web service or API call that is consumed by the mobile app. The exposed service or API call is implemented using insecure coding techniques that produce an OWASP Top Ten vulnerability within the server. Through the mobile interface, an adversary is able to feed malicious inputs or unexpected sequences of events to the vulnerable endpoint. Hence, the adversary realizes the original OWASP Top Ten vulnerability on the server.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The technical impact of this vulnerability corresponds to the technical impact of the associated vulnerability (defined in the OWASP Top Ten) that the adversary is exploiting via the mobile device.&lt;br /&gt;
&lt;br /&gt;
For example, an adversary may exploit a Cross-Site Scripting (XSS) vulnerability via the mobile device. This corresponds to the OWASP Top Ten A3 - XSS Category with a technical impact of moderate.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The business impact of this vulnerability corresponds to the business impact of the associated vulnerability (defined in the OWASP Top Ten) that the adversary is exploiting via the mobile device.&lt;br /&gt;
&lt;br /&gt;
For example, an adversary may exploit a Cross-Site Scripting (XSS) vulnerability via the mobile device. This corresponds to the OWASP Top Ten A3 - XSS Category's business impacts.&lt;br /&gt;
     &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2016|language=en}}&lt;br /&gt;
The defining characteristic of risks in this category is that the platform (iOS, Android, Windows Phone, etc.) provides a feature or a capability that is documented and well understood. The app fails to use that capability or uses it incorrectly. This differs from other mobile top ten risks because the design and implementation is not strictly the app developer's issue.&lt;br /&gt;
&lt;br /&gt;
There are several ways that mobile apps can experience this risk.&lt;br /&gt;
&lt;br /&gt;
#'''Violation of published guidelines.''' All platforms have development guidelines for security (c.f., ((Android)), ((iOS)), ((Windows Phone))). If an app contradicts the best practices recommended by the manufacturer, it will be exposed to this risk. For example, there are guidelines on how to use the iOS Keychain or how to secure exported services on Android. Apps that do not follow these guidelines will experience this risk.&lt;br /&gt;
#'''Violation of convention or common practice.''' Not all best practices are codified in manufacturer guidance. In some instances, there are de facto best practices that are common in mobile apps.&lt;br /&gt;
#'''Unintentional Misuse.''' Some apps intend to do the right thing, but actually get some part of the implementation wrong. This could be a simple bug, like setting the wrong flag on an API call, or it could be a misunderstanding of how the protections work.&lt;br /&gt;
&lt;br /&gt;
Failures in the platform's permission models fall into this category. For example, if the app requests too many permissions or the wrong permissions, that is best categorised here. &lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2016|language=en}}&lt;br /&gt;
Secure coding and configuration practices must be used on server-side of the mobile application. For specific vulnerability information, refer to the OWASP Web Top Ten or Cloud Top Ten projects.&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|year=2016|language=en}}&lt;br /&gt;
Because there are several platforms, each with hundreds or thousands of APIs, the examples in this section only scratch the surface of what is possible.'''&lt;br /&gt;
&lt;br /&gt;
'''App Local Storage Instead of Keychain'''&lt;br /&gt;
The iOS Keychain is a secure storage facility for both app and system data. On iOS, apps should use it to store any small data that has security significance (session keys, passwords, device enrolment data, etc.). A common mistake is to store such items in app local storage. Data stored in app local storage is available in unencrypted iTunes backups (e.g., on the user's computer). For some apps, that exposure is inappropriate. &lt;br /&gt;
&lt;br /&gt;
Below, you can see that there are many risks and vulnerabilities that you must mitigate in order to satisfy M1:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:CloudTT_thum.png|border|400px|link=https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project]]     [[File:WebTT_thumb.png|border|400px|link=https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project]]&amp;lt;/center&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
=== The Worst Offenders ===&lt;br /&gt;
&lt;br /&gt;
Below is a list vulnerability types that OWASP sees most often within mobile applications:&lt;br /&gt;
&lt;br /&gt;
;Poor Web Services Hardening&lt;br /&gt;
: Logic flaws&lt;br /&gt;
:: [https://www.owasp.org/index.php/Testing_for_business_logic_(OWASP-BL-001) Testing for business logic flaws]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Business_Logic_Security_Cheat_Sheet Business Logic Security Cheat Sheet]&lt;br /&gt;
: Weak Authentication&lt;br /&gt;
:: [https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management OWASP Top Ten Broken Authentication Section]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Authentication_Cheat_Sheet Authentication Cheat Sheet]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Guide_to_Authentication Developers Guide for Authentication]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Testing_for_authentication Testing for Authentication]&lt;br /&gt;
: Weak or no session management&lt;br /&gt;
: Session fixation&lt;br /&gt;
: Sensitive data transmitted using GET method&lt;br /&gt;
&lt;br /&gt;
; Insecure web server configurations&lt;br /&gt;
: Default content&lt;br /&gt;
: Administrative interfaces&lt;br /&gt;
; Injection (SQL, XSS, Command) on both web services and mobile-enabled websites&lt;br /&gt;
; Authentication flaws&lt;br /&gt;
; Session Management flaws&lt;br /&gt;
; Access control vulnerabilities&lt;br /&gt;
; Local and Remote File Includes&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_Ten OWASP Top Ten]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
* [http://cwe.mitre.org/ External References]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:RoundedBoxLinkBegin&amp;diff=226469</id>
		<title>Template:Mobile Top 10:RoundedBoxLinkBegin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:RoundedBoxLinkBegin&amp;diff=226469"/>
				<updated>2017-02-17T23:43:22Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Mobile_Top_10_2016-M{{{risk}}}-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |{{{risk}}}&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}} | &lt;br /&gt;
{{Top 10:RoundedBoxBegin|year={{{year}}} }}&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=226318</id>
		<title>Projects/OWASP Mobile Security Project - Top Ten Mobile Risks</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks&amp;diff=226318"/>
				<updated>2017-02-14T01:13:59Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;&amp;lt;br style=&amp;quot;clear:both&amp;quot; /&amp;gt;&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;  style=&amp;quot;width:45%; background-color:#FFFFFF; border:1px solid #a7d7f9; -moz-border-radius: 9px;-webkit-border-radius: 9px; border-radius: 9px; padding:1px;&amp;quot; id=&amp;quot;social_bookmarks&amp;quot; class=&amp;quot;noprint&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
&amp;lt;div class=&amp;quot;plainlinks&amp;quot; align=&amp;quot;center&amp;quot;&amp;gt;&lt;br /&gt;
'''Share this:'''&amp;amp;nbsp;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share via e-mail&amp;quot; class=&amp;quot;plainlinks&amp;quot;&amp;gt;[[File:social-email.png|E-mail this story|link=mailto:?subject={{FULLPAGENAMEE}}&amp;amp;body={{FULLPAGENAMEE}}:%0A{{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Facebook&amp;quot;&amp;gt;[[File:social-facebook.png|Bookmark with Facebook|link=http://www.facebook.com/sharer.php?u={{fullurle:{{FULLPAGENAME}}}}&amp;amp;t={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on Digg&amp;quot;&amp;gt;[[File:social-digg.png|Share on Digg.com|link=http://digg.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}} }}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on delicious&amp;quot;&amp;gt;[[File:social-delicious.png|16px|Share on delicious|link=http://delicious.com/post?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on reddit&amp;quot;&amp;gt;[[File:social-reddit.png|Share on reddit.com|link=http://reddit.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on StumbleUpon&amp;quot;&amp;gt;[[File:social-stumbleupon.png|16px|Share on stumbleupon.com|link=http://stumbleupon.com/submit?url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span  title=&amp;quot;Share on LinkedIn&amp;quot;&amp;gt;[[File:social-linkedin.png|16px|Share on LinkedIn.com|link=http://www.linkedin.com/shareArticle?mini=true&amp;amp;url={{fullurle:{{FULLPAGENAME}}}}&amp;amp;title={{urlencode:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Share on Twitter&amp;quot;&amp;gt;[[File:social-twitter.png|alt=Share on twitter.com|link=http://twitter.com/?status={{fullurle:{{FULLPAGENAME}}}}|Share on twitter.com]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span title=&amp;quot;Seed on Newsvine&amp;quot;&amp;gt;[[File:social-newsvine.png|16px|Seed on Newsvine|link=http://www.newsvine.com/_wine/save?popoff=1&amp;amp;u={{fullurle:{{FULLPAGENAME}}}}]]&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;/div&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
= The Mobile Top Ten 2016 =&lt;br /&gt;
&lt;br /&gt;
Following a 90-day review and publication of the release candidate, we determined that the release candidate was ready for final publication. The 2016 list has now been published and can be found here: [https://www.owasp.org/index.php/Mobile_Top_10_2016-Top_10 OWASP Mobile Top Ten 2016]&lt;br /&gt;
&lt;br /&gt;
Feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well!&lt;br /&gt;
&lt;br /&gt;
== 2015 Mobile Top Ten Analysis Results ==&lt;br /&gt;
Are you interested in what the data collection for the 2015 list looks like?  Check out the final synthesis... [[Media:2015 Data Synthesis Results.pptx]]&lt;br /&gt;
&lt;br /&gt;
We are fleshing out the new Mobile Top Ten at [[Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad]]. Have a look.&lt;br /&gt;
&lt;br /&gt;
Here is the original raw data: [[https://www.dropbox.com/sh/d143o6tbkdx4w4l/AAAQlpmnCpHCgiBqZkgXPSTKa?dl=0 Dropbox Data]]&lt;br /&gt;
&lt;br /&gt;
== Project Leads, Credit, and Contributions ==&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== How Did the List Get Made? ==&lt;br /&gt;
# We wanted to know what the community wanted in the next Mobile Top Ten list and what they thought about the last. We published a [http://bit.ly/1sihkkE survey] and shared the [https://docs.google.com/a/owasp.org/forms/d/1WMEbjVgXU4VkjHP5AcW934D9EI0_XQ5vmjb-Y5liMQY/viewanalytics results] with everyone.&lt;br /&gt;
# We issued a [https://www.owasp.org/index.php/File:MobileTopTen2015-CallForData.pdf Call for Data] and aggressively pursued many different vendors and consultants for raw data.&lt;br /&gt;
# We had a huge response by vendors and consultants. We collected lots of data about the last years vulnerabilities from a number of different vendors and consultant. That raw data can be found [https://www.dropbox.com/sh/d143o6tbkdx4w4l/AAAQlpmnCpHCgiBqZkgXPSTKa?dl=0 here].&lt;br /&gt;
# Over the coming months, we then analyzed the data. Lots of different contributors did their own analysis and compared results. [https://www.owasp.org/index.php/Mobile2015Commentary Here] is a sample of the color commentary on the data.&lt;br /&gt;
# Ultimately, we agreed on the findings and published [https://www.owasp.org/images/9/96/OWASP_Mobile_Top_Ten_2015_-_Final_Synthesis.pdf key findings] from the data that we all agreed upon.&lt;br /&gt;
# Next, we started coming up with a [https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad consensus] of what we wanted in the next revision of the Mobile Top Ten.&lt;br /&gt;
# Results were collected and a release candidate got released.&lt;br /&gt;
# We examined the results from the release candidate and concluded that we achieved what we set out to do for 2016&lt;br /&gt;
# We published the list officially and moved it from release to final stage&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-Top_10&amp;diff=226317</id>
		<title>Mobile Top 10 2016-Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-Top_10&amp;diff=226317"/>
				<updated>2017-02-14T01:13:10Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;100%;&amp;quot;&lt;br /&gt;
| style=&amp;quot;width: 173px;&amp;quot; | {{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=1|language=en}}M1 - Improper Platform Usage&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This category covers misuse of a platform feature or failure to use platform security controls. It might include Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system.&lt;br /&gt;
There are several ways that mobile apps can experience this risk.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=2|language=en}}M2 - Insecure Data Storage&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This new category is a combination of M2 + M4 from Mobile Top Ten 2014. This covers insecure data storage and unintended data leakage.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=3|language=en}}M3 - Insecure Communication&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This covers poor handshaking, incorrect SSL versions, weak negotiation, cleartext communication of sensitive assets, etc.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=4|language=en}}M4 - Insecure Authentication&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This category captures notions of authenticating the end user or bad session management. This can include:&lt;br /&gt;
&lt;br /&gt;
* Failing to identify the user at all when that should be required&lt;br /&gt;
* Failure to maintain the user's identity when it is required&lt;br /&gt;
* Weaknesses in session management &lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=5|language=en}}M5 - Insufficient Cryptography&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
The code applies cryptography to a sensitive information asset. However, the cryptography is insufficient in some way. Note that anything and everything related to TLS or SSL goes in M3. Also, if the app fails to use cryptography at all when it should, that probably belongs in M2. This category is for issues where cryptography was attempted, but it wasn't done correctly.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=6|language=en}}M6 - Insecure Authorization&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This is a category to capture any failures in authorization (e.g., authorization decisions in the client side, forced browsing, etc.). It is distinct from authentication issues (e.g., device enrolment, user identification, etc.).&lt;br /&gt;
&lt;br /&gt;
If the app does not authenticate users at all in a situation where it should (e.g., granting anonymous access to some resource or service when authenticated and authorized access is required), then that is an authentication failure not an authorization failure.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=7|language=en}}M7 - Client Code Quality&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This was the &amp;quot;Security Decisions Via Untrusted Inputs&amp;quot;, one of our lesser-used categories. This would be the catch-all for code-level implementation problems in the mobile client. That's distinct from server-side coding mistakes. This would capture things like buffer overflows, format string vulnerabilities, and various other code-level mistakes where the solution is to rewrite some code that's running on the mobile device. &lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=8|language=en}}M8 - Code Tampering&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This category covers binary patching, local resource modification, method hooking, method swizzling, and dynamic memory modification.&lt;br /&gt;
&lt;br /&gt;
Once the application is delivered to the mobile device, the code and data resources are resident there. An attacker can either directly modify the code, change the contents of memory dynamically, change or replace the system APIs that the application uses, or modify the application's data and resources. This can provide the attacker a direct method of subverting the intended use of the software for personal or monetary gain.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=9|language=en}}M9 - Reverse Engineering&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This category includes analysis of the final core binary to determine its source code, libraries, algorithms, and other assets. Software such as IDA Pro, Hopper, otool, and other binary inspection tools give the attacker insight into the inner workings of the application. This may be used to exploit other nascent vulnerabilities in the application, as well as revealing information about back end servers, cryptographic constants and ciphers, and intellectual property. &lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=10|language=en}}M10 - Extraneous Functionality&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
Often, developers include hidden backdoor functionality or other internal development security controls that are not intended to be released into a production environment. For example, a developer may accidentally include a password as a comment in a hybrid app. Another example includes disabling of 2-factor authentication during testing. &lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-Top_10&amp;diff=226316</id>
		<title>Mobile Top 10 2016-Top 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-Top_10&amp;diff=226316"/>
				<updated>2017-02-14T01:09:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=== How Did the List Get Made? ===&lt;br /&gt;
# We wanted to know what the community wanted in the next Mobile Top Ten list and what they thought about the last. We published a [http://bit.ly/1sihkkE survey] and shared the [https://docs.google.com/a/owasp.org/forms/d/1WMEbjVgXU4VkjHP5AcW934D9EI0_XQ5vmjb-Y5liMQY/viewanalytics results] with everyone.&lt;br /&gt;
# We issued a [https://www.owasp.org/index.php/File:MobileTopTen2015-CallForData.pdf Call for Data] and aggressively pursued many different vendors and consultants for raw data.&lt;br /&gt;
# We had a huge response by vendors and consultants. We collected lots of data about the last years vulnerabilities from a number of different vendors and consultant. That raw data can be found [https://www.dropbox.com/sh/d143o6tbkdx4w4l/AAAQlpmnCpHCgiBqZkgXPSTKa?dl=0 here].&lt;br /&gt;
# Over the coming months, we then analyzed the data. Lots of different contributors did their own analysis and compared results. [https://www.owasp.org/index.php/Mobile2015Commentary Here] is a sample of the color commentary on the data.&lt;br /&gt;
# Ultimately, we agreed on the findings and published [https://www.owasp.org/images/9/96/OWASP_Mobile_Top_Ten_2015_-_Final_Synthesis.pdf key findings] from the data that we all agreed upon.&lt;br /&gt;
# Next, we started coming up with a [https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad consensus] of what we wanted in the next revision of the Mobile Top Ten.&lt;br /&gt;
# Results were collected and a release candidate got released.&lt;br /&gt;
# We examined the results from the release candidate and concluded that we achieved what we set out to do for 2016&lt;br /&gt;
# We published the list officially and moved it from release to final stage&lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;100%;&amp;quot;&lt;br /&gt;
| style=&amp;quot;width: 173px;&amp;quot; | {{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=1|language=en}}M1 - Improper Platform Usage&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This category covers misuse of a platform feature or failure to use platform security controls. It might include Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system.&lt;br /&gt;
There are several ways that mobile apps can experience this risk.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=2|language=en}}M2 - Insecure Data Storage&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This new category is a combination of M2 + M4 from Mobile Top Ten 2014. This covers insecure data storage and unintended data leakage.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=3|language=en}}M3 - Insecure Communication&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This covers poor handshaking, incorrect SSL versions, weak negotiation, cleartext communication of sensitive assets, etc.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=4|language=en}}M4 - Insecure Authentication&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This category captures notions of authenticating the end user or bad session management. This can include:&lt;br /&gt;
&lt;br /&gt;
* Failing to identify the user at all when that should be required&lt;br /&gt;
* Failure to maintain the user's identity when it is required&lt;br /&gt;
* Weaknesses in session management &lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=5|language=en}}M5 - Insufficient Cryptography&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
The code applies cryptography to a sensitive information asset. However, the cryptography is insufficient in some way. Note that anything and everything related to TLS or SSL goes in M3. Also, if the app fails to use cryptography at all when it should, that probably belongs in M2. This category is for issues where cryptography was attempted, but it wasn't done correctly.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=6|language=en}}M6 - Insecure Authorization&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This is a category to capture any failures in authorization (e.g., authorization decisions in the client side, forced browsing, etc.). It is distinct from authentication issues (e.g., device enrolment, user identification, etc.).&lt;br /&gt;
&lt;br /&gt;
If the app does not authenticate users at all in a situation where it should (e.g., granting anonymous access to some resource or service when authenticated and authorized access is required), then that is an authentication failure not an authorization failure.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=7|language=en}}M7 - Client Code Quality&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This was the &amp;quot;Security Decisions Via Untrusted Inputs&amp;quot;, one of our lesser-used categories. This would be the catch-all for code-level implementation problems in the mobile client. That's distinct from server-side coding mistakes. This would capture things like buffer overflows, format string vulnerabilities, and various other code-level mistakes where the solution is to rewrite some code that's running on the mobile device. &lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=8|language=en}}M8 - Code Tampering&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This category covers binary patching, local resource modification, method hooking, method swizzling, and dynamic memory modification.&lt;br /&gt;
&lt;br /&gt;
Once the application is delivered to the mobile device, the code and data resources are resident there. An attacker can either directly modify the code, change the contents of memory dynamically, change or replace the system APIs that the application uses, or modify the application's data and resources. This can provide the attacker a direct method of subverting the intended use of the software for personal or monetary gain.&lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=9|language=en}}M9 - Reverse Engineering&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
This category includes analysis of the final core binary to determine its source code, libraries, algorithms, and other assets. Software such as IDA Pro, Hopper, otool, and other binary inspection tools give the attacker insight into the inner workings of the application. This may be used to exploit other nascent vulnerabilities in the application, as well as revealing information about back end servers, cryptographic constants and ciphers, and intellectual property. &lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
|{{Mobile Top 10:RoundedBoxLinkBegin|year=2016|risk=10|language=en}}M10 - Extraneous Functionality&lt;br /&gt;
{{Mobile Top 10:RoundedBoxLinkEnd|year=2016}}&lt;br /&gt;
|{{Mobile Top 10:GrayBoxBegin|year=2016}}&lt;br /&gt;
Often, developers include hidden backdoor functionality or other internal development security controls that are not intended to be released into a production environment. For example, a developer may accidentally include a password as a comment in a hybrid app. Another example includes disabling of 2-factor authentication during testing. &lt;br /&gt;
&lt;br /&gt;
{{Mobile Top 10:GrayBoxEnd|year=2016}}&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_Ten_2016-M1-Improper_Platform_Usage&amp;diff=226315</id>
		<title>Mobile Top Ten 2016-M1-Improper Platform Usage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_Ten_2016-M1-Improper_Platform_Usage&amp;diff=226315"/>
				<updated>2017-02-14T01:06:09Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M2-{{Mobile_Top_10_2016:ByTheNumbers               |2               |year=2016               |langua...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M2-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |2&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Nothing&lt;br /&gt;
    |prev=&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
  &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;This category covers misuse of a platform feature or failure to use platform security controls. It might include Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The attack vectors correspond to the same attack vectors available through the traditional OWASP Top Ten.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;In order for this vulnerability to be exploited, the organization must expose a web service or API call that is consumed by the mobile app. The exposed service or API call is implemented using insecure coding techniques that produce an OWASP Top Ten vulnerability within the server. Through the mobile interface, an adversary is able to feed malicious inputs or unexpected sequences of events to the vulnerable endpoint. Hence, the adversary realizes the original OWASP Top Ten vulnerability on the server.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The technical impact of this vulnerability corresponds to the technical impact of the associated vulnerability (defined in the OWASP Top Ten) that the adversary is exploiting via the mobile device.&lt;br /&gt;
&lt;br /&gt;
For example, an adversary may exploit a Cross-Site Scripting (XSS) vulnerability via the mobile device. This corresponds to the OWASP Top Ten A3 - XSS Category with a technical impact of moderate.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The business impact of this vulnerability corresponds to the business impact of the associated vulnerability (defined in the OWASP Top Ten) that the adversary is exploiting via the mobile device.&lt;br /&gt;
&lt;br /&gt;
For example, an adversary may exploit a Cross-Site Scripting (XSS) vulnerability via the mobile device. This corresponds to the OWASP Top Ten A3 - XSS Category's business impacts.&lt;br /&gt;
     &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2016|language=en}}&lt;br /&gt;
The defining characteristic of risks in this category is that the platform (iOS, Android, Windows Phone, etc.) provides a feature or a capability that is documented and well understood. The app fails to use that capability or uses it incorrectly. This differs from other mobile top ten risks because the design and implementation is not strictly the app developer's issue.&lt;br /&gt;
&lt;br /&gt;
There are several ways that mobile apps can experience this risk.&lt;br /&gt;
&lt;br /&gt;
#'''Violation of published guidelines.''' All platforms have development guidelines for security (c.f., ((Android)), ((iOS)), ((Windows Phone))). If an app contradicts the best practices recommended by the manufacturer, it will be exposed to this risk. For example, there are guidelines on how to use the iOS Keychain or how to secure exported services on Android. Apps that do not follow these guidelines will experience this risk.&lt;br /&gt;
#'''Violation of convention or common practice.''' Not all best practices are codified in manufacturer guidance. In some instances, there are de facto best practices that are common in mobile apps.&lt;br /&gt;
#'''Unintentional Misuse.''' Some apps intend to do the right thing, but actually get some part of the implementation wrong. This could be a simple bug, like setting the wrong flag on an API call, or it could be a misunderstanding of how the protections work.&lt;br /&gt;
&lt;br /&gt;
Failures in the platform's permission models fall into this category. For example, if the app requests too many permissions or the wrong permissions, that is best categorised here. &lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2016|language=en}}&lt;br /&gt;
Secure coding and configuration practices must be used on server-side of the mobile application. For specific vulnerability information, refer to the OWASP Web Top Ten or Cloud Top Ten projects.&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|year=2016|language=en}}&lt;br /&gt;
Because there are several platforms, each with hundreds or thousands of APIs, the examples in this section only scratch the surface of what is possible.'''&lt;br /&gt;
&lt;br /&gt;
'''App Local Storage Instead of Keychain'''&lt;br /&gt;
The iOS Keychain is a secure storage facility for both app and system data. On iOS, apps should use it to store any small data that has security significance (session keys, passwords, device enrolment data, etc.). A common mistake is to store such items in app local storage. Data stored in app local storage is available in unencrypted iTunes backups (e.g., on the user's computer). For some apps, that exposure is inappropriate. &lt;br /&gt;
&lt;br /&gt;
Below, you can see that there are many risks and vulnerabilities that you must mitigate in order to satisfy M1:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[[File:CloudTT_thum.png|border|400px|link=https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project]]     [[File:WebTT_thumb.png|border|400px|link=https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project]]&amp;lt;/center&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
=== The Worst Offenders ===&lt;br /&gt;
&lt;br /&gt;
Below is a list vulnerability types that OWASP sees most often within mobile applications:&lt;br /&gt;
&lt;br /&gt;
;Poor Web Services Hardening&lt;br /&gt;
: Logic flaws&lt;br /&gt;
:: [https://www.owasp.org/index.php/Testing_for_business_logic_(OWASP-BL-001) Testing for business logic flaws]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Business_Logic_Security_Cheat_Sheet Business Logic Security Cheat Sheet]&lt;br /&gt;
: Weak Authentication&lt;br /&gt;
:: [https://www.owasp.org/index.php/Top_10_2013-A2-Broken_Authentication_and_Session_Management OWASP Top Ten Broken Authentication Section]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Authentication_Cheat_Sheet Authentication Cheat Sheet]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Guide_to_Authentication Developers Guide for Authentication]&lt;br /&gt;
:: [https://www.owasp.org/index.php/Testing_for_authentication Testing for Authentication]&lt;br /&gt;
: Weak or no session management&lt;br /&gt;
: Session fixation&lt;br /&gt;
: Sensitive data transmitted using GET method&lt;br /&gt;
&lt;br /&gt;
; Insecure web server configurations&lt;br /&gt;
: Default content&lt;br /&gt;
: Administrative interfaces&lt;br /&gt;
; Injection (SQL, XSS, Command) on both web services and mobile-enabled websites&lt;br /&gt;
; Authentication flaws&lt;br /&gt;
; Session Management flaws&lt;br /&gt;
; Access control vulnerabilities&lt;br /&gt;
; Local and Remote File Includes&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Top_Ten OWASP Top Ten]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
* [http://cwe.mitre.org/ External References]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M2-Insecure_Data_Storage&amp;diff=226314</id>
		<title>Mobile Top 10 2016-M2-Insecure Data Storage</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M2-Insecure_Data_Storage&amp;diff=226314"/>
				<updated>2017-02-14T01:06:00Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M3-{{Mobile_Top_10_2016:ByTheNumbers               |3               |year=2016               |langua...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M3-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |3&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Mobile2016PrevLink&lt;br /&gt;
    |prev=M1-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |1&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
  &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Threats agents include the following: an adversary that has attained a lost/stolen mobile device; malware or another repackaged app acting on the adversary's behalf that executes on the mobile device.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;In the event that an adversary physically attains the mobile device, the adversary hooks up the mobile device to a computer with freely available software. These tools allow the adversary to see all third party application directories that often contain stored personally identifiable information (PII) or other sensitive information assets. An adversary may construct malware or modify a legitimate app to steal such information assets.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Insecure data storage vulnerabilities occur when development teams assume that users or malware will not have access to a mobile device's filesystem and subsequent sensitive information in data-stores on the device. Filesystems are easily accessible. Organizations should expect a malicious user or malware to inspect sensitive data stores. Rooting or jailbreaking a mobile device circumvents any encryption protections. When data is not protected properly, specialized tools are all that is needed to view application data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;This can result in data loss, in the best case for one user, and in the worst case for many users. It may also result in the following technical impacts: extraction of the app's sensitive information via mobile malware, modified apps or forensic tools.&lt;br /&gt;
&lt;br /&gt;
The nature of the business impact is highly dependent upon the nature of the information stolen. Insecure data may result in the following business impacts:&lt;br /&gt;
&lt;br /&gt;
* Identity theft;&lt;br /&gt;
* Privacy violation;&lt;br /&gt;
* Fraud;&lt;br /&gt;
* Reputation damage;&lt;br /&gt;
* External policy violation (PCI); or&lt;br /&gt;
* Material loss.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Insecure data storage vulnerabilities typically lead to the following business risks for the organization that owns the risk app:&lt;br /&gt;
&lt;br /&gt;
* Identity Theft&lt;br /&gt;
* Fraud&lt;br /&gt;
* Reputation Damage&lt;br /&gt;
* External Policy Violation (PCI); or&lt;br /&gt;
* Material Loss.&lt;br /&gt;
     &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=2|year=2016|language=en}}&lt;br /&gt;
This category insecure data storage and unintended data leakage. Data stored insecurely includes, but is not limited to, the following:&lt;br /&gt;
&lt;br /&gt;
* SQL databases;&lt;br /&gt;
* Log files;&lt;br /&gt;
* XML data stores ou manifest files;&lt;br /&gt;
* Binary data stores;&lt;br /&gt;
* Cookie stores;&lt;br /&gt;
* SD card;&lt;br /&gt;
* Cloud synced.&lt;br /&gt;
&lt;br /&gt;
Unintended data leakage includes, but is not limited to, vulnerabilities from:&lt;br /&gt;
&lt;br /&gt;
* The OS;&lt;br /&gt;
* Frameworks;&lt;br /&gt;
* Compiler environment;&lt;br /&gt;
* New hardware.&lt;br /&gt;
&lt;br /&gt;
This is obviously without a developer's knowledge. In mobile development specifically, this is most seen in undocumented, or under-documented, internal processes such as:&lt;br /&gt;
&lt;br /&gt;
* The way the OS caches data, images, key-presses, logging, and buffers;&lt;br /&gt;
* The way the development framework caches data, images, key-presses, logging, and buffers;&lt;br /&gt;
* The way or amount of data ad, analytic, social, or enablement frameworks cache data, images, key-presses, logging, and buffers.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=2|year=2016|language=en}}&lt;br /&gt;
It is important to threat model your mobile app, OS, platforms and frameworks to understand the information assets the app processes and how the APIs handle those assets. It is crucial to see how they handle the following types of features :&lt;br /&gt;
&lt;br /&gt;
* URL caching (both request and response);&lt;br /&gt;
* Keyboard press caching;&lt;br /&gt;
* Copy/Paste buffer caching;&lt;br /&gt;
* Application backgrounding;&lt;br /&gt;
* Logging;&lt;br /&gt;
* HTML5 data storage;&lt;br /&gt;
* Browser cookie objects;&lt;br /&gt;
* Analytics data sent to 3rd parties.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=2|year=2016|language=en}}&lt;br /&gt;
=== A Visual Example ===&lt;br /&gt;
&lt;br /&gt;
iGoat is a purposefully vulnerable mobile app for the security community to explore these types of vulnerabilities first hand. In the exercise below, we enter our credentials and log in to the fake bank app. Then, we navigate to the file system. Within the applications directory, we can see a database called “credentials.sqlite”. Exploring this database reveals that the application is storing our username and credentials (Jason:pleasedontstoremebro!) in plain text.&lt;br /&gt;
&lt;br /&gt;
[[Image:Screen%20Shot%202012-12-19%20at%206.34.23%20AM.png]] &lt;br /&gt;
[[Image:Screen%20Shot%202012-12-19%20at%206.44.51%20AM.png]] &lt;br /&gt;
[[Image:Screen%20Shot%202012-12-19%20at%2010.11.15%20AM.png]]&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=2|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/index.php/IOS_Developer_Cheat_Sheet OWASP ][https://www.owasp.org/index.php/IOS_Developer_Cheat_Sheet IOS Developer Cheat Sheet]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
* [http://source.android.com/tech/security/ Google Androids Developer Security Topics 1]&lt;br /&gt;
* [http://developer.android.com/training/articles/security-tips.html Google Androids Developer Security Topics 2]&lt;br /&gt;
* [https://developer.apple.com/library/mac/ Apple's Introduction to Secure Coding]&lt;br /&gt;
* [http://h30499.www3.hp.com/t5/Application-Security-Fortify-on/Exploring-The-OWASP-Mobile-Top-10-M1-Insecure-Data-Storage/ba-p/5904609 Fortify On Demand Blog - Exploring The OWASP Mobile Top 10: Insecure Data Storage]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M3-Insecure_Communication&amp;diff=226313</id>
		<title>Mobile Top 10 2016-M3-Insecure Communication</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M3-Insecure_Communication&amp;diff=226313"/>
				<updated>2017-02-14T01:05:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M4-{{Mobile_Top_10_2016:ByTheNumbers               |4               |year=2016               |langua...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M4-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |4&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Mobile2016PrevLink&lt;br /&gt;
    |prev=M2-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |2&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
  &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;When designing a mobile application, data is commonly exchanged in a client-server fashion. When the solution transmits its data, it must traverse the mobile device's carrier network and the internet. Threat agents might exploit vulnerabilities to intercept sensitive data while it's traveling across the wire. The following threat agents exist:&lt;br /&gt;
&lt;br /&gt;
* An adversary that shares your local network (compromised or monitored Wi-Fi);&lt;br /&gt;
* Carrier or network devices (routers, cell towers, proxy's, etc); or&lt;br /&gt;
* Malware on your mobile device.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The exploitabilty factor of monitoring a network for insecure communications ranges. Monitoring traffic over a carrier's network is harder than that of monitoring a local coffee shop's traffic. In general, targeted attacks are easier to perform. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Mobile applications frequently do not protect network traffic. They may use SSL/TLS during authentication but not elsewhere. This inconsistency leads to the risk of exposing data and session IDs to interception. The use of transport security does not mean the app has implemented it correctly. To detect basic flaws, observe the phone's network traffic. More subtle flaws require inspecting the design of the application and the applications configuration. &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;This flaw exposes an individual user's data and can lead to account theft. If the adversary intercepts an admin account, the entire site could be exposed. Poor SSL setup can also facilitate phishing and MITM attacks.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;At a minimum, interception of sensitive data through a communication channel will result in a privacy violation.&lt;br /&gt;
&lt;br /&gt;
The violation of a user's confidentiality may result in:&lt;br /&gt;
&lt;br /&gt;
* Identity theft;&lt;br /&gt;
* Fraud, or&lt;br /&gt;
* Reputational Damage.&lt;br /&gt;
     &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=3|year=2016|language=en}}&lt;br /&gt;
This risk covers all aspects of getting data from point A to point B, but doing it insecurely. It encompasses mobile-to-mobile communications, app-to-server communications, or mobile-to-something-else communications. This risk includes all communications technologies that a mobile device might use: TCP/IP, WiFi, Bluetooth/Bluetooth-LE, NFC, audio, infrared, GSM, 3G, SMS, etc.&lt;br /&gt;
&lt;br /&gt;
All the TLS communications issues go here. All the NFC, Bluetooth, and WiFi issues go here. &lt;br /&gt;
&lt;br /&gt;
The prominent characteristics include packaging up some kind of sensitive data and transmitting it into or out of the device. Some examples of sensitive data include encryption keys, passwords, private user information, account details, session tokens, documents, metadata, and binaries. The sensitive data can be coming to the device from a server, it can be coming from an app out to a server, or it might be going between the device and something else local (e.g., an NFC terminal or NFC card). The defining characteristic of this risk is the existence of two devices and some data passing between them.&lt;br /&gt;
&lt;br /&gt;
If the data is being stored locally in the device itself, that's #Insecure Data. If the session details are communicated securely (e.g., via a strong TLS connection) but the session identifer itself is bad (perhaps it is predictable, low entropy, etc.), then that's an #Insecure Authentication problem, not a communication problem. &lt;br /&gt;
&lt;br /&gt;
The usual risks of insecure communication are around data integrity, data confidentiality, and origin integrity. If the data can be changed while in transit, without the change being detectable (e.g., via a man-in-the-middle attack) then that is a good example of this risk. If confidential data can be exposed, learned, or derived by observing the communications as it happens (i.e., eavesdropping) or by recording the conversation as it happens and attacking it later (offline attack), that's also an insecure communication problem. Failing to properly setup and validate a TLS connection (e.g., certificate checking, weak ciphers, other TLS configuration problems) are all here in insecure communication. &lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=3|year=2016|language=en}}&lt;br /&gt;
=== General Best Practices ===&lt;br /&gt;
&lt;br /&gt;
* Assume that the network layer is not secure and is susceptible to eavesdropping.&lt;br /&gt;
* Apply SSL/TLS to transport channels that the mobile app will use to transmit sensitive information, session tokens, or other sensitive data to a backend API or web service.&lt;br /&gt;
* Account for outside entities like third-party analytics companies, social networks, etc. by using their SSL versions when an application runs a routine via the browser/webkit. Avoid mixed SSL sessions as they may expose the user’s session ID.&lt;br /&gt;
* Use strong, industry standard cipher suites with appropriate key lengths.&lt;br /&gt;
* Use certificates signed by a trusted CA provider.&lt;br /&gt;
* Never allow self-signed certificates, and consider certificate pinning for security conscious applications.&lt;br /&gt;
* Always require SSL chain verification.&lt;br /&gt;
* Only establish a secure connection after verifying the identity of the endpoint server using trusted certificates in the key chain.&lt;br /&gt;
* Alert users through the UI if the mobile app detects an invalid certificate.&lt;br /&gt;
* Do not send sensitive data over alternate channels (e.g, SMS, MMS, or notifications).&lt;br /&gt;
* If possible, apply a separate layer of encryption to any sensitive data before it is given to the SSL channel. In the event that future vulnerabilities are discovered in the SSL implementation, the encrypted data will provide a secondary defense against confidentiality violation.&lt;br /&gt;
&lt;br /&gt;
Newer threats allow an adversary to eavesdrop on sensitive traffic by intercepting the traffic within the mobile device just before the mobile device's SSL library encrypts and transmits the network traffic to the destination server. See M10 for more information on the nature of this risk.&lt;br /&gt;
&lt;br /&gt;
=== iOS Specific Best Practices ===&lt;br /&gt;
&lt;br /&gt;
Default classes in the latest version of iOS handle SSL cipher strength negotiation very well. Trouble comes when developers temporarily add code to bypass these defaults to accommodate development hurdles. In addition to the above general practices:&lt;br /&gt;
&lt;br /&gt;
* Ensure that certificates are valid and fail closed.&lt;br /&gt;
* When using CFNetwork, consider using the Secure Transport API to designate trusted client certificates. In almost all situations, NSStreamSocketSecurityLevelTLSv1 should be used for higher standard cipher strength.&lt;br /&gt;
* After development, ensure all NSURL calls (or wrappers of NSURL) do not allow self signed or invalid certificates such as the NSURL class method setAllowsAnyHTTPSCertificate.&lt;br /&gt;
* Consider using certificate pinning by doing the following: export your certificate, include it in your app bundle, and anchor it to your trust object. Using the NSURL method connection:willSendRequestForAuthenticationChallenge: will now accept your cert.&lt;br /&gt;
&lt;br /&gt;
=== Android Specific Best Practices ===&lt;br /&gt;
&lt;br /&gt;
* Remove all code after the development cycle that may allow the application to accept all certificates such as org.apache.http.conn.ssl.AllowAllHostnameVerifier or SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER. These are equivalent to trusting all certificates.&lt;br /&gt;
* If using a class which extends SSLSocketFactory, make sure checkServerTrusted method is properly implemented so that server certificate is correctly checked.&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=3|year=2016|language=en}}&lt;br /&gt;
There are a few common scenarios that penetration testers frequently discover when inspecting a mobile app's communication security:&lt;br /&gt;
&lt;br /&gt;
'''Lack of certificate inspection'''&lt;br /&gt;
The mobile app and an endpoint successfully connect and perform a TLS handshake to establish a secure channel. However, the mobile app fails to inspect the certificate offered by the server and the mobile app unconditionally accepts any certificate offered to it by the server. This destroys any mutual authentication capability between the mobile app and the endpoint. The mobile app is susceptible to man-in-the-middle attacks through a TLS proxy.&lt;br /&gt;
&lt;br /&gt;
'''Weak handshake negotiation'''&lt;br /&gt;
The mobile app and an endpoint successfully connect and negotiate a cipher suite as part of the connection handshake. The client successfully negotiates with the server to use a weak cipher suite that results in weak encryption that can be easily decrypted by the adversary. This jeopardizes the confidentiality of the channel between the mobile app and the endpoint.&lt;br /&gt;
&lt;br /&gt;
'''Privacy information leakage'''&lt;br /&gt;
The mobile app transmits personally identifiable information to an endpoint via non-secure channels instead of over SSL. This jeopardizes the confidentiality of any privacy-related data between the mobile app and the endpoint.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=3|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/ References Go Here]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
* [http://cwe.mitre.org/ External References]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M4-Insecure_Authentication&amp;diff=226312</id>
		<title>Mobile Top 10 2016-M4-Insecure Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M4-Insecure_Authentication&amp;diff=226312"/>
				<updated>2017-02-14T01:05:43Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M5-{{Mobile_Top_10_2016:ByTheNumbers               |5               |year=2016               |langua...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M5-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |5&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Mobile2016PrevLink&lt;br /&gt;
    |prev=M3-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |3&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
	&amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Threat agents that exploit authentication vulnerabilities typically do so through automated attacks that use available or custom-built tools. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Once the adversary understands how the authentication scheme is vulnerable, they fake or bypass authentication by submitting service requests to the mobile app's backend server and bypass any direct interaction with the mobile app. This submission process is typically done via mobile malware within the device or botnets owned by the attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Poor or missing authentication schemes allow an adversary to anonymously execute functionality within the mobile app or backend server used by the mobile app. Weaker authentication for mobile apps is fairly prevalent due to a mobile device's input form factor. The form factor highly encourages short passwords that are often purely based on 4-digit PINs.&lt;br /&gt;
&lt;br /&gt;
Authentication requirements for mobile apps can be quite different from traditional web authentication schemes due to availability requirements.&lt;br /&gt;
&lt;br /&gt;
In traditional web apps, users are expected to be online and authenticate in real-time with a backend server. Throughout their session, there is a reasonable expectation that they will have continuous access to the Internet.&lt;br /&gt;
&lt;br /&gt;
In mobile apps, users are not expected to be online at all times during their session. Mobile internet connections are much less reliable or predictable than traditional web connections. Hence, mobile apps may have uptime requirements that require offline authentication. This offline requirement can have profound ramifications on things that developers must consider when implementing mobile authentication.&lt;br /&gt;
&lt;br /&gt;
To detect poor authentication schemes, testers can perform binary attacks against the mobile app while it is in 'offline' mode. Through the attack, the tester will force the app to bypass offline authentication and then execute functionality that should require offline authentication (for more information on binary attacks, see M10). As well, testers should try to execute any backend server functionality anonymously by removing any session tokens from any POST/GET requests for the mobile app functionality.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The technical impact of poor authentication is that the solution is unable to identify the user performing an action request. Immediately, the solution will be unable to log or audit user activity because the identity of the user cannot be established. This will contribute to an inability to detect the source of an attack, the nature of any underlying exploits, or how to prevent future attacks.&lt;br /&gt;
&lt;br /&gt;
Authentication failures may expose underlying authorization failures as well. When authentication controls fail, the solution is unable to verify the user's identity. This identity is linked to a user's role and associated permissions. If an attacker is able to anonymously execute sensitive functionality, it highlights that the underlying code is not verifying the permissions of the user issuing the request for the action. Hence, anonymous execution of code highlights failures in both authentication and authorization controls.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The business impact of poor authentication will typically result in the following at a minimum:&lt;br /&gt;
&lt;br /&gt;
* Reputational Damage&lt;br /&gt;
* Information Theft; or&lt;br /&gt;
* Unauthorized Access to Data.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=4|year=2016|language=en}}&lt;br /&gt;
There are many different ways that a mobile app may suffer from insecure authentication:&lt;br /&gt;
&lt;br /&gt;
* If the mobile app is able to anonymously execute a backend API service request without providing an access token, this application suffers from insecure authentication;&lt;br /&gt;
* If the mobile app stores any passwords or shared secrets locally on the device, it most likely suffers from insecure authentication;&lt;br /&gt;
* If the mobile app uses a weak password policy to simplify entering a password, it suffers from insecure authentication; or&lt;br /&gt;
* If the mobile app uses a feature like TouchID, it suffers from insecure authentication.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=4|year=2016|language=en}}&lt;br /&gt;
&lt;br /&gt;
=== Avoid Weak Patterns ===&lt;br /&gt;
Avoid the following Insecure Mobile Application Authentication Design Patterns:&lt;br /&gt;
&lt;br /&gt;
* If you are porting a web application to its mobile equivalent, authentication requirements of mobile applications should match that of the web application component. Therefore, it should not be possible to authenticate with less authentication factors than the web browser;&lt;br /&gt;
&lt;br /&gt;
* Authenticating a user locally can lead to client-side bypass vulnerabilities. If the application stores data locally, the authentication routine can be bypassed on jailbroken devices through run-time manipulation or modification of the binary. If there is a compelling business requirement for offline authentication, see M10 for additional guidance on preventing binary attacks against the mobile app;&lt;br /&gt;
&lt;br /&gt;
* Where possible, ensure that all authentication requests are performed server-side. Upon successful authentication, application data will be loaded onto the mobile device. This will ensure that application data will only be available after successful authentication;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* If client-side storage of data is required, the data will need to be encrypted using an encryption key that is securely derived from the user’s login credentials. This will ensure that the stored application data will only be accessible upon successfully entering the correct credentials. There are additional risks that the data will be decrypted via binary attacks. See M9 for additional guidance on preventing binary attacks that lead to local data theft;&lt;br /&gt;
&lt;br /&gt;
* Persistent authentication (Remember Me) functionality implemented within mobile applications should never store a user’s password on the device;&lt;br /&gt;
&lt;br /&gt;
* Ideally, mobile applications should utilize a device-specific authentication token that can be revoked within the mobile application by the user. This will ensure that the app can mitigate unauthorized access from a stolen/lost device;&lt;br /&gt;
&lt;br /&gt;
* Do not use any spoof-able values for authenticating a user. This includes device identifiers or geo-location;&lt;br /&gt;
&lt;br /&gt;
* Persistent authentication within mobile applications should be implemented as opt-in and not be enabled by default;&lt;br /&gt;
&lt;br /&gt;
* If possible, do not allow users to provide 4-digit PIN numbers for authentication passwords.&lt;br /&gt;
&lt;br /&gt;
=== Reinforce Authentication ===&lt;br /&gt;
&lt;br /&gt;
* Developers should assume all client-side authorization and authentication controls can be bypassed by malicious users. Authorization and authentication controls must be re-enforced on the server-side whenever possible.&lt;br /&gt;
&lt;br /&gt;
* Due to offline usage requirements, mobile apps may be required to perform local authentication or authorization checks within the mobile app's code. If this is the case, developers should instrument local integrity checks within their code to detect any unauthorized code changes. See M9 for more information about detecting and reacting to binary attacks. &lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=4|year=2016|language=en}}&lt;br /&gt;
The following scenarios showcase weak authentication or authorization controls in mobile apps:&lt;br /&gt;
&lt;br /&gt;
'''Scenario #1:''' Hidden Service Requests:&lt;br /&gt;
Developers assume that only authenticated users will be able to generate a service request that the mobile app submits to its backend for processing. During the processing of the request, the server code does not verify that the incoming request is associated with a known user. Hence, adversaries submit service requests to the back-end service and anonymously execute functionality that affects legitimate users of the solution.&lt;br /&gt;
&lt;br /&gt;
'''Scenario #2:''' Interface Reliance:&lt;br /&gt;
Developers assume that only authorized users will be able to see the existence of a particular function on their mobile app. Hence, they expect that only legitimately authorized users will be able to issue the request for the service from their mobile device. Back-end code that processes the request does not bother to verify that the identity associated with the request is entitled to execute the service. Hence, adversaries are able to perform remote administrative functionality using fairly low-privilege user accounts. &lt;br /&gt;
&lt;br /&gt;
'''Scenario #3:''' Usability Requirements:&lt;br /&gt;
Due to usability requirements, mobile apps allow for passwords that are 4 digits long. Server code correctly stores a hashed version of the password. However, due to the severely short length of the password, an adversary will be able to quickly deduce the original passwords using rainbow hash tables. If the password file (or data store) on the server is compromised, an adversary will be able to quickly deduce users' passwords. &lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=4|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/ OWASP References Go Here]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
* [http://cwe.mitre.org/ External References]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M5-Insufficient_Cryptography&amp;diff=226311</id>
		<title>Mobile Top 10 2016-M5-Insufficient Cryptography</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M5-Insufficient_Cryptography&amp;diff=226311"/>
				<updated>2017-02-14T01:05:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M6-{{Mobile_Top_10_2016:ByTheNumbers               |6               |year=2016               |langua...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M6-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |6&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Mobile2016PrevLink&lt;br /&gt;
    |prev=M4-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |4&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
	&amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Threat agents include the following: anyone with physical access to data that has been encrypted improperly, or mobile malware acting on an adversary's behalf.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Attack vectors include the following: decryption of data via physical access to the device or network traffic capture, or malicious apps on the device with access to the encrypted data.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;In order to exploit this weakness, an adversary must successfully return encrypted code or sensitive data to its original unencrypted form due to weak encryption algorithms or flaws within the encryption process.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;This vulnerability will result in the unauthorized retrieval of sensitive information from the mobile device.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;This vulnerability can have a number of different business impacts. Typically, broken cryptography will result in the following:&lt;br /&gt;
&lt;br /&gt;
* Privacy Violations;&lt;br /&gt;
* Information Theft;&lt;br /&gt;
* Code Theft;&lt;br /&gt;
* Intellectual Property Theft; or&lt;br /&gt;
* Reputational Damage.    &lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=5|year=2016|language=en}}&lt;br /&gt;
Insecure use of cryptography is common in most mobile apps that leverage encryption. There are two fundamental ways that broken cryptography is manifested within mobile apps. First, the mobile app may use a process behind the encryption / decryption that is fundamentally flawed and can be exploited by the adversary to decrypt sensitive data. Second, the mobile app may implement or leverage an encryption / decryption algorithm that is weak in nature and can be directly decrypted by the adversary. The following subsections explore both of these scenarios in more depth:&lt;br /&gt;
&lt;br /&gt;
== Reliance Upon Built-In Code Encryption Processes ==&lt;br /&gt;
&lt;br /&gt;
By default, iOS applications are protected (in theory) from reverse engineering via code encryption. The iOS security model requires that apps be encrypted and signed by trustworthy sources in order to execute in non-jailbroken environments. Upon start-up, the iOS app loader will decrypt the app in memory and proceed to execute the code after its signature has been verified by iOS. This feature, in theory, prevents an attacker from conducting binary attacks against an iOS mobile app.&lt;br /&gt;
&lt;br /&gt;
Using freely available tools like ClutchMod or GBD, an adversary will download the encrypted app onto their jailbroken device and take a snapshot of the decrypted app once the iOS loader loads it into memory and decrypts it (just before the loader kicks off execution). Once the adversary takes the snapshot and stores it on disk, the adversary can use tools like IDA Pro or Hopper to easily perform static / dynamic analysis of the app and conduct further binary attacks.&lt;br /&gt;
&lt;br /&gt;
Bypassing built-in code encryption algorithms is trivial at best. Always assume that an adversary will be able to bypass any built-in code encryption offered by the underlying mobile OS.&lt;br /&gt;
For more information about additional steps you can take to provide additional layers of reverse engineering prevention, see M9.&lt;br /&gt;
&lt;br /&gt;
=== Poor Key Management Processes === &lt;br /&gt;
&lt;br /&gt;
The best algorithms don't matter if you mishandle your keys. Many make the mistake of using the correct encryption algorithm, but implementing their own protocol for employing it. Some examples of problems here include:&lt;br /&gt;
&lt;br /&gt;
* Including the keys in the same attacker-readable directory as the encrypted content;&lt;br /&gt;
* Making the keys otherwise available to the attacker;&lt;br /&gt;
* Avoid the use of hardcoded keys within your binary; and&lt;br /&gt;
* Keys may be intercepted via binary attacks. See M10 for more information on preventing binary attacks.&lt;br /&gt;
&lt;br /&gt;
=== Creation and Use of Custom Encryption Protocols ===&lt;br /&gt;
&lt;br /&gt;
There is no easier way to mishandle encryption--mobile or otherwise--than to try to create and use your own encryption algorithms or protocols.&lt;br /&gt;
&lt;br /&gt;
Always use modern algorithms that are accepted as strong by the security community, and whenever possible leverage the state of the art encryption APIs within your mobile platform. Binary attacks may result in adversary identifying the common libraries you have used along with any hardcoded keys in the binary. In cases of very high security requirements around encryption, you should strongly consider the use of whitebox cryptography. See M10 for more information on preventing binary attacks that could lead to the exploitation of common libraries.&lt;br /&gt;
&lt;br /&gt;
=== Use of Insecure and/or Deprecated Algorithms ===&lt;br /&gt;
&lt;br /&gt;
Many cryptographic algorithms and protocols should not be used because they have been shown to have significant weaknesses or are otherwise insufficient for modern security requirements. These include:&lt;br /&gt;
&lt;br /&gt;
* RC2&lt;br /&gt;
* MD4&lt;br /&gt;
* MD5&lt;br /&gt;
* SHA1&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=5|year=2016|language=en}}&lt;br /&gt;
It is best to do the following when handling sensitive data:&lt;br /&gt;
* Avoid the storage of any sensitive data on a mobile device where possible.&lt;br /&gt;
* Apply cryptographic standards that will withstand the test of time for at least 10 years into the future; and&lt;br /&gt;
* Follow the NIST guidelines on recommended algorithms (see external references).&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=5|year=2016|language=en}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=5|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/index.php/Cryptographic_Storage_Cheat_Sheet OWASP Cryptographic Storage Cheat Sheet]&lt;br /&gt;
* [https://www.owasp.org/index.php/Key_Management_Cheat_Sheet OWASP Key Management Cheat Sheet]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
* [http://csrc.nist.gov/publications/drafts/800-175/sp800-175b_draft.pdf NIST Encryption Guidelines]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M6-Insecure_Authorization&amp;diff=226310</id>
		<title>Mobile Top 10 2016-M6-Insecure Authorization</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M6-Insecure_Authorization&amp;diff=226310"/>
				<updated>2017-02-14T01:05:19Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M7-{{Mobile_Top_10_2016:ByTheNumbers               |7               |year=2016               |langua...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M7-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |7&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Mobile2016PrevLink&lt;br /&gt;
    |prev=M5-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |5&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
	&amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Threat agents that exploit authorization vulnerabilities typically do so through automated attacks that use available or custom-built tools. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Once the adversary understands how the authorization scheme is vulnerable, they login to the application as a legitimate user.  They successfully pass the authentication control. Once past authentication, they typically force-browse to a vulnerable endpoint to execute administrative functionality. This submission process is typically done via mobile malware within the device or botnets owned by the attacker.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;To test for poor authorization schemes, testers can perform binary attacks against the mobile app and try to execute privileged functionality that should only be executable with a user of higher privilege while the mobile app is in 'offline' mode (for more information on binary attacks, see M9 and M10). As well, testers should try to execute any privileged functionality using a low-privilege session token within the corresponding POST/GET requests for the sensitive functionality to the backend server.Poor or missing authorization schemes allow an adversary to execute functionality they should not be entitled to using an authenticated but lower-privilege user of the mobile app. Authorization requirements are more vulnerable when making authorization decisions within the mobile device instead of through a remote server. This may be a requirement due to mobile requirements of offline usability.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The technical impact of poor authorization is similar in nature to the technical impact of poor authentication. The technical impact can be wide ranging in nature and dependent upon the nature of the over-privileged functionality that is executed. For example, over-privileged execution of remote or local administration functionality may result in destruction of systems or access to sensitive information.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;In the event that a user (anonymous or verified) is able to execute over-privileged functionality, the business may experience the following impacts:&lt;br /&gt;
&lt;br /&gt;
* Reputational Damage;&lt;br /&gt;
* Fraud; or&lt;br /&gt;
* Information Theft.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=6|year=2016|language=en}}&lt;br /&gt;
It is important to recognize the difference between authentication and authorization.  Authentication is the act of identifying an individual.  Authorization is the act of checking that the identified individual has the permissions necessary to perform the act.  The two are closely related as authorization checks should always immediately follow authentication of the an incoming request from a mobile device.&lt;br /&gt;
&lt;br /&gt;
If an organization fails to authenticate and individual before executing an API endpoint requested from a mobile device, then the code automatically suffers from insecure authorization as well.  It is essentially impossible for authorization checks to occur on an incoming request when the caller's identity is not established.&lt;br /&gt;
&lt;br /&gt;
There are a few easy rules to follow when trying to determine if a mobile endpoint is suffering from insecure authorization:&lt;br /&gt;
&lt;br /&gt;
* '''Presence of Insecure Direct Object Reference (IDOR) vulnerabilities''' - If you are seeing an Insecure Direct Object Reference Vulnerability (IDOR), the code is most likely not performing a valid authorization check; and&lt;br /&gt;
&lt;br /&gt;
* '''Hidden Endpoints''' - Typically, developers do not perform authorization checks on backend hidden functionality as they assume the hidden functionality will only be seen by someone in the right role;&lt;br /&gt;
&lt;br /&gt;
* '''User Role or Permission Transmissions''' - If the mobile app is transmitting the user's roles or permissions to a backend system as part of a request, it is suffering from insecure authorization.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=6|year=2016|language=en}}&lt;br /&gt;
In order to avoid insecure authorization checks, do the following:&lt;br /&gt;
&lt;br /&gt;
* Verify the roles and permissions of the authenticated user using only information contained in backend systems.  Avoid relying on any roles or permission information that comes from the mobile device itself;&lt;br /&gt;
&lt;br /&gt;
* Backend code should independently verify that any incoming identifiers associated with a request (operands of a requested operation) that come along with the identify match up and belong to the incoming identity;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=6|year=2016|language=en}}&lt;br /&gt;
'''Scenario #1:''' Insecure Direct Object Reference:&lt;br /&gt;
&lt;br /&gt;
A user makes an API endpoint request to a backend REST API that includes an actor ID and an oAuth bearer token. The user includes their actor ID as part of the incoming URL and includes the access token as a standard header in the request.  The backend verifies the presence of the bearer token but fails to validate the actor ID associated with the bearer token.  As a result, the user can tweak the actor ID and attain account information of other users as part of the REST API request.&lt;br /&gt;
&lt;br /&gt;
'''Scenario #2:''' Transmission of LDAP roles:&lt;br /&gt;
&lt;br /&gt;
A user makes an API endpoint request to a backend REST API that includes a standard oAuth bearer token along with a header that includes a list of LDAP groups that the user belongs to.  The backend request validates the bearer token and then inspects the incoming LDAP groups for the right group membership before continuing on to the sensitive functionality.  However, the backend system does not perform an independent validation of LDAP group membership and instead relies upon the incoming LDAP information coming from the user.  The user can tweak the incoming header and report to be a member of any LDAP group arbitrarily and perform administrative functionality.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=6|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/ References Go Here]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
* [http://cwe.mitre.org/ External References]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M7-Poor_Code_Quality&amp;diff=226309</id>
		<title>Mobile Top 10 2016-M7-Poor Code Quality</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M7-Poor_Code_Quality&amp;diff=226309"/>
				<updated>2017-02-14T01:05:09Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M8-{{Mobile_Top_10_2016:ByTheNumbers               |8               |year=2016               |langua...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M8-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |8&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Mobile2016PrevLink&lt;br /&gt;
    |prev=M6-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |6&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=3|prevalence=2|detectability=3|impact=2|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
	&amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Threat Agents include entities that can pass untrusted inputs to method calls made within mobile code. These types of issues are not necessarily security issues in and of themselves but lead to security vulnerabilities.  For example, buffer overflows within older versions of Safari (a poor code quality vulnerability) led to high risk drive-by Jailbreak attacks. Poor code-quality issues are typically exploited via malware or phishing scams.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;An attacker will typically exploit vulnerabilities in this category by supplying carefully crafted inputs to the victim.  These inputs are passed onto code that resides within the mobile device where exploitation takes place.  Typical types of attacks will exploit memory leaks and buffer overflows.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Code quality issues are fairly prevalent within most mobile code.  The good news is that most code quality issues are fairly benign and result in bad programming practice. It is typically difficult to detect these types of issues through manual code review. Instead, attackers will use third-party tools that perform static analysis or perform fuzzing.  These types of tools will typically identify memory leaks, buffer overflows, and other less severe issues that result in bad programming practice. Hackers with extreme low-level knowledge and expertise are able to effectively exploit these types of issues. The typical primary goal is to execute foreign code within the mobile code's address space.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Most exploitations that fall into this category result in foreign code execution or denial of service on remote server endpoints (and not the mobile device itself). However, in th event that buffer overflows/overruns do exist within the mobile device and the input can be derived from an external party, this could have a severely high technical impact and should be remediated.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The business impact from this category of vulnerabilities varies greatly, depending upon the nature of the exploit.  Poor code quality issues that result in remote code execution could lead to the following business impacts:&lt;br /&gt;
&lt;br /&gt;
* Information Theft;&lt;br /&gt;
* Reputational Damage;&lt;br /&gt;
* Intellectual Property Theft&lt;br /&gt;
&lt;br /&gt;
Other less severe technical issues that fall into this category may lead to degradations in performance, memory usage, or poor front-end architecture.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=7|year=2016|language=en}}&lt;br /&gt;
This is the catch-all for code-level implementation problems in the mobile client. That's distinct from server-side coding mistakes. This captures the risks that come from vulnerabilities like buffer overflows, format string vulnerabilities, and various other code-level mistakes where the solution is to rewrite some code that's running on the mobile device.&lt;br /&gt;
&lt;br /&gt;
This is distinct from Improper Platform Usage because it usually refers to the programming language itself (e.g., Java, Swift, Objective C, JavaScript). A buffer overflow in C or a DOM-based XSS in a Webview mobile app would be code quality issues.&lt;br /&gt;
&lt;br /&gt;
The key characteristic of this risk is that it's code executing on the mobile device and the code needs to be changed in a fairly localised way. Fixing most risks requires code changes, but in the code quality case the risk comes from using the wrong API, using an API insecurely, using insecure language constructs, or some other code-level issue. Importantly: this is not code running on the server. This is a risk that captures bad code that executes on the mobile device itself. &lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=7|year=2016|language=en}}&lt;br /&gt;
In general, code quality issues can be avoided by doing the following:&lt;br /&gt;
&lt;br /&gt;
* Maintain consistent coding patterns that everyone in the organization agrees upon;&lt;br /&gt;
* Write code that is easy to read and well-documented;&lt;br /&gt;
* When using buffers, always validate that the the lengths of any incoming buffer data will not exceed the length of the target buffer;&lt;br /&gt;
* Via automation, identify buffer overflows and memory leaks through the use of third-party static analysis tools; and&lt;br /&gt;
* Prioritize solving buffer overflows and memory leaks over other 'code quality' issues.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=7|year=2016|language=en}}&lt;br /&gt;
'''Scenario #1:''' Buffer Overflow example:&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:ExampleBeginTemplate|year=2016}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&lt;br /&gt;
include &amp;lt;stdio.h&amp;gt;&lt;br /&gt;
  int main(int argc, char **argv)&lt;br /&gt;
     {&lt;br /&gt;
     char buf[8]; // buffer for eight characters&lt;br /&gt;
     gets(buf); // read from stdio (sensitive function!)&lt;br /&gt;
     printf(&amp;quot;%s\n&amp;quot;, buf); // print out data stored in buf&lt;br /&gt;
     return 0; // 0 as return value&lt;br /&gt;
     }&lt;br /&gt;
  &amp;lt;/span&amp;gt;&lt;br /&gt;
{{Mobile_Top_10_2016:ExampleEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
In this example, taken from [https://www.owasp.org/index.php/Buffer_overflow_attack this] page, we should avoid the use of the &amp;lt;i&amp;gt;gets&amp;lt;/i&amp;gt; function to avoid a buffer overflow. This is an example of what most static analysis tools will report as a code quality issue.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=7|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/index.php/Buffer_overflow_attack Buffer Overflow Examples]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
* [http://cwe.mitre.org/ External References]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M8-Code_Tampering&amp;diff=226308</id>
		<title>Mobile Top 10 2016-M8-Code Tampering</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M8-Code_Tampering&amp;diff=226308"/>
				<updated>2017-02-14T01:04:58Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M9-{{Mobile_Top_10_2016:ByTheNumbers               |9               |year=2016               |langua...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M9-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |9&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Mobile2016PrevLink&lt;br /&gt;
    |prev=M7-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |7&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
	&amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt; Typically, an attacker will exploit code modification via malicious forms of the apps hosted in third-party app stores. The attacker may also trick the user into installing the app via phishing attacks.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Typically, an attacker will do the following things to exploit this category:&lt;br /&gt;
&lt;br /&gt;
* Make direct binary changes to the application package's core binary&lt;br /&gt;
* Make direct binary changes to the resources within the applicaiton's package&lt;br /&gt;
* Redirect or replace system APIs to intercept and execute foreign code that is malicious&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Modified forms of applications are surprisingly more common than you think.  There is an entire security industry built around detecting and removing unauthorized versions of mobile apps within app stores. Depending upon the approach taken to solving the problem of detecting code modification, organizations can have limited to highly successful ways of detecting unauthorized versions of code in the wild.&lt;br /&gt;
&lt;br /&gt;
This category covers binary patching, local resource modification, method hooking, method swizzling, and dynamic memory modification.&lt;br /&gt;
&lt;br /&gt;
Once the application is delivered to the mobile device, the code and data resources are resident there. An attacker can either directly modify the code, change the contents of memory dynamically, change or replace the system APIs that the application uses, or modify the application's data and resources. This can provide the attacker a direct method of subverting the intended use of the software for personal or monetary gain.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The impact from code modification can be wide ranging in nature, depending upon the nature of the modification itself. Typical types of impacts include the following:&lt;br /&gt;
&lt;br /&gt;
* Unauthorized new features;&lt;br /&gt;
* Identity theft; or&lt;br /&gt;
* Fraud.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The business impact from code modification typically results in the following:&lt;br /&gt;
&lt;br /&gt;
* Revenue loss due to piracy; or&lt;br /&gt;
* Reputational damage.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=8|year=2016|language=en}} &lt;br /&gt;
&lt;br /&gt;
Technically, all mobile code is vulnerable to code tampering. Mobile code runs within an environment that is not under the control of the organization producing the code. At the same time, there are plenty of different ways of altering the environment in which that code runs. These changes allow an adversary to tinker with the code and modify it at will.&lt;br /&gt;
&lt;br /&gt;
Although mobile code is inherently vulnerable, it is important to ask yourself if it is worth detecting and trying to prevent unauthorized code modification.  Apps written for certain business verticals (gaming for example) are much more vulnerable to the impacts of code modification than others (hospitality for example).  As such, it is critical to consider the business impact before deciding whether or not to address this risk.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=8|year=2016|language=en}}&lt;br /&gt;
The mobile app must be able to detect at runtime that code has been added or changed from what it knows about its integrity at compile time. The app must be able to react appropriately at runtime to a code integrity violation.&lt;br /&gt;
&lt;br /&gt;
The remediation strategies for this type of risk is outlined in more technical detail within the [https://www.owasp.org/index.php/OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project OWASP Reverse Engineering and Code Modification Prevention Project].&lt;br /&gt;
&lt;br /&gt;
=== Android Root Detection ===&lt;br /&gt;
&lt;br /&gt;
Typically, an app that has been modified will execute within a Jailbroken or rooted environment.  As such, it is reasonable to try and detect these types of compromised environments at runtime and react accordingly (report to the server or shutdown).  There are a few common ways to detect a rooted Android device:&lt;br /&gt;
Check for test-keys&lt;br /&gt;
&lt;br /&gt;
* Check to see if build.prop includes the line ro.build.tags=test-keys indicating a developer build or unofficial ROM&lt;br /&gt;
&lt;br /&gt;
Check for OTA certificates&lt;br /&gt;
&lt;br /&gt;
* Check to see if the file /etc/security/otacerts.zip exists&lt;br /&gt;
&lt;br /&gt;
Check for several known rooted apk's&lt;br /&gt;
&lt;br /&gt;
* com.noshufou.android.su&lt;br /&gt;
* com.thirdparty.superuser&lt;br /&gt;
* eu.chainfire.supersu&lt;br /&gt;
* com.koushikdutta.superuser&lt;br /&gt;
&lt;br /&gt;
Check for SU binaries&lt;br /&gt;
&lt;br /&gt;
* /system/bin/su&lt;br /&gt;
* /system/xbin/su&lt;br /&gt;
* /sbin/su&lt;br /&gt;
* /system/su&lt;br /&gt;
* /system/bin/.ext/.su&lt;br /&gt;
&lt;br /&gt;
Attempt SU command directly&lt;br /&gt;
&lt;br /&gt;
* Attempt the to run the command su and check the id of the current user, if it returns 0 then the su command has been successful&lt;br /&gt;
&lt;br /&gt;
=== iOS Jailbreak Detection ===&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=8|year=2016|language=en}}&lt;br /&gt;
There are a number of counterfeit applications that are available across the app stores. Some of these contain malware payloads. Many of the modified apps contain modified forms of the original core binary and associated resources.  The attacker re-packages these as a new application and released them into third-party stores.&lt;br /&gt;
&lt;br /&gt;
'''Scenario #1:''':&lt;br /&gt;
&lt;br /&gt;
Games are a particularly popular target to attack using this method.  The attacker will attract people that are not interested in paying for any freemium features of the game. Within the code, the attacker short-circuits conditional jumps that detect whether an in-application purchase is successful. This bypass allows the victim to attain game artifacts or new abilities without paying for them. The attacker has also inserted spyware that will steal the identity of the user.&lt;br /&gt;
&lt;br /&gt;
'''Scenario #2:''':&lt;br /&gt;
&lt;br /&gt;
Banking apps are another popular target to attack.  These apps typically process sensitive information that will be useful to an attacker.  An attacker could create a counterfeit version of the app that transmits the user's personally identifiable information (PII) along with username/password to a third-party site.  This is reminiscent of the desktop equivalent of Zeus malware.  This typically results in fraud against the bank.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=8|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project OWASP Reverse Engineering and Code Modification Prevention Project]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem1&amp;quot;&amp;gt;[1] Arxan Research: [https://www.arxan.com/assets/1/7/State_of_Security_in_the_App_Economy_Report_Vol._2.pdf State of Security in the App Economy, Volume 2], November 2013:&lt;br /&gt;
:''“Adversaries have hacked 78 percent of the top 100 paid Android and iOS apps in 2013.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem2&amp;quot;&amp;gt;[2] HP Research: [http://www8.hp.com/us/en/hp-news/press-release.html?id=1528865#.UuwZFPZvDi5 HP Research Reveals Nine out of 10 Mobile Applications Vulnerable to Attack], 18 November 2013:&lt;br /&gt;
:''&amp;quot;86 percent of applications tested lacked binary hardening, leaving applications vulnerable to information disclosure, buffer overflows and poor performance. To ensure security throughout the life cycle of the application, it is essential to build in the best security practices from conception.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem3&amp;quot;&amp;gt;[3] North Carolina State University: [http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND12.pdf Dissecting Android Malware: Characterization and Evolution], 7 September 2011:&lt;br /&gt;
:''“Our results show that 86.0% of them (Android Malware) repackage legitimate apps to include malicious payloads; 36.7% contain platform-level exploits to escalate privilege; 93.0% exhibit the bot-like capability.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem4&amp;quot;&amp;gt;[4] Tech Hive: [http://www.techhive.com/article/249310/apple_pulls_ripoff_apps_from_its_walled_garden.html Apple Pulls Ripoff Apps from its Walled Garden]Feb 4th, 2012:&lt;br /&gt;
:''“While Apple is known for screening apps before they are allowed to sprout up in its walled garden, clearly fake apps do get in. Once they do, getting them out depends on developers who raise a fuss.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem5&amp;quot;&amp;gt;[5] Tech Crunch: [http://techcrunch.com/2014/01/02/developer-spams-google-play-with-ripoffs-of-well-known-apps-again/ Developer Spams Google Play With RipOffs of Well-Known Apps… Again], January 2 2014:&lt;br /&gt;
:''“It’s not uncommon to search the Google Play app store and find a number of knock-off or “fake” apps aiming to trick unsuspecting searchers into downloading them over the real thing.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem6&amp;quot;&amp;gt;[6] Extreme Tech: [http://www.extremetech.com/mobile/153849-chinese-app-store-offers-pirated-ios-apps-without-the-need-to-jailbreak Chinese App Store Offers Pirated iOS Apps Without the Need To Jailbreak], April 19 2013:&lt;br /&gt;
:''“The site offers apps for free that would otherwise cost money, including big-name titles.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem7&amp;quot;&amp;gt;[7] OWASP: [https://www.owasp.org/index.php/Architectural_Principles_That_Prevent_Code_Modification_or_Reverse_Engineering Architectural Principles That Prevent Code Modification or Reverse Engineering], January 11th 2014.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem8&amp;quot;&amp;gt;[8] Gartner report: Avoiding Mobile App Development Security Pitfalls, 24 May 2013:&lt;br /&gt;
:''&amp;quot;For critical applications, such as transactional ones and sensitive enterprise applications, hardening should be used.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem9&amp;quot;&amp;gt;[9] Gartner report: Emerging Technology Analysis:  Mobile Application Shielding, March 26th, 2013:&lt;br /&gt;
:''&amp;quot;As more regulated and sensitive data applications move to mobile platforms the need to increase data protection increases. Mobile application shielding presents the opportunity to security providers to offer higher data protection standards to mobile platforms that exceed mobile OS security.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem10&amp;quot;&amp;gt;[10] Gartner report: Proliferating Mobile Transaction Attack Vectors and What to Do About Them, March 1st, 2013:&lt;br /&gt;
:''&amp;quot;Use mobile application security testing services and self-defending application utilities to help prevent hacking attempts.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem11&amp;quot;&amp;gt;[11] Gartner report: Select a Secure Mobile Wallet for Proximity, March 1st, 2013:&lt;br /&gt;
:''&amp;quot;Application hardening can fortify sensitive business code against hacking attempts, such as reverse engineering”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem12&amp;quot;&amp;gt;[12] Forrester paper: Choose The Right Mobile Development Solutions For Your Organization, May 6th 2013:&lt;br /&gt;
:''“5 Key Protections: Data Protection, App Compliance, App-Level Threat Defense, Security Policy Enforcement, App Integrity”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem13&amp;quot;&amp;gt;[13] John Wiley and Sons, Inc: [http://www.amazon.com/iOS-Hackers-Handbook-Charlie-Miller/dp/1118204123 iOS Hacker's Handbook], Published May 2012, ISBN 1118204123.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem14&amp;quot;&amp;gt;[14] McGraw Hill Education: [http://mobilehackingexposed.com/ Mobile Hacking Exposed], Published July 2013, ISBN 0071817018.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem15&amp;quot;&amp;gt;[15] Publisher Unannounced: [http://www.amazon.com/Android-Hackers-Handbook-Joshua-Drake/dp/111860864X Android Hacker's Handbook], To Be Published April 2014.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem16&amp;quot;&amp;gt;[16] Software Development Times: [http://sdt.bz/66393#ixzz2sHa7dFMp More than 5,000 apps in the Google Play Store are copied APKs, or 'thief-ware'], November 20 2013:&lt;br /&gt;
:''“In most cases, the 2,140 copycat developers that were found reassembled the apps almost identically, adding new advertising SDKs to siphon profits away from the original developers.''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem17&amp;quot;&amp;gt;[17] InfoSecurity Magazine: [http://www.infosecurity-magazine.com/view/36376/two-thirds-of-personal-banking-apps-found-full-of-vulnerabilities/ Two Thirds of Personal Banking Apps Found Full of Vulnerabilities], January 3 2014:&lt;br /&gt;
:''“But one of his more worrying findings came from disassembling the apps themselves ... what he found was hardcoded development credentials within the code. An attacker could gain access to the development infrastructure of the bank and infest the application with malware causing a massive infection for all of the application’s users.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem18&amp;quot;&amp;gt;[18] InfoSecurity Magazine: [http://www.infosecurity-magazine.com/view/36686/mobile-malware-infects-millions-lte-spurs-growth/ Mobile Malware Infects Millions; LTE Spurs Growth], January 29 2014:&lt;br /&gt;
:''&amp;quot;Number of mobile malware samples is growing at a rapid clip, increasing by 20-fold in 2013... It is trivial for an attacker to hijack a legitimate Android application, inject malware into it and redistribute it for consumption. There are now binder kits available that will allow an attacker to automatically inject malware into an existing application&amp;quot;''&amp;lt;/span&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M9-Reverse_Engineering&amp;diff=226307</id>
		<title>Mobile Top 10 2016-M9-Reverse Engineering</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M9-Reverse_Engineering&amp;diff=226307"/>
				<updated>2017-02-14T01:04:49Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M10-{{Mobile_Top_10_2016:ByTheNumbers               |10               |year=2016               |lang...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M10-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |10&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Mobile2016PrevLink&lt;br /&gt;
    |prev=M8-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |8&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=1|impact=2|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
	&amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;An attacker will typically download the targeted app from an app store and analyze it within their own local environment using a suite of different tools. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;An attacker must perform an analysis of the final core binary to determine its original string table, source code, libraries, algorithms, and resources embedded within the app. Attackers will use relatively affordable and well-understood tools like IDA Pro, Hopper, otool, strings, and other binary inspection tools from within the attacker's environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Generally, all mobile code is susceptible to reverse engineering.  Some apps are more susceptible than others.  Code written in languages / frameworks that allow for dynamic introspection at runtime (Java, .NET, Objective C, Swift) are particularly at risk for reverse engineering.  Detecting susceptibility to reverse engineering is fairly straight forward.  First, decrypt the app store version of the app (if binary encryption is applied).  Then, use the tools outlined in the &amp;quot;Attack Vectors&amp;quot; section of this document against the binary. Code will be susceptible if it is fairly easy to understand the app's controlflow path, string table, and any pseudocode/source-code generated by these tools.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;An attacker may exploit reverse engineering to achieve any of the following:&lt;br /&gt;
&lt;br /&gt;
* Reveal information about back end servers;&lt;br /&gt;
* Reveal cryptographic constants and ciphers;&lt;br /&gt;
* Steal intellectual property;&lt;br /&gt;
* Perform attacks against back end systems; or&lt;br /&gt;
* Gain intelligence needed to perform subsequent code modification.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The business impacts from reverse engineering are quite varied. They include the following:&lt;br /&gt;
&lt;br /&gt;
* Intellectual Property theft;&lt;br /&gt;
* Reputational Damage;&lt;br /&gt;
* Identity Theft; or&lt;br /&gt;
* Compromise of Backend Systems.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=9|year=2016|language=en}}Generally, most applications are susceptible to reverse engineering due to the inherent nature of code.  Most languages used to write apps today are rich in metadata that greatly aides a programmer in debugging the app.  This same capability also grealy aides an attacker in understanding how the app works.&lt;br /&gt;
&lt;br /&gt;
An app is said to be susceptible to reverse engineering if an attacker can do any of the following things:&lt;br /&gt;
&lt;br /&gt;
* Clearly understand the contents of a binary's string table &lt;br /&gt;
* Accurately perform cross-functional analysis&lt;br /&gt;
* Derive a reasonably accurate recreation of the source code from the binary&lt;br /&gt;
&lt;br /&gt;
Although most apps are susceptible to reverse engineering, it's important to examine the potential business impact of reverse engineering when considering whether or not to mitigate this risk.  See the examples below for a small sampling of what can be done with reverse engineering on its own.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=9|year=2016|language=en}}&lt;br /&gt;
In order to prevent effective reverse engineering, you must use an obfuscation tool. There are many free and commercial grade obfuscators on the market.  Conversely, there are many different deobfuscators on the market.  To measure the effectiveness of whatever obfuscation tool you choose, try deobfuscating the code using tools like IDA Pro and Hopper.&lt;br /&gt;
&lt;br /&gt;
A good obfuscator will have the following abilities:&lt;br /&gt;
&lt;br /&gt;
* Narrow down what methods / code segments to obfuscate;&lt;br /&gt;
* Tune the degree of obfuscation to balance performance impact;&lt;br /&gt;
* Withstand de-obfuscation from tools like IDA Pro and Hopper;&lt;br /&gt;
* Obfuscate string tables as well as methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=9|year=2016|language=en}}&lt;br /&gt;
'''Scenario #1:''' String Table Analysis:&lt;br /&gt;
&lt;br /&gt;
The attacker runs 'strings' against the unencrypted app.  As a result of the string table analysis, the attacker discovers a hardcoded connectivity string that contains authentication credentials to a backend database.  The attacker uses those credentials to gain access to the database.  The attacker steals a vast array of PII data about the app's users.&lt;br /&gt;
&lt;br /&gt;
'''Scenario #2:''' Cross-Functional Analysis:&lt;br /&gt;
&lt;br /&gt;
The attacker uses IDA Pro against an unencrypted app.  As a result of the string table analysis combined with functioanl cross-referencing, the attacker discovers Jailbreak detection code.  The attacker uses this knowledge in a subequent code-modification attack to disable jailbreak detection within the mobile app. The attacker then deploys a version of the app that exploits method swizzling to steal customer information.&lt;br /&gt;
&lt;br /&gt;
'''Scenario #3:''' Source Code Analysis:&lt;br /&gt;
&lt;br /&gt;
Consider a banking Android application. The APK file can be easily extracted using 7zip/Winrar/WinZip/Gunzip. Once extracted, the attacker has manifest file, assets, resources and most importantly classes.dex file.&lt;br /&gt;
&lt;br /&gt;
Then using Dex to Jar converter, an attacker can easily convert it to jar file. In next step, Java Decompiler (like JDgui) will provide you the code. &lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=9|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Reverse_Engineering_and_Code_Modification_Prevention_Project OWASP Reverse Engineering and Code Modification Prevention Project]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem1&amp;quot;&amp;gt;[1] Arxan Research: [https://www.arxan.com/assets/1/7/State_of_Security_in_the_App_Economy_Report_Vol._2.pdf State of Security in the App Economy, Volume 2], November 2013:&lt;br /&gt;
:''“Adversaries have hacked 78 percent of the top 100 paid Android and iOS apps in 2013.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem2&amp;quot;&amp;gt;[2] HP Research: [http://www8.hp.com/us/en/hp-news/press-release.html?id=1528865#.UuwZFPZvDi5 HP Research Reveals Nine out of 10 Mobile Applications Vulnerable to Attack], 18 November 2013:&lt;br /&gt;
:''&amp;quot;86 percent of applications tested lacked binary hardening, leaving applications vulnerable to information disclosure, buffer overflows and poor performance. To ensure security throughout the life cycle of the application, it is essential to build in the best security practices from conception.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem3&amp;quot;&amp;gt;[3] North Carolina State University: [http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND12.pdf Dissecting Android Malware: Characterization and Evolution], 7 September 2011:&lt;br /&gt;
:''“Our results show that 86.0% of them (Android Malware) repackage legitimate apps to include malicious payloads; 36.7% contain platform-level exploits to escalate privilege; 93.0% exhibit the bot-like capability.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem4&amp;quot;&amp;gt;[4] Tech Hive: [http://www.techhive.com/article/249310/apple_pulls_ripoff_apps_from_its_walled_garden.html Apple Pulls Ripoff Apps from its Walled Garden]Feb 4th, 2012:&lt;br /&gt;
:''“While Apple is known for screening apps before they are allowed to sprout up in its walled garden, clearly fake apps do get in. Once they do, getting them out depends on developers who raise a fuss.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem5&amp;quot;&amp;gt;[5] Tech Crunch: [http://techcrunch.com/2014/01/02/developer-spams-google-play-with-ripoffs-of-well-known-apps-again/ Developer Spams Google Play With RipOffs of Well-Known Apps… Again], January 2 2014:&lt;br /&gt;
:''“It’s not uncommon to search the Google Play app store and find a number of knock-off or “fake” apps aiming to trick unsuspecting searchers into downloading them over the real thing.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem6&amp;quot;&amp;gt;[6] Extreme Tech: [http://www.extremetech.com/mobile/153849-chinese-app-store-offers-pirated-ios-apps-without-the-need-to-jailbreak Chinese App Store Offers Pirated iOS Apps Without the Need To Jailbreak], April 19 2013:&lt;br /&gt;
:''“The site offers apps for free that would otherwise cost money, including big-name titles.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem7&amp;quot;&amp;gt;[7] OWASP: [https://www.owasp.org/index.php/Architectural_Principles_That_Prevent_Code_Modification_or_Reverse_Engineering Architectural Principles That Prevent Code Modification or Reverse Engineering], January 11th 2014.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem8&amp;quot;&amp;gt;[8] Gartner report: Avoiding Mobile App Development Security Pitfalls, 24 May 2013:&lt;br /&gt;
:''&amp;quot;For critical applications, such as transactional ones and sensitive enterprise applications, hardening should be used.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem9&amp;quot;&amp;gt;[9] Gartner report: Emerging Technology Analysis:  Mobile Application Shielding, March 26th, 2013:&lt;br /&gt;
:''&amp;quot;As more regulated and sensitive data applications move to mobile platforms the need to increase data protection increases. Mobile application shielding presents the opportunity to security providers to offer higher data protection standards to mobile platforms that exceed mobile OS security.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem10&amp;quot;&amp;gt;[10] Gartner report: Proliferating Mobile Transaction Attack Vectors and What to Do About Them, March 1st, 2013:&lt;br /&gt;
:''&amp;quot;Use mobile application security testing services and self-defending application utilities to help prevent hacking attempts.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem11&amp;quot;&amp;gt;[11] Gartner report: Select a Secure Mobile Wallet for Proximity, March 1st, 2013:&lt;br /&gt;
:''&amp;quot;Application hardening can fortify sensitive business code against hacking attempts, such as reverse engineering”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem12&amp;quot;&amp;gt;[12] Forrester paper: Choose The Right Mobile Development Solutions For Your Organization, May 6th 2013:&lt;br /&gt;
:''“5 Key Protections: Data Protection, App Compliance, App-Level Threat Defense, Security Policy Enforcement, App Integrity”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem13&amp;quot;&amp;gt;[13] John Wiley and Sons, Inc: [http://www.amazon.com/iOS-Hackers-Handbook-Charlie-Miller/dp/1118204123 iOS Hacker's Handbook], Published May 2012, ISBN 1118204123.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem14&amp;quot;&amp;gt;[14] McGraw Hill Education: [http://mobilehackingexposed.com/ Mobile Hacking Exposed], Published July 2013, ISBN 0071817018.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem15&amp;quot;&amp;gt;[15] Publisher Unannounced: [http://www.amazon.com/Android-Hackers-Handbook-Joshua-Drake/dp/111860864X Android Hacker's Handbook], To Be Published April 2014.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem16&amp;quot;&amp;gt;[16] Software Development Times: [http://sdt.bz/66393#ixzz2sHa7dFMp More than 5,000 apps in the Google Play Store are copied APKs, or 'thief-ware'], November 20 2013:&lt;br /&gt;
:''“In most cases, the 2,140 copycat developers that were found reassembled the apps almost identically, adding new advertising SDKs to siphon profits away from the original developers.''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem17&amp;quot;&amp;gt;[17] InfoSecurity Magazine: [http://www.infosecurity-magazine.com/view/36376/two-thirds-of-personal-banking-apps-found-full-of-vulnerabilities/ Two Thirds of Personal Banking Apps Found Full of Vulnerabilities], January 3 2014:&lt;br /&gt;
:''“But one of his more worrying findings came from disassembling the apps themselves ... what he found was hardcoded development credentials within the code. An attacker could gain access to the development infrastructure of the bank and infest the application with malware causing a massive infection for all of the application’s users.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem18&amp;quot;&amp;gt;[18] InfoSecurity Magazine: [http://www.infosecurity-magazine.com/view/36686/mobile-malware-infects-millions-lte-spurs-growth/ Mobile Malware Infects Millions; LTE Spurs Growth], January 29 2014:&lt;br /&gt;
:''&amp;quot;Number of mobile malware samples is growing at a rapid clip, increasing by 20-fold in 2013... It is trivial for an attacker to hijack a legitimate Android application, inject malware into it and redistribute it for consumption. There are now binder kits available that will allow an attacker to automatically inject malware into an existing application&amp;quot;''&amp;lt;/span&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M10-Extraneous_Functionality&amp;diff=226306</id>
		<title>Mobile Top 10 2016-M10-Extraneous Functionality</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2016-M10-Extraneous_Functionality&amp;diff=226306"/>
				<updated>2017-02-14T01:04:39Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{Mobile_Top_10_2016:TopTemplate     |usenext=Mobile2016NextLink     |next=M1-{{Mobile_Top_10_2016:ByTheNumbers               |1               |year=2016               |langua...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Mobile_Top_10_2016:TopTemplate&lt;br /&gt;
    |usenext=Mobile2016NextLink&lt;br /&gt;
    |next=M1-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |1&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=Mobile2016PrevLink&lt;br /&gt;
    |prev=M9-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |9&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2016&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=1|prevalence=2|detectability=2|impact=1|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
	&amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;Typically, an attacker seeks to understand extraneous functionality within a mobile app in order to discover hidden functionality in in backend systems.  The attacker will typically exploit extraneous functionality directly from their own systems without any involvement by end-users. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;An attacker will download and examine the mobile app within their own local environment.  They will examine log files, configuration files, and perhaps the binary itself to discover any hidden switches or test code that was left behind by the developers.  They will exploit these switches and hidden functionality in the backend system to perform an attack.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2 {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;There is a high likelihood that any given mobile app contains extraneous functionality that is not directly exposed to the user via the interface.  Most of this additional code is benign in nature and will not give an attacker any additional insight into backend capabilities. However, some extraneous functionality can be very useful to an attacker. Functionality that exposes information related to back-end test, demo, staging, or UAT environments should not be included in a production build.  Additionally, administrative API endpoints, or unofficial endpoints should not be included in final production builds. Detecting extraneous functionality can be tricky. Automated static and dynamic analysis tools can pick up low hanging fruit (log statements).  However, some backdoors are difficult to detect in an automated means.  As such, it is always best to prevent these things using a manual code review.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The technical impact from extraneous functionality includes the following:&lt;br /&gt;
&lt;br /&gt;
* Exposure of how backend systems work; or&lt;br /&gt;
* Unauthorized high-privileged actions executed.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}&amp;gt;The business impact from extraneous functionality includes the following:&lt;br /&gt;
     &lt;br /&gt;
* Unauthorized Access to Sensitive Functionality;&lt;br /&gt;
* Reputational Damage; or&lt;br /&gt;
* Intellectual Property Theft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=10|year=2016|language=en}}&lt;br /&gt;
Often, developers include hidden backdoor functionality or other internal development security controls that are not intended to be released into a production environment. For example, a developer may accidentally include a password as a comment in a hybrid app. Another example includes disabling of 2-factor authentication during testing.&lt;br /&gt;
&lt;br /&gt;
The defining characteristic of this risk is leaving functionality enabled in the app that was not intended to be released.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=10|year=2016|language=en}}&lt;br /&gt;
The best way to prevent this vulnerability is to perform a manual secure code review using security champs or subject matter experts most knowledgable with this code.  They should do the following:&lt;br /&gt;
&lt;br /&gt;
# Examine the app's configuration settings to discover any hidden switches;&lt;br /&gt;
# Verify that all test code is not included in the final production build of the app;&lt;br /&gt;
# Examine all API endpoints accessed by the mobile app to verify that these endpoints are well documented and publicly available;&lt;br /&gt;
# Examine all log statements to ensure nothing overly descriptive about the backend is being written to the logs;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=10|year=2016|language=en}}&lt;br /&gt;
'''Scenario #1:''' Administrative Endpoint Exposed:&lt;br /&gt;
&lt;br /&gt;
As part of mobile endpoint testing, developers included a hidden interface within the mobile app that would display an administrative dashboard. This dashboard accessed admin information via the back-end API server. In the production version of the code, the developers did not include code that displayed the dashboard at any time.  However, they did include the underlying code that could access the back-end admin API. An attacker performed a string table analysis of the binary and discovered the hardcoded URL to an administrative REST endpoint.  The attacker subsequently used 'curl' to execute back-end administrative functionality.&lt;br /&gt;
&lt;br /&gt;
The developers should have removed all extraneous code, including code that is not directly reachable by the native interface.&lt;br /&gt;
&lt;br /&gt;
'''Scenario #2:''' Debug Flag in Configuration File:&lt;br /&gt;
&lt;br /&gt;
An attacker tries manually added &amp;quot;debug=true&amp;quot; to a .properties file in a local app.  Upon startup, the application is outputting log files that are overly descriptive and helpful to the attacker in understanding the backend systems.  The attacker subsequently discovers vulnerabilities within the backend system as a result of the log.&lt;br /&gt;
&lt;br /&gt;
The developers should have prevented the activation of 'debug mode' within a production build of the mobile app.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=10|year=2016|language=en}}&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate}}&lt;br /&gt;
* [https://www.owasp.org OWASP References Go Here]&lt;br /&gt;
{{Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate}}&lt;br /&gt;
* [http://cwe.mitre.org External References Go Here]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:RoundedBoxLinkBegin&amp;diff=225923</id>
		<title>Template:Mobile Top 10:RoundedBoxLinkBegin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:RoundedBoxLinkBegin&amp;diff=225923"/>
				<updated>2017-02-02T23:35:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Mobile_Top_Ten_2016-M{{{risk}}}-{{Mobile_Top_10_2016:ByTheNumbers&lt;br /&gt;
              |{{{risk}}}&lt;br /&gt;
              |year=2016&lt;br /&gt;
              |language=en}} | &lt;br /&gt;
{{Top 10:RoundedBoxBegin|year={{{year}}} }}&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate&amp;diff=225569</id>
		<title>Template:Mobile Top 10 2016:SubSubsectionExternalReferencesTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubSubsectionExternalReferencesTemplate&amp;diff=225569"/>
				<updated>2017-01-24T22:59:01Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;'''{{Mobile_Top_10:LanguageFile|text=external|language={{{language}}} }}'''&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''{{Mobile_Top_10:LanguageFile|text=external|language={{{language}}} }}'''&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate&amp;diff=225568</id>
		<title>Template:Mobile Top 10 2016:SubSubsectionOWASPReferencesTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubSubsectionOWASPReferencesTemplate&amp;diff=225568"/>
				<updated>2017-01-24T22:58:21Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;'''OWASP'''&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP'''&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:ExampleEndTemplate&amp;diff=225567</id>
		<title>Template:Mobile Top 10 2016:ExampleEndTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:ExampleEndTemplate&amp;diff=225567"/>
				<updated>2017-01-24T22:01:18Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;&amp;lt;/div&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;/div&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:ExampleBeginTemplate&amp;diff=225566</id>
		<title>Template:Mobile Top 10 2016:ExampleBeginTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:ExampleBeginTemplate&amp;diff=225566"/>
				<updated>2017-01-24T21:59:45Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;&amp;lt;div style=&amp;quot;border: 2px dashed #444444; background-color: {{#switch: {{{year}}} |2013=#E0E0E0 |#default=#D0D0D0}}; font-family: courier; padding: 4px;margin-left: +20px; margi...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;border: 2px dashed #444444;&lt;br /&gt;
background-color: {{#switch: {{{year}}} |2013=#E0E0E0 |#default=#D0D0D0}};&lt;br /&gt;
font-family: courier; padding: 4px;margin-left: +20px; margin-right: +20px;&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableRowStyleTemplate&amp;diff=225565</id>
		<title>Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableRowStyleTemplate&amp;diff=225565"/>
				<updated>2017-01-24T21:38:13Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;style=&amp;quot;text-align: left; border: 3px solid #444444;&amp;quot;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;style=&amp;quot;text-align: left; border: 3px solid #444444;&amp;quot;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableHeaderEndTemplate&amp;diff=225564</id>
		<title>Template:Mobile Top 10 2016:SummaryTableHeaderEndTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableHeaderEndTemplate&amp;diff=225564"/>
				<updated>2017-01-24T21:31:43Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;     &amp;lt;td style=&amp;quot;font-size: 100%; font-weight: bold; background-color: #D9D9D9; color: #000000; border: 3px solid #444444&amp;quot;&amp;gt; {{Mobile_Top_10:LanguageFile|text=applicationBusinessSpecific|language={{{language}}} }} &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:LanguageFile&amp;diff=225563</id>
		<title>Template:Mobile Top 10:LanguageFile</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:LanguageFile&amp;diff=225563"/>
				<updated>2017-01-24T21:16:22Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-----------------------------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- This File contains all the text that is used by OWASP Mobile Top 10 Templates --&amp;gt;&lt;br /&gt;
&amp;lt;!--             Please add a new language solely here!!!                          --&amp;gt;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
This File contains all the text that is used by OWASP Mobile Top 10 Templates&amp;lt;br/&amp;gt;&lt;br /&gt;
Please leave a message to {{Template:Contact | name = Jonathan Carter | email =jonathan.carter@owasp.org | username = Jonathan Carter}} &lt;br /&gt;
if you liked to add a new localization&amp;lt;br&amp;gt;                     &lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
If you use an undefined language you will get English output (default language).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Mobile_Top_10:LanguageFile&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |text=&amp;lt;parameter&amp;gt; &amp;lt;!-- take one of the defined parmeters, e.g. tableOfContents --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |language=&amp;lt;your language&amp;gt;   &amp;lt;!-- actually only English (=en) and German (=de) are valid parameters) --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |year=&amp;lt;year&amp;gt;   &amp;lt;!-- optional for some texts --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
====Example:====&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Mobile_Top_10:LanguageFile|text=tableOfContents|language=de}} =&amp;gt;&amp;lt;/nowiki&amp;gt; {{Mobile_Top_10:LanguageFile|text=tableOfContents|language=de}}&lt;br /&gt;
----&lt;br /&gt;
==='''Healthcheck'''===&lt;br /&gt;
tbd.&amp;lt;br/&amp;gt;&lt;br /&gt;
In the meantime, please check:&lt;br /&gt;
* [[Mobile_Top_10_2016-Table_of_Contents | English Mobile Top 10 Wiki]]&lt;br /&gt;
* [[Germany/Projekte/Mobile_Top_10-2016-Inhaltsverzeichnis | German Mobile Top 10 Wiki]]&lt;br /&gt;
----&lt;br /&gt;
If you use an unknown parameter you will get the following Error message in your wiki page:&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{language}}}&lt;br /&gt;
   | de = &amp;lt;!-- German --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootMobileTop10 =                 Germany/Projekte/Mobile Top 10-{{{year}}}&lt;br /&gt;
        | documentRootMobileTop10DeveloperEdition = Germany/Projekte/Mobile Top 10 fuer Entwickler-{{{year}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for Mobile Top 10 2016-CenterLinkTemplate + Mobile Top 10 2016:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | mobileTop10TmpMessage =               ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Mobile Top 10-2016==&lt;br /&gt;
        | mobileTop10TmpMessageDeveloperEdition = ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Mobile Top 10 fuer Entwickler-2016==&lt;br /&gt;
        | centerLink1 =                   [[Germany/Projekte/Mobile Top 10-2016-Inhaltsverzeichnis|2013 Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2 =                   [[Germany/Projekte/Mobile Top 10-2016-Top 10|2016 Die Mobile-Top-10-Risiken]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Germany/Projekte/Mobile Top 10 fuer Entwickler-2016/Inhaltsverzeichnis|Mobile Top 10 fuer Entwickler-2016: Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Germany/Projekte/Mobile Top 10 fuer Entwickler-2016/Mobile Top 10|Die Mobile Top-10-Risiken]]&lt;br /&gt;
        | projectCategory =               [[Category: Germany/Projekte/Mobile Top 10-2016]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Mobile Top 10 fuer Entwickler]] [[Category: Germany/Projekte/Mobile Top 10 fuer Entwickler-2016]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Mobile Top Ten Section for Mobile Top 10 2016-CenterLinkTemplate --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Inhaltsverzeichnis&lt;br /&gt;
        | foreword =                      Vorwort&lt;br /&gt;
        | forewordTranslation =           Vorwort der deutschen Übersetzung&lt;br /&gt;
        | forward =                       Vorwort &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Vorwort der deutschen Übersetzung &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    Über OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright und Lizenz&lt;br /&gt;
        | introduction =                  Einleitung&lt;br /&gt;
        | releaseNotes =                  Neuerungen&lt;br /&gt;
        | risks =                         Risiken&lt;br /&gt;
        | risk =                          Risiko&lt;br /&gt;
        | subTitleApplicationRisks =      (Sicherheitsrisiken für Anwendungen)&lt;br /&gt;
        | riskLarge =                     RISIKO&lt;br /&gt;
        | applicationSecurityRisks =      Was sind Sicherheitsrisiken für Anwendungen? &lt;br /&gt;
        | theMobileTop10 =                Die Mobile Top-10-Risiken&lt;br /&gt;
        | mobileTop10 =                   Mobile Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        Nächste Schritte für Software-Entwickler&lt;br /&gt;
        | whatsNextforVerifiers =         Nächste Schritte für Prüfer&lt;br /&gt;
        | whatsNextforOrganizations =     Nächste Schritte für Organisationen&lt;br /&gt;
        | noteAboutRisks =                Anmerkungen zum Risikobegriff&lt;br /&gt;
        | detailsAboutRiskFactors =       Details zu Risiko-Faktoren&lt;br /&gt;
        | appendix =                      Anlage&lt;br /&gt;
        | warnings =                      Zur Beachtung&lt;br /&gt;
        | acknowledgements =              Danksagung&lt;br /&gt;
        | attribution =                   Namensnennung/Danksagung&lt;br /&gt;
        | whatChangedFrom2014to2016 =     Was hat sich von Version 2014 zu 2016 verändert?&lt;br /&gt;
        | welcome =                       Herzlich Willkommen&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          Was sind Sicherheitsrisiken für Anwendungen?&lt;br /&gt;
        | whatsMyRisk =                   Was sind &amp;lt;u&amp;gt;meine&amp;lt;/u&amp;gt; Risiken?&lt;br /&gt;
        | references =                    Referenzen&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Etablierung und Nutzung umfassender Sicherheitsmaßnahmen&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Starten Sie jetzt mit Ihrem Anwendungssicherheits-Programm!&lt;br /&gt;
        | getOrganized =                  Organisation und Prozesse &lt;br /&gt;
        | codeReview =                    Code-Analyse&lt;br /&gt;
        | securityAndPenetrationTesting = Sicherheits- und Penetrationstests&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    Es geht nicht um Schwachstellen, sondern um Risiken&lt;br /&gt;
        | mobileTop10RiskFactorSummary =        Zusammenfassung der Mobile Top 10 Risiko-Faktoren&lt;br /&gt;
        | additionalRisksToConsider =     Weitere zu betrachtende Risiken &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | improperPlatformUsage =         Improper Platform Usage&lt;br /&gt;
        | insecureDataStorage =           Insecure Data Storage&lt;br /&gt;
        | insecureCommunication =         Insecure Communication&lt;br /&gt;
        | insecureAuthentication =        Insecure Authentication&lt;br /&gt;
        | insufficientCryptography =      Insufficient Cryptography&lt;br /&gt;
        | insecureAuthorization =         Insecure Authorization&lt;br /&gt;
        | clientCodeQuality =             Poor Code Quality&lt;br /&gt;
        | codeTampering =                 Code Tampering&lt;br /&gt;
        | reverseEngineering =            Reverse Engineering&lt;br /&gt;
        | extraneousFunctionality =       Extraneous Functionality&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Fehler in Authentifizierung und Session-Management&lt;br /&gt;
        | authentication =                Authentifizierung &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Unsichere direkte Objektreferenzen&lt;br /&gt;
        | insecureDOR =                   Unsichere direkte Objektreferenzen&lt;br /&gt;
        | securityMisconfig =             Sicherheitsrelevante Fehlkonfiguration&lt;br /&gt;
        | misconfig =                     Fehlkonfiguration&lt;br /&gt;
        | sensitiveDataExposure =         Verlust der Vertraulichkeit sensibler Daten&amp;lt;noinclude&amp;gt;ex: Sensitive Data Exposure&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | sensData =                      Sens. Data&amp;lt;noinclude&amp;gt;(tbd)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | missingFunctionLevelACL =       Fehlerhafte Autorisierung auf Anwendungsebene &amp;lt;noinclude&amp;gt;(tbd = Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | functionAcc =                   Fehlerh. Autorisierung&amp;lt;noinclude&amp;gt;(tbd = Kurzform für Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Benutzen von Komponenten mit bekannten Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = Using Components with Known Vulnerabilities)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnComponents =                Komponenten mit Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = vuln. Components)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Ungeprüfte Um- und Weiterleitungen&lt;br /&gt;
        | unvalRedirects =                Ungepr. Weiterltg.&lt;br /&gt;
        | insecureCryptographicStorage =  Kryptografisch unsichere Speicherung&lt;br /&gt;
        | failureRestrictUrlAccess =      Mangelhafter URL-Zugriffsschutz&lt;br /&gt;
        | insufficientTLProtection =      Unzureichende Absicherung der Transportschicht&lt;br /&gt;
        | inProgress =                    In Arbeit &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Anwendungs-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | appSpecific =                   Anw.-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | applicationBusinessSpecific =   Anwendungs-/&amp;lt;br&amp;gt;Geschäftsspezifisch&lt;br /&gt;
        | appBusinessSpecific =           Anw.-/&amp;lt;br&amp;gt;Geschäftsspez. &lt;br /&gt;
        | exploitability =                Ausnutzbarkeit&lt;br /&gt;
        | easy =                          EINFACH&lt;br /&gt;
        | average =                       DURCHSCHNITTLICH&lt;br /&gt;
        | difficult =                     SCHWIERIG&lt;br /&gt;
        | weakness =                      &amp;lt;!-- not used ---&amp;gt; &amp;lt;!-- for table in Mobile_Top_10_2016-Risk --&amp;gt;&lt;br /&gt;
        | prevalence =                    Verbreitung&lt;br /&gt;
        | veryWidespread =                AUSSERGEWÖHNLICH HÄUFIG&lt;br /&gt;
        | widespread =                    SEHR HÄUFIG&lt;br /&gt;
        | common =                        HÄUFIG&lt;br /&gt;
        | uncommon =                      SELTEN&lt;br /&gt;
        | detectability =                 Auffindbarkeit&lt;br /&gt;
        | impact =                        Auswirkung&lt;br /&gt;
        | severe =                        SCHWERWIEGEND&lt;br /&gt;
        | moderate =                      MITTEL&lt;br /&gt;
        | minor =                         GERING  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Bedrohungsquelle&lt;br /&gt;
        | attackVectors =                 Angriffsvektor&lt;br /&gt;
        | securityWeakness =              Schwachstellen&lt;br /&gt;
        | technicalImpacts =              Technische Auswirkung&lt;br /&gt;
        | businessImpacts =               Auswirkung auf das Unternehmen&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 de threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 de attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 de securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 de technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 de businessImpacts.png  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Mobile Top 10 de ApplicationSecurityRisks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt;          &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Bin ich durch {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verwundbar?&lt;br /&gt;
        | vulnerableTo1 =                 Bin ich durch&lt;br /&gt;
        | vulnerableTo2 =                 &amp;amp;nbsp;verwundbar?&lt;br /&gt;
        | howPrevent =                    Wie kann ich {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verhindern?&lt;br /&gt;
        | howPrevent1 =                   Wie kann ich &lt;br /&gt;
        | howPrevent2 =                   &amp;amp;nbsp;verhindern?&lt;br /&gt;
        | exampleScenarios =              Mögliche Angriffsszenarien &lt;br /&gt;
        | defendingOption =               Verteidigungs-Option&lt;br /&gt;
        | against =                       gegen&lt;br /&gt;
        | userImpact =                    Auswirkung(en) auf den Benutzer &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;   &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;         &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      Andere                    &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;   &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      FEHLER im 'Language File' (Aufruf des unbenutzten Objekts)&lt;br /&gt;
        | #default =                      FEHLER im 'Language File' (Aufruf des unbekannten Objekts)&lt;br /&gt;
     }} &amp;lt;!-- End of German --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- English = default; so here is nothing to do --&amp;gt; &lt;br /&gt;
&amp;lt;!-- | en =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | us =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | gb =  --&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt; | #default = &amp;lt;!-- English --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootMobileTop10 =                 Mobile Top 10 {{{year}}}&lt;br /&gt;
        | documentRootMobileTop10DeveloperEdition = Mobile Top 10 {{{year}}} Developer Edition&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for Mobile Top 10 2016-CenterLinkTemplate + Mobile Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | mobileTop10TmpMessage =               &amp;lt;noinclude&amp;gt;==The Mobile Top 10-2016 Wiki is under Connstruction. The Content is Not Finished yet==&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | mobileTop10TmpMessageDeveloperEdition =   ==The Mobile Top 10-2016 Developer Edition Wiki is under Connstruction. The Content is Not Finished yet==&lt;br /&gt;
        | centerLink1 =                   [[Mobile Top 10 2016-Table of Contents | 2016 Table of Contents]]&lt;br /&gt;
        | centerLink2 =                   [[Mobile_Top_10_2016-Top 10|2016 Mobile Top 10 List]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Mobile Top 10 2016 Developer Edition-Table of Contents|2016 Developer Edition-Table of Contents]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Mobile Top 10 2016 Developer Edition-Mobile Top 10 List|2016 Developer Edition-Mobile Top 10 List]]&lt;br /&gt;
        | projectCategory =               [[Category:OWASP Mobile Top Ten Project]] [[Category:OWASP Mobile Top Ten {{{year}}} Project]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Mobile Top Ten {{{year}}} Developer Edition]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Table of Contents&lt;br /&gt;
        | foreword =                      Foreword&lt;br /&gt;
        | forewordTranslation =           Foreword of the English Wiki&lt;br /&gt;
        | forward =                       Forward &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Forward of the English Wiki &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    About OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright and License&lt;br /&gt;
        | introduction =                  Introduction&lt;br /&gt;
        | releaseNotes =                  Release Notes&lt;br /&gt;
        | risks =                         Risks&lt;br /&gt;
        | risk =                          Risk&lt;br /&gt;
        | subTitleApplicationRisks =      (Application Security Risks)&lt;br /&gt;
        | riskLarge =                     RISIK&lt;br /&gt;
        | applicationSecurityRisks =      Application Security Risks&lt;br /&gt;
        | theMobileTop10 =                The Mobile Top 10&lt;br /&gt;
        | mobileTop10 =                   Mobile Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        What's Next for Developers&lt;br /&gt;
        | whatsNextforVerifiers =         What's Next for Verifiers&lt;br /&gt;
        | whatsNextforOrganizations =     What's Next for Organizations&lt;br /&gt;
        | noteAboutRisks =                Note About Risks&lt;br /&gt;
        | detailsAboutRiskFactors =       Details About Risk Factors&lt;br /&gt;
        | appendix =                      appendix&lt;br /&gt;
        | warnings =                      Warnings&lt;br /&gt;
        | acknowledgements =              Acknowledgements&lt;br /&gt;
        | attribution =                   Attribution&lt;br /&gt;
        | whatChangedFrom2014to2016 =     What Changed From 2014 to 2016?&lt;br /&gt;
        | welcome =                       Welcome&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          What Are Application Security Risks?&lt;br /&gt;
        | whatsMyRisk =                   What's My Risk?&lt;br /&gt;
        | references =                    References&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Establish &amp;amp; Use Repeatable Security Processes and Standard Security Controls&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Start Your Application Security Program Now&lt;br /&gt;
        | getOrganized =                  Get Organized&lt;br /&gt;
        | codeReview =                    Code Review&lt;br /&gt;
        | securityAndPenetrationTesting = Security and Penetration Testing&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    It's About Risks, Not Weaknesses&lt;br /&gt;
        | mobileTop10RiskFactorSummary =  Mobile Top 10 Risk Factor Summary&lt;br /&gt;
        | additionalRisksToConsider =     Additional Risks to Consider  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | improperPlatformUsage =         Improper Platform Usage&lt;br /&gt;
        | insecureDataStorage =           Insecure Data Storage&lt;br /&gt;
        | insecureCommunication =         Insecure Communication&lt;br /&gt;
        | insecureAuthentication =        Insecure Authentication&lt;br /&gt;
        | insufficientCryptography =      Insufficient Cryptography&lt;br /&gt;
        | insecureAuthorization =         Insecure Authorization&lt;br /&gt;
        | clientCodeQuality =             Poor Code Quality&lt;br /&gt;
        | codeTampering =                 Code Tampering&lt;br /&gt;
        | reverseEngineering =            Reverse Engineering&lt;br /&gt;
        | extraneousFunctionality =       Extraneous Functionality&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Broken Authentication and Session Management&lt;br /&gt;
        | authentication =                Authentication &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Insecure Direct Object References&lt;br /&gt;
        | insecureDOR =                   Insecure DOR&lt;br /&gt;
        | securityMisconfig =             Security Misconfiguration&lt;br /&gt;
        | misconfig =                     Misconfig&lt;br /&gt;
        | sensitiveDataExposure =         Sensitive Data Exposure&lt;br /&gt;
        | sensData =                      Sens. Data&lt;br /&gt;
        | missingFunctionLevelACL =       Missing Function Level Access Control&lt;br /&gt;
        | functionAcc =                   Function Acc.&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Using Components with Known Vulnerabilities&lt;br /&gt;
        | vulnComponents =                vuln. Components&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Unvalidated Redirects and Forwards&lt;br /&gt;
        | unvalRedirects =                unval. Redirects&lt;br /&gt;
        | insecureCryptographicStorage =  Insecure Cryptographic Storage&lt;br /&gt;
        | failureRestrictUrlAccess =      Failure to Restrict URL Access&lt;br /&gt;
        | insufficientTLProtection =      Insufficient Transport Layer Protection&lt;br /&gt;
        | inProgress =                    In Progress &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Application Specific&lt;br /&gt;
        | appSpecific =                   App Specific&lt;br /&gt;
        | applicationBusinessSpecific =   Application / Business Specific  &lt;br /&gt;
        | appBusinessSpecific =           App / Business Specific       &lt;br /&gt;
        | exploitability =                Exploitability&lt;br /&gt;
        | easy =                          EASY&lt;br /&gt;
        | average =                       AVERAGE&lt;br /&gt;
        | difficult =                     DIFFICULT&lt;br /&gt;
        | weakness =                      Weakness &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt; &lt;br /&gt;
        | prevalence =                    Prevalence&lt;br /&gt;
        | veryWidespread =                VERY WIDESPREAD&lt;br /&gt;
        | widespread =                    WIDESPREAD&lt;br /&gt;
        | common =                        COMMON&lt;br /&gt;
        | uncommon =                      UNCOMMON&lt;br /&gt;
        | detectability =                 Detectability&lt;br /&gt;
        | impact =                        Impact&lt;br /&gt;
        | severe =                        SEVERE&lt;br /&gt;
        | moderate =                      MODERATE&lt;br /&gt;
        | minor =                         MINOR &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Threat Agents&lt;br /&gt;
        | attackVectors =                 Attack Vectors&lt;br /&gt;
        | securityWeakness =              Security Weakness&lt;br /&gt;
        | technicalImpacts =              Technical Impacts&lt;br /&gt;
        | businessImpacts =               Business Impacts&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 businessImpacts.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Mobile_Top_10_2016-appsec-risks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Am I Vulnerable To {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | vulnerableTo1 =                 Am I Vulnerable To&lt;br /&gt;
        | vulnerableTo2 =                 ?&lt;br /&gt;
        | howPrevent =                    How Do I Prevent {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | howPrevent1 =                   How Do I Prevent&lt;br /&gt;
        | howPrevent2 =                   ?&lt;br /&gt;
        | exampleScenarios =              Example Attack Scenarios &lt;br /&gt;
        | defendingOption =               Defending Option&lt;br /&gt;
        | against =                       against&lt;br /&gt;
        | userImpact =                    Impact to the User &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      External &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      ERROR in the 'Language File' (Use of the unused Object) {{{text}}}&lt;br /&gt;
        | #default =                      ERROR in the 'Language File' (Use of an unknown Object) {{{text}}}&lt;br /&gt;
     }} &amp;lt;!-- End of English --&amp;gt;&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:LanguageFile&amp;diff=225557</id>
		<title>Template:Mobile Top 10:LanguageFile</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:LanguageFile&amp;diff=225557"/>
				<updated>2017-01-24T20:04:47Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-----------------------------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- This File contains all the text that is used by OWASP Mobile Top 10 Templates --&amp;gt;&lt;br /&gt;
&amp;lt;!--             Please add a new language solely here!!!                          --&amp;gt;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
This File contains all the text that is used by OWASP Mobile Top 10 Templates&amp;lt;br/&amp;gt;&lt;br /&gt;
Please leave a message to {{Template:Contact | name = Jonathan Carter | email =jonathan.carter@owasp.org | username = Jonathan Carter}} &lt;br /&gt;
if you liked to add a new localization&amp;lt;br&amp;gt;                     &lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
If you use an undefined language you will get English output (default language).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Mobile_Top_10:LanguageFile&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |text=&amp;lt;parameter&amp;gt; &amp;lt;!-- take one of the defined parmeters, e.g. tableOfContents --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |language=&amp;lt;your language&amp;gt;   &amp;lt;!-- actually only English (=en) and German (=de) are valid parameters) --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |year=&amp;lt;year&amp;gt;   &amp;lt;!-- optional for some texts --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
====Example:====&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Mobile_Top_10:LanguageFile|text=tableOfContents|language=de}} =&amp;gt;&amp;lt;/nowiki&amp;gt; {{Mobile_Top_10:LanguageFile|text=tableOfContents|language=de}}&lt;br /&gt;
----&lt;br /&gt;
==='''Healthcheck'''===&lt;br /&gt;
tbd.&amp;lt;br/&amp;gt;&lt;br /&gt;
In the meantime, please check:&lt;br /&gt;
* [[Mobile_Top_10_2016-Table_of_Contents | English Mobile Top 10 Wiki]]&lt;br /&gt;
* [[Germany/Projekte/Mobile_Top_10-2016-Inhaltsverzeichnis | German Mobile Top 10 Wiki]]&lt;br /&gt;
----&lt;br /&gt;
If you use an unknown parameter you will get the following Error message in your wiki page:&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{language}}}&lt;br /&gt;
   | de = &amp;lt;!-- German --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootMobileTop10 =                 Germany/Projekte/Mobile Top 10-{{{year}}}&lt;br /&gt;
        | documentRootMobileTop10DeveloperEdition = Germany/Projekte/Mobile Top 10 fuer Entwickler-{{{year}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for Mobile Top 10 2016-CenterLinkTemplate + Mobile Top 10 2016:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | mobileTop10TmpMessage =               ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Mobile Top 10-2016==&lt;br /&gt;
        | mobileTop10TmpMessageDeveloperEdition = ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Mobile Top 10 fuer Entwickler-2016==&lt;br /&gt;
        | centerLink1 =                   [[Germany/Projekte/Mobile Top 10-2016-Inhaltsverzeichnis|2013 Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2 =                   [[Germany/Projekte/Mobile Top 10-2016-Top 10|2016 Die Mobile-Top-10-Risiken]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Germany/Projekte/Mobile Top 10 fuer Entwickler-2016/Inhaltsverzeichnis|Mobile Top 10 fuer Entwickler-2016: Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Germany/Projekte/Mobile Top 10 fuer Entwickler-2016/Mobile Top 10|Die Mobile Top-10-Risiken]]&lt;br /&gt;
        | projectCategory =               [[Category: Germany/Projekte/Mobile Top 10-2016]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Mobile Top 10 fuer Entwickler]] [[Category: Germany/Projekte/Mobile Top 10 fuer Entwickler-2016]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Mobile Top Ten Section for Mobile Top 10 2016-CenterLinkTemplate --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Inhaltsverzeichnis&lt;br /&gt;
        | foreword =                      Vorwort&lt;br /&gt;
        | forewordTranslation =           Vorwort der deutschen Übersetzung&lt;br /&gt;
        | forward =                       Vorwort &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Vorwort der deutschen Übersetzung &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    Über OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright und Lizenz&lt;br /&gt;
        | introduction =                  Einleitung&lt;br /&gt;
        | releaseNotes =                  Neuerungen&lt;br /&gt;
        | risks =                         Risiken&lt;br /&gt;
        | risk =                          Risiko&lt;br /&gt;
        | subTitleApplicationRisks =      (Sicherheitsrisiken für Anwendungen)&lt;br /&gt;
        | riskLarge =                     RISIKO&lt;br /&gt;
        | applicationSecurityRisks =      Was sind Sicherheitsrisiken für Anwendungen? &lt;br /&gt;
        | theMobileTop10 =                Die Mobile Top-10-Risiken&lt;br /&gt;
        | mobileTop10 =                   Mobile Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        Nächste Schritte für Software-Entwickler&lt;br /&gt;
        | whatsNextforVerifiers =         Nächste Schritte für Prüfer&lt;br /&gt;
        | whatsNextforOrganizations =     Nächste Schritte für Organisationen&lt;br /&gt;
        | noteAboutRisks =                Anmerkungen zum Risikobegriff&lt;br /&gt;
        | detailsAboutRiskFactors =       Details zu Risiko-Faktoren&lt;br /&gt;
        | appendix =                      Anlage&lt;br /&gt;
        | warnings =                      Zur Beachtung&lt;br /&gt;
        | acknowledgements =              Danksagung&lt;br /&gt;
        | attribution =                   Namensnennung/Danksagung&lt;br /&gt;
        | whatChangedFrom2014to2016 =     Was hat sich von Version 2014 zu 2016 verändert?&lt;br /&gt;
        | welcome =                       Herzlich Willkommen&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          Was sind Sicherheitsrisiken für Anwendungen?&lt;br /&gt;
        | whatsMyRisk =                   Was sind &amp;lt;u&amp;gt;meine&amp;lt;/u&amp;gt; Risiken?&lt;br /&gt;
        | references =                    Referenzen&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Etablierung und Nutzung umfassender Sicherheitsmaßnahmen&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Starten Sie jetzt mit Ihrem Anwendungssicherheits-Programm!&lt;br /&gt;
        | getOrganized =                  Organisation und Prozesse &lt;br /&gt;
        | codeReview =                    Code-Analyse&lt;br /&gt;
        | securityAndPenetrationTesting = Sicherheits- und Penetrationstests&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    Es geht nicht um Schwachstellen, sondern um Risiken&lt;br /&gt;
        | mobileTop10RiskFactorSummary =        Zusammenfassung der Mobile Top 10 Risiko-Faktoren&lt;br /&gt;
        | additionalRisksToConsider =     Weitere zu betrachtende Risiken &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | improperPlatformUsage =         Improper Platform Usage&lt;br /&gt;
        | insecureDataStorage =           Insecure Data Storage&lt;br /&gt;
        | insecureCommunication =         Insecure Communication&lt;br /&gt;
        | insecureAuthentication =        Insecure Authentication&lt;br /&gt;
        | insufficientCryptography =      Insufficient Cryptography&lt;br /&gt;
        | insecureAuthorization =         Insecure Authorization&lt;br /&gt;
        | clientCodeQuality =             Poor Code Quality&lt;br /&gt;
        | codeTampering =                 Code Tampering&lt;br /&gt;
        | reverseEngineering =            Reverse Engineering&lt;br /&gt;
        | extraneousFunctionality =       Extraneous Functionality&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Fehler in Authentifizierung und Session-Management&lt;br /&gt;
        | authentication =                Authentifizierung &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Unsichere direkte Objektreferenzen&lt;br /&gt;
        | insecureDOR =                   Unsichere direkte Objektreferenzen&lt;br /&gt;
        | securityMisconfig =             Sicherheitsrelevante Fehlkonfiguration&lt;br /&gt;
        | misconfig =                     Fehlkonfiguration&lt;br /&gt;
        | sensitiveDataExposure =         Verlust der Vertraulichkeit sensibler Daten&amp;lt;noinclude&amp;gt;ex: Sensitive Data Exposure&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | sensData =                      Sens. Data&amp;lt;noinclude&amp;gt;(tbd)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | missingFunctionLevelACL =       Fehlerhafte Autorisierung auf Anwendungsebene &amp;lt;noinclude&amp;gt;(tbd = Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | functionAcc =                   Fehlerh. Autorisierung&amp;lt;noinclude&amp;gt;(tbd = Kurzform für Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Benutzen von Komponenten mit bekannten Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = Using Components with Known Vulnerabilities)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnComponents =                Komponenten mit Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = vuln. Components)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Ungeprüfte Um- und Weiterleitungen&lt;br /&gt;
        | unvalRedirects =                Ungepr. Weiterltg.&lt;br /&gt;
        | insecureCryptographicStorage =  Kryptografisch unsichere Speicherung&lt;br /&gt;
        | failureRestrictUrlAccess =      Mangelhafter URL-Zugriffsschutz&lt;br /&gt;
        | insufficientTLProtection =      Unzureichende Absicherung der Transportschicht&lt;br /&gt;
        | inProgress =                    In Arbeit &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Anwendungs-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | appSpecific =                   Anw.-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | applicationBusinessSpecific =   Anwendungs-/&amp;lt;br&amp;gt;Geschäftsspezifisch&lt;br /&gt;
        | appBusinessSpecific =           Anw.-/&amp;lt;br&amp;gt;Geschäftsspez. &lt;br /&gt;
        | exploitability =                Ausnutzbarkeit&lt;br /&gt;
        | easy =                          EINFACH&lt;br /&gt;
        | average =                       DURCHSCHNITTLICH&lt;br /&gt;
        | difficult =                     SCHWIERIG&lt;br /&gt;
        | weakness =                      &amp;lt;!-- not used ---&amp;gt; &amp;lt;!-- for table in Mobile_Top_10_2016-Risk --&amp;gt;&lt;br /&gt;
        | prevalence =                    Verbreitung&lt;br /&gt;
        | veryWidespread =                AUSSERGEWÖHNLICH HÄUFIG&lt;br /&gt;
        | widespread =                    SEHR HÄUFIG&lt;br /&gt;
        | common =                        HÄUFIG&lt;br /&gt;
        | uncommon =                      SELTEN&lt;br /&gt;
        | detectability =                 Auffindbarkeit&lt;br /&gt;
        | impact =                        Auswirkung&lt;br /&gt;
        | severe =                        SCHWERWIEGEND&lt;br /&gt;
        | moderate =                      MITTEL&lt;br /&gt;
        | minor =                         GERING  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Bedrohungsquelle&lt;br /&gt;
        | attackVectors =                 Angriffsvektor&lt;br /&gt;
        | securityWeakness =              Schwachstellen&lt;br /&gt;
        | technicalImpacts =              Technische Auswirkung&lt;br /&gt;
        | businessImpacts =               Auswirkung auf das Unternehmen&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 de threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 de attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 de securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 de technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 de businessImpacts.png  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Mobile Top 10 de ApplicationSecurityRisks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt;          &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Bin ich durch {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verwundbar?&lt;br /&gt;
        | vulnerableTo1 =                 Bin ich durch&lt;br /&gt;
        | vulnerableTo2 =                 &amp;amp;nbsp;verwundbar?&lt;br /&gt;
        | howPrevent =                    Wie kann ich {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verhindern?&lt;br /&gt;
        | howPrevent1 =                   Wie kann ich &lt;br /&gt;
        | howPrevent2 =                   &amp;amp;nbsp;verhindern?&lt;br /&gt;
        | exampleScenarios =              Mögliche Angriffsszenarien &lt;br /&gt;
        | defendingOption =               Verteidigungs-Option&lt;br /&gt;
        | against =                       gegen&lt;br /&gt;
        | userImpact =                    Auswirkung(en) auf den Benutzer &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;   &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;         &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      Andere                    &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;   &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      FEHLER im 'Language File' (Aufruf des unbenutzten Objekts)&lt;br /&gt;
        | #default =                      FEHLER im 'Language File' (Aufruf des unbekannten Objekts)&lt;br /&gt;
     }} &amp;lt;!-- End of German --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- English = default; so here is nothing to do --&amp;gt; &lt;br /&gt;
&amp;lt;!-- | en =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | us =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | gb =  --&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt; | #default = &amp;lt;!-- English --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootMobileTop10 =                 Mobile Top 10 {{{year}}}&lt;br /&gt;
        | documentRootMobileTop10DeveloperEdition = Mobile Top 10 {{{year}}} Developer Edition&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for Mobile Top 10 2016-CenterLinkTemplate + Mobile Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | mobileTop10TmpMessage =               &amp;lt;noinclude&amp;gt;==The Mobile Top 10-2016 Wiki is under Connstruction. The Content is Not Finished yet==&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | mobileTop10TmpMessageDeveloperEdition =   ==The Mobile Top 10-2016 Developer Edition Wiki is under Connstruction. The Content is Not Finished yet==&lt;br /&gt;
        | centerLink1 =                   [[Mobile Top 10 2016-Table of Contents | 2016 Table of Contents]]&lt;br /&gt;
        | centerLink2 =                   [[Mobile_Top_10_2016-Top 10|2016 Mobile Top 10 List]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Mobile Top 10 2016 Developer Edition-Table of Contents|2016 Developer Edition-Table of Contents]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Mobile Top 10 2016 Developer Edition-Mobile Top 10 List|2016 Developer Edition-Mobile Top 10 List]]&lt;br /&gt;
        | projectCategory =               [[Category:OWASP Mobile Top Ten Project]] [[Category:OWASP Mobile Top Ten {{{year}}} Project]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Mobile Top Ten {{{year}}} Developer Edition]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Table of Contents&lt;br /&gt;
        | foreword =                      Foreword&lt;br /&gt;
        | forewordTranslation =           Foreword of the English Wiki&lt;br /&gt;
        | forward =                       Forward &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Forward of the English Wiki &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    About OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright and License&lt;br /&gt;
        | introduction =                  Introduction&lt;br /&gt;
        | releaseNotes =                  Release Notes&lt;br /&gt;
        | risks =                         Risks&lt;br /&gt;
        | risk =                          Risk&lt;br /&gt;
        | subTitleApplicationRisks =      (Application Security Risks)&lt;br /&gt;
        | riskLarge =                     RISIK&lt;br /&gt;
        | applicationSecurityRisks =      Application Security Risks&lt;br /&gt;
        | theMobileTop10 =                The Mobile Top 10&lt;br /&gt;
        | mobileTop10 =                   Mobile Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        What's Next for Developers&lt;br /&gt;
        | whatsNextforVerifiers =         What's Next for Verifiers&lt;br /&gt;
        | whatsNextforOrganizations =     What's Next for Organizations&lt;br /&gt;
        | noteAboutRisks =                Note About Risks&lt;br /&gt;
        | detailsAboutRiskFactors =       Details About Risk Factors&lt;br /&gt;
        | appendix =                      appendix&lt;br /&gt;
        | warnings =                      Warnings&lt;br /&gt;
        | acknowledgements =              Acknowledgements&lt;br /&gt;
        | attribution =                   Attribution&lt;br /&gt;
        | whatChangedFrom2014to2016 =     What Changed From 2014 to 2016?&lt;br /&gt;
        | welcome =                       Welcome&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          What Are Application Security Risks?&lt;br /&gt;
        | whatsMyRisk =                   What's My Risk?&lt;br /&gt;
        | references =                    References&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Establish &amp;amp; Use Repeatable Security Processes and Standard Security Controls&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Start Your Application Security Program Now&lt;br /&gt;
        | getOrganized =                  Get Organized&lt;br /&gt;
        | codeReview =                    Code Review&lt;br /&gt;
        | securityAndPenetrationTesting = Security and Penetration Testing&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    It's About Risks, Not Weaknesses&lt;br /&gt;
        | mobileTop10RiskFactorSummary =  Mobile Top 10 Risk Factor Summary&lt;br /&gt;
        | additionalRisksToConsider =     Additional Risks to Consider  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | improperPlatformUsage =         Improper Platform Usage&lt;br /&gt;
        | insecureDataStorage =           Insecure Data Storage&lt;br /&gt;
        | insecureCommunication =         Insecure Communication&lt;br /&gt;
        | insecureAuthentication =        Insecure Authentication&lt;br /&gt;
        | insufficientCryptography =      Insufficient Cryptography&lt;br /&gt;
        | insecureAuthorization =         Insecure Authorization&lt;br /&gt;
        | clientCodeQuality =             Poor Code Quality&lt;br /&gt;
        | codeTampering =                 Code Tampering&lt;br /&gt;
        | reverseEngineering =            Reverse Engineering&lt;br /&gt;
        | extraneousFunctionality =       Extraneous Functionality&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Broken Authentication and Session Management&lt;br /&gt;
        | authentication =                Authentication &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Insecure Direct Object References&lt;br /&gt;
        | insecureDOR =                   Insecure DOR&lt;br /&gt;
        | securityMisconfig =             Security Misconfiguration&lt;br /&gt;
        | misconfig =                     Misconfig&lt;br /&gt;
        | sensitiveDataExposure =         Sensitive Data Exposure&lt;br /&gt;
        | sensData =                      Sens. Data&lt;br /&gt;
        | missingFunctionLevelACL =       Missing Function Level Access Control&lt;br /&gt;
        | functionAcc =                   Function Acc.&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Using Components with Known Vulnerabilities&lt;br /&gt;
        | vulnComponents =                vuln. Components&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Unvalidated Redirects and Forwards&lt;br /&gt;
        | unvalRedirects =                unval. Redirects&lt;br /&gt;
        | insecureCryptographicStorage =  Insecure Cryptographic Storage&lt;br /&gt;
        | failureRestrictUrlAccess =      Failure to Restrict URL Access&lt;br /&gt;
        | insufficientTLProtection =      Insufficient Transport Layer Protection&lt;br /&gt;
        | inProgress =                    In Progress &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Application Specific&lt;br /&gt;
        | appSpecific =                   App Specific&lt;br /&gt;
        | applicationBusinessSpecific =   Application / Business Specific  &lt;br /&gt;
        | appBusinessSpecific =           App / Business Specific       &lt;br /&gt;
        | exploitability =                Exploitability&lt;br /&gt;
        | easy =                          EASY&lt;br /&gt;
        | average =                       AVERAGE&lt;br /&gt;
        | difficult =                     DIFFICULT&lt;br /&gt;
        | weakness =                      Weakness &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt; &lt;br /&gt;
        | prevalence =                    Prevalence&lt;br /&gt;
        | veryWidespread =                VERY WIDESPREAD&lt;br /&gt;
        | widespread =                    WIDESPREAD&lt;br /&gt;
        | common =                        COMMON&lt;br /&gt;
        | uncommon =                      UNCOMMON&lt;br /&gt;
        | detectability =                 Detectability&lt;br /&gt;
        | impact =                        Impact&lt;br /&gt;
        | severe =                        SEVERE&lt;br /&gt;
        | moderate =                      MODERATE&lt;br /&gt;
        | minor =                         MINOR &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Threat Agents&lt;br /&gt;
        | attackVectors =                 Attack Vectors&lt;br /&gt;
        | securityWeakness =              Security Weakness&lt;br /&gt;
        | technicalImpacts =              Technical Impacts&lt;br /&gt;
        | businessImpacts =               Business Impacts&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 businessImpacts.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Mobile_Top_10_2016-appsec-risks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Am I Vulnerable To {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | vulnerableTo1 =                 Am I Vulnerable To&lt;br /&gt;
        | vulnerableTo2 =                 ?&lt;br /&gt;
        | howPrevent =                    How Do I Prevent {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | howPrevent1 =                   How Do I Prevent&lt;br /&gt;
        | howPrevent2 =                   ?&lt;br /&gt;
        | exampleScenarios =              Example Attack Scenarios &lt;br /&gt;
        | defendingOption =               Defending Option&lt;br /&gt;
        | against =                       against&lt;br /&gt;
        | userImpact =                    Impact to the User &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      External &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      ERROR in the 'Language File' (Use of the unused Object)&lt;br /&gt;
        | #default =                      ERROR in the 'Language File' (Use of an unknown Object)&lt;br /&gt;
     }} &amp;lt;!-- End of English --&amp;gt;&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:ByTheNumbers&amp;diff=225556</id>
		<title>Template:Mobile Top 10 2016:ByTheNumbers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:ByTheNumbers&amp;diff=225556"/>
				<updated>2017-01-24T18:58:12Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!---------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- Template:Mobile Top 10 2016:ByTheNumbers                  --&amp;gt;&lt;br /&gt;
&amp;lt;!---------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
  &amp;lt;nowiki&amp;gt;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
=== '''Example:''' ===&lt;br /&gt;
  &amp;lt;nowiki&amp;gt;{{Mobile_Top_10_2016:ByTheNumbers|1|language=de|year=2016}}&lt;br /&gt;
 {{Mobile_Top_10_2016:ByTheNumbers|2|year=2016}}   &amp;lt;!-- Default-Language = English ---&amp;gt;&lt;br /&gt;
 {{Mobile_Top_10_2016:ByTheNumbers|2|language=de}} &amp;lt;!-- Default-Year = 2010 ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; width=&amp;quot;100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;min-width: 4%&amp;quot;  |Number &lt;br /&gt;
! style=&amp;quot;min-width: 48%&amp;quot; |English 2016 &lt;br /&gt;
! style=&amp;quot;min-width: 48%&amp;quot; |German 2016&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|1}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|1|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|2}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|2|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|3}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|3|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|4}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|4|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|5}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|5|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|6}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|6|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|7}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|7|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|8}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|8|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|9}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|9|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|10}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|10|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|11}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|11|language=de}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{year}}}&lt;br /&gt;
    | #default = &lt;br /&gt;
        {{#switch: {{{1}}}&lt;br /&gt;
            | 1={{Mobile_Top_10:LanguageFile|text=improperPlatformUsage|language={{{language}}} }}&lt;br /&gt;
            | 2={{Mobile_Top_10:LanguageFile|text=insecureDataStorage|language={{{language}}} }}&lt;br /&gt;
            | 3={{Mobile_Top_10:LanguageFile|text=insecureCommunication|language={{{language}}} }}&lt;br /&gt;
            | 4={{Mobile_Top_10:LanguageFile|text=insecureAuthentication|language={{{language}}} }}&lt;br /&gt;
            | 5={{Mobile_Top_10:LanguageFile|text=insufficientCryptography|language={{{language}}} }}&lt;br /&gt;
            | 6={{Mobile_Top_10:LanguageFile|text=insecureAuthorization|language={{{language}}} }}&lt;br /&gt;
            | 7={{Mobile_Top_10:LanguageFile|text=clientCodeQuality|language={{{language}}} }}&lt;br /&gt;
            | 8={{Mobile_Top_10:LanguageFile|text=codeTampering|language={{{language}}} }}&lt;br /&gt;
            | 9={{Mobile_Top_10:LanguageFile|text=reverseEngineering|language={{{language}}} }}&lt;br /&gt;
            | 10={{Mobile_Top_10:LanguageFile|text=extraneousFunctionality|language={{{language}}} }}&lt;br /&gt;
            | 11={{Mobile_Top_10:LanguageFile|text=inProgress|language={{{language}}} }}&lt;br /&gt;
        }}&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:LanguageFile&amp;diff=225555</id>
		<title>Template:Mobile Top 10:LanguageFile</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:LanguageFile&amp;diff=225555"/>
				<updated>2017-01-24T18:58:05Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!-----------------------------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- This File contains all the text that is used by OWASP Mobile Top 10 Templates --&amp;gt;&lt;br /&gt;
&amp;lt;!--             Please add a new language solely here!!!                          --&amp;gt;&lt;br /&gt;
&amp;lt;!-----------------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
This File contains all the text that is used by OWASP Mobile Top 10 Templates&amp;lt;br/&amp;gt;&lt;br /&gt;
Please leave a message to {{Template:Contact | name = Jonathan Carter | email =jonathan.carter@owasp.org | username = Jonathan Carter}} &lt;br /&gt;
if you liked to add a new localization&amp;lt;br&amp;gt;                     &lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
If you use an undefined language you will get English output (default language).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Mobile_Top_10:LanguageFile&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |text=&amp;lt;parameter&amp;gt; &amp;lt;!-- take one of the defined parmeters, e.g. tableOfContents --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |language=&amp;lt;your language&amp;gt;   &amp;lt;!-- actually only English (=en) and German (=de) are valid parameters) --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |year=&amp;lt;year&amp;gt;   &amp;lt;!-- optional for some texts --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
====Example:====&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Mobile_Top_10:LanguageFile|text=tableOfContents|language=de}} =&amp;gt;&amp;lt;/nowiki&amp;gt; {{Mobile_Top_10:LanguageFile|text=tableOfContents|language=de}}&lt;br /&gt;
----&lt;br /&gt;
==='''Healthcheck'''===&lt;br /&gt;
tbd.&amp;lt;br/&amp;gt;&lt;br /&gt;
In the meantime, please check:&lt;br /&gt;
* [[Mobile_Top_10_2016-Table_of_Contents | English Mobile Top 10 Wiki]]&lt;br /&gt;
* [[Germany/Projekte/Mobile_Top_10-2016-Inhaltsverzeichnis | German Mobile Top 10 Wiki]]&lt;br /&gt;
----&lt;br /&gt;
If you use an unknown parameter you will get the following Error message in your wiki page:&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{language}}}&lt;br /&gt;
   | de = &amp;lt;!-- German --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootMobileTop10 =                 Germany/Projekte/Mobile Top 10-{{{year}}}&lt;br /&gt;
        | documentRootMobileTop10DeveloperEdition = Germany/Projekte/Mobile Top 10 fuer Entwickler-{{{year}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for Mobile Top 10 2016-CenterLinkTemplate + Mobile Top 10 2016:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | mobileTop10TmpMessage =               ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Mobile Top 10-2016==&lt;br /&gt;
        | mobileTop10TmpMessageDeveloperEdition = ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Mobile Top 10 fuer Entwickler-2016==&lt;br /&gt;
        | centerLink1 =                   [[Germany/Projekte/Mobile Top 10-2016-Inhaltsverzeichnis|2013 Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2 =                   [[Germany/Projekte/Mobile Top 10-2016-Top 10|2016 Die Mobile-Top-10-Risiken]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Germany/Projekte/Mobile Top 10 fuer Entwickler-2016/Inhaltsverzeichnis|Mobile Top 10 fuer Entwickler-2016: Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Germany/Projekte/Mobile Top 10 fuer Entwickler-2016/Mobile Top 10|Die Mobile Top-10-Risiken]]&lt;br /&gt;
        | projectCategory =               [[Category: Germany/Projekte/Mobile Top 10-2016]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Mobile Top 10 fuer Entwickler]] [[Category: Germany/Projekte/Mobile Top 10 fuer Entwickler-2016]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Mobile Top Ten Section for Mobile Top 10 2016-CenterLinkTemplate --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Inhaltsverzeichnis&lt;br /&gt;
        | foreword =                      Vorwort&lt;br /&gt;
        | forewordTranslation =           Vorwort der deutschen Übersetzung&lt;br /&gt;
        | forward =                       Vorwort &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Vorwort der deutschen Übersetzung &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    Über OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright und Lizenz&lt;br /&gt;
        | introduction =                  Einleitung&lt;br /&gt;
        | releaseNotes =                  Neuerungen&lt;br /&gt;
        | risks =                         Risiken&lt;br /&gt;
        | risk =                          Risiko&lt;br /&gt;
        | subTitleApplicationRisks =      (Sicherheitsrisiken für Anwendungen)&lt;br /&gt;
        | riskLarge =                     RISIKO&lt;br /&gt;
        | applicationSecurityRisks =      Was sind Sicherheitsrisiken für Anwendungen? &lt;br /&gt;
        | theMobileTop10 =                Die Mobile Top-10-Risiken&lt;br /&gt;
        | mobileTop10 =                   Mobile Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        Nächste Schritte für Software-Entwickler&lt;br /&gt;
        | whatsNextforVerifiers =         Nächste Schritte für Prüfer&lt;br /&gt;
        | whatsNextforOrganizations =     Nächste Schritte für Organisationen&lt;br /&gt;
        | noteAboutRisks =                Anmerkungen zum Risikobegriff&lt;br /&gt;
        | detailsAboutRiskFactors =       Details zu Risiko-Faktoren&lt;br /&gt;
        | appendix =                      Anlage&lt;br /&gt;
        | warnings =                      Zur Beachtung&lt;br /&gt;
        | acknowledgements =              Danksagung&lt;br /&gt;
        | attribution =                   Namensnennung/Danksagung&lt;br /&gt;
        | whatChangedFrom2014to2016 =     Was hat sich von Version 2014 zu 2016 verändert?&lt;br /&gt;
        | welcome =                       Herzlich Willkommen&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          Was sind Sicherheitsrisiken für Anwendungen?&lt;br /&gt;
        | whatsMyRisk =                   Was sind &amp;lt;u&amp;gt;meine&amp;lt;/u&amp;gt; Risiken?&lt;br /&gt;
        | references =                    Referenzen&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Etablierung und Nutzung umfassender Sicherheitsmaßnahmen&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Starten Sie jetzt mit Ihrem Anwendungssicherheits-Programm!&lt;br /&gt;
        | getOrganized =                  Organisation und Prozesse &lt;br /&gt;
        | codeReview =                    Code-Analyse&lt;br /&gt;
        | securityAndPenetrationTesting = Sicherheits- und Penetrationstests&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    Es geht nicht um Schwachstellen, sondern um Risiken&lt;br /&gt;
        | mobileTop10RiskFactorSummary =        Zusammenfassung der Mobile Top 10 Risiko-Faktoren&lt;br /&gt;
        | additionalRisksToConsider =     Weitere zu betrachtende Risiken &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Fehler in Authentifizierung und Session-Management&lt;br /&gt;
        | authentication =                Authentifizierung &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Unsichere direkte Objektreferenzen&lt;br /&gt;
        | insecureDOR =                   Unsichere direkte Objektreferenzen&lt;br /&gt;
        | securityMisconfig =             Sicherheitsrelevante Fehlkonfiguration&lt;br /&gt;
        | misconfig =                     Fehlkonfiguration&lt;br /&gt;
        | sensitiveDataExposure =         Verlust der Vertraulichkeit sensibler Daten&amp;lt;noinclude&amp;gt;ex: Sensitive Data Exposure&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | sensData =                      Sens. Data&amp;lt;noinclude&amp;gt;(tbd)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | missingFunctionLevelACL =       Fehlerhafte Autorisierung auf Anwendungsebene &amp;lt;noinclude&amp;gt;(tbd = Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | functionAcc =                   Fehlerh. Autorisierung&amp;lt;noinclude&amp;gt;(tbd = Kurzform für Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Benutzen von Komponenten mit bekannten Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = Using Components with Known Vulnerabilities)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnComponents =                Komponenten mit Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = vuln. Components)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Ungeprüfte Um- und Weiterleitungen&lt;br /&gt;
        | unvalRedirects =                Ungepr. Weiterltg.&lt;br /&gt;
        | insecureCryptographicStorage =  Kryptografisch unsichere Speicherung&lt;br /&gt;
        | failureRestrictUrlAccess =      Mangelhafter URL-Zugriffsschutz&lt;br /&gt;
        | insufficientTLProtection =      Unzureichende Absicherung der Transportschicht&lt;br /&gt;
        | inProgress =                    In Arbeit &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Anwendungs-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | appSpecific =                   Anw.-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | applicationBusinessSpecific =   Anwendungs-/&amp;lt;br&amp;gt;Geschäftsspezifisch&lt;br /&gt;
        | appBusinessSpecific =           Anw.-/&amp;lt;br&amp;gt;Geschäftsspez. &lt;br /&gt;
        | exploitability =                Ausnutzbarkeit&lt;br /&gt;
        | easy =                          EINFACH&lt;br /&gt;
        | average =                       DURCHSCHNITTLICH&lt;br /&gt;
        | difficult =                     SCHWIERIG&lt;br /&gt;
        | weakness =                      &amp;lt;!-- not used ---&amp;gt; &amp;lt;!-- for table in Mobile_Top_10_2016-Risk --&amp;gt;&lt;br /&gt;
        | prevalence =                    Verbreitung&lt;br /&gt;
        | veryWidespread =                AUSSERGEWÖHNLICH HÄUFIG&lt;br /&gt;
        | widespread =                    SEHR HÄUFIG&lt;br /&gt;
        | common =                        HÄUFIG&lt;br /&gt;
        | uncommon =                      SELTEN&lt;br /&gt;
        | detectability =                 Auffindbarkeit&lt;br /&gt;
        | impact =                        Auswirkung&lt;br /&gt;
        | severe =                        SCHWERWIEGEND&lt;br /&gt;
        | moderate =                      MITTEL&lt;br /&gt;
        | minor =                         GERING  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Bedrohungsquelle&lt;br /&gt;
        | attackVectors =                 Angriffsvektor&lt;br /&gt;
        | securityWeakness =              Schwachstellen&lt;br /&gt;
        | technicalImpacts =              Technische Auswirkung&lt;br /&gt;
        | businessImpacts =               Auswirkung auf das Unternehmen&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 de threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 de attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 de securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 de technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 de businessImpacts.png  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Mobile Top 10 de ApplicationSecurityRisks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt;          &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Bin ich durch {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verwundbar?&lt;br /&gt;
        | vulnerableTo1 =                 Bin ich durch&lt;br /&gt;
        | vulnerableTo2 =                 &amp;amp;nbsp;verwundbar?&lt;br /&gt;
        | howPrevent =                    Wie kann ich {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verhindern?&lt;br /&gt;
        | howPrevent1 =                   Wie kann ich &lt;br /&gt;
        | howPrevent2 =                   &amp;amp;nbsp;verhindern?&lt;br /&gt;
        | exampleScenarios =              Mögliche Angriffsszenarien &lt;br /&gt;
        | defendingOption =               Verteidigungs-Option&lt;br /&gt;
        | against =                       gegen&lt;br /&gt;
        | userImpact =                    Auswirkung(en) auf den Benutzer &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;   &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;         &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      Andere                    &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;   &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      FEHLER im 'Language File' (Aufruf des unbenutzten Objekts)&lt;br /&gt;
        | #default =                      FEHLER im 'Language File' (Aufruf des unbekannten Objekts)&lt;br /&gt;
     }} &amp;lt;!-- End of German --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- English = default; so here is nothing to do --&amp;gt; &lt;br /&gt;
&amp;lt;!-- | en =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | us =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | gb =  --&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt; | #default = &amp;lt;!-- English --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootMobileTop10 =                 Mobile Top 10 {{{year}}}&lt;br /&gt;
        | documentRootMobileTop10DeveloperEdition = Mobile Top 10 {{{year}}} Developer Edition&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for Mobile Top 10 2016-CenterLinkTemplate + Mobile Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | mobileTop10TmpMessage =               &amp;lt;noinclude&amp;gt;==The Mobile Top 10-2016 Wiki is under Connstruction. The Content is Not Finished yet==&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | mobileTop10TmpMessageDeveloperEdition =   ==The Mobile Top 10-2016 Developer Edition Wiki is under Connstruction. The Content is Not Finished yet==&lt;br /&gt;
        | centerLink1 =                   [[Mobile Top 10 2016-Table of Contents | 2016 Table of Contents]]&lt;br /&gt;
        | centerLink2 =                   [[Mobile_Top_10_2016-Top 10|2016 Mobile Top 10 List]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Mobile Top 10 2016 Developer Edition-Table of Contents|2016 Developer Edition-Table of Contents]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Mobile Top 10 2016 Developer Edition-Mobile Top 10 List|2016 Developer Edition-Mobile Top 10 List]]&lt;br /&gt;
        | projectCategory =               [[Category:OWASP Mobile Top Ten Project]] [[Category:OWASP Mobile Top Ten {{{year}}} Project]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Mobile Top Ten {{{year}}} Developer Edition]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Table of Contents&lt;br /&gt;
        | foreword =                      Foreword&lt;br /&gt;
        | forewordTranslation =           Foreword of the English Wiki&lt;br /&gt;
        | forward =                       Forward &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Forward of the English Wiki &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    About OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright and License&lt;br /&gt;
        | introduction =                  Introduction&lt;br /&gt;
        | releaseNotes =                  Release Notes&lt;br /&gt;
        | risks =                         Risks&lt;br /&gt;
        | risk =                          Risk&lt;br /&gt;
        | subTitleApplicationRisks =      (Application Security Risks)&lt;br /&gt;
        | riskLarge =                     RISIK&lt;br /&gt;
        | applicationSecurityRisks =      Application Security Risks&lt;br /&gt;
        | theMobileTop10 =                The Mobile Top 10&lt;br /&gt;
        | mobileTop10 =                   Mobile Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        What's Next for Developers&lt;br /&gt;
        | whatsNextforVerifiers =         What's Next for Verifiers&lt;br /&gt;
        | whatsNextforOrganizations =     What's Next for Organizations&lt;br /&gt;
        | noteAboutRisks =                Note About Risks&lt;br /&gt;
        | detailsAboutRiskFactors =       Details About Risk Factors&lt;br /&gt;
        | appendix =                      appendix&lt;br /&gt;
        | warnings =                      Warnings&lt;br /&gt;
        | acknowledgements =              Acknowledgements&lt;br /&gt;
        | attribution =                   Attribution&lt;br /&gt;
        | whatChangedFrom2014to2016 =     What Changed From 2014 to 2016?&lt;br /&gt;
        | welcome =                       Welcome&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          What Are Application Security Risks?&lt;br /&gt;
        | whatsMyRisk =                   What's My Risk?&lt;br /&gt;
        | references =                    References&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Establish &amp;amp; Use Repeatable Security Processes and Standard Security Controls&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Start Your Application Security Program Now&lt;br /&gt;
        | getOrganized =                  Get Organized&lt;br /&gt;
        | codeReview =                    Code Review&lt;br /&gt;
        | securityAndPenetrationTesting = Security and Penetration Testing&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    It's About Risks, Not Weaknesses&lt;br /&gt;
        | mobileTop10RiskFactorSummary =  Mobile Top 10 Risk Factor Summary&lt;br /&gt;
        | additionalRisksToConsider =     Additional Risks to Consider  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | improperPlatformUsage =&lt;br /&gt;
        | insecureDataStorage =&lt;br /&gt;
        | insecureCommunication = &lt;br /&gt;
        | insecureAuthentication = &lt;br /&gt;
        | insufficientCryptography =&lt;br /&gt;
        | insecureAuthorization = &lt;br /&gt;
        | clientCodeQuality =&lt;br /&gt;
        | codeTampering =&lt;br /&gt;
        | reverseEngineering =&lt;br /&gt;
        | extraneousFunctionality =&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Broken Authentication and Session Management&lt;br /&gt;
        | authentication =                Authentication &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Insecure Direct Object References&lt;br /&gt;
        | insecureDOR =                   Insecure DOR&lt;br /&gt;
        | securityMisconfig =             Security Misconfiguration&lt;br /&gt;
        | misconfig =                     Misconfig&lt;br /&gt;
        | sensitiveDataExposure =         Sensitive Data Exposure&lt;br /&gt;
        | sensData =                      Sens. Data&lt;br /&gt;
        | missingFunctionLevelACL =       Missing Function Level Access Control&lt;br /&gt;
        | functionAcc =                   Function Acc.&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Using Components with Known Vulnerabilities&lt;br /&gt;
        | vulnComponents =                vuln. Components&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Unvalidated Redirects and Forwards&lt;br /&gt;
        | unvalRedirects =                unval. Redirects&lt;br /&gt;
        | insecureCryptographicStorage =  Insecure Cryptographic Storage&lt;br /&gt;
        | failureRestrictUrlAccess =      Failure to Restrict URL Access&lt;br /&gt;
        | insufficientTLProtection =      Insufficient Transport Layer Protection&lt;br /&gt;
        | inProgress =                    In Progress &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Mobile Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Application Specific&lt;br /&gt;
        | appSpecific =                   App Specific&lt;br /&gt;
        | applicationBusinessSpecific =   Application / Business Specific  &lt;br /&gt;
        | appBusinessSpecific =           App / Business Specific       &lt;br /&gt;
        | exploitability =                Exploitability&lt;br /&gt;
        | easy =                          EASY&lt;br /&gt;
        | average =                       AVERAGE&lt;br /&gt;
        | difficult =                     DIFFICULT&lt;br /&gt;
        | weakness =                      Weakness &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt; &lt;br /&gt;
        | prevalence =                    Prevalence&lt;br /&gt;
        | veryWidespread =                VERY WIDESPREAD&lt;br /&gt;
        | widespread =                    WIDESPREAD&lt;br /&gt;
        | common =                        COMMON&lt;br /&gt;
        | uncommon =                      UNCOMMON&lt;br /&gt;
        | detectability =                 Detectability&lt;br /&gt;
        | impact =                        Impact&lt;br /&gt;
        | severe =                        SEVERE&lt;br /&gt;
        | moderate =                      MODERATE&lt;br /&gt;
        | minor =                         MINOR &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Mobile Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Threat Agents&lt;br /&gt;
        | attackVectors =                 Attack Vectors&lt;br /&gt;
        | securityWeakness =              Security Weakness&lt;br /&gt;
        | technicalImpacts =              Technical Impacts&lt;br /&gt;
        | businessImpacts =               Business Impacts&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 businessImpacts.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Mobile_Top_10_2016-appsec-risks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Am I Vulnerable To {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | vulnerableTo1 =                 Am I Vulnerable To&lt;br /&gt;
        | vulnerableTo2 =                 ?&lt;br /&gt;
        | howPrevent =                    How Do I Prevent {{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | howPrevent1 =                   How Do I Prevent&lt;br /&gt;
        | howPrevent2 =                   ?&lt;br /&gt;
        | exampleScenarios =              Example Attack Scenarios &lt;br /&gt;
        | defendingOption =               Defending Option&lt;br /&gt;
        | against =                       against&lt;br /&gt;
        | userImpact =                    Impact to the User &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      External &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      ERROR in the 'Language File' (Use of the unused Object)&lt;br /&gt;
        | #default =                      ERROR in the 'Language File' (Use of an unknown Object)&lt;br /&gt;
     }} &amp;lt;!-- End of English --&amp;gt;&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile2016NextLink&amp;diff=225554</id>
		<title>Template:Mobile2016NextLink</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile2016NextLink&amp;diff=225554"/>
				<updated>2017-01-24T18:42:13Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{{1}}}&amp;lt;span style=&amp;quot;font-size:120%;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;amp;rarr;&amp;lt;/span&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[{{Mobile_Top_10:LanguageFile|text=documentRootMobileTop10|language={{{language}}}|year={{{year}}} }}-{{{1}}}|{{{1}}}&amp;lt;span style=&amp;quot;font-size:120%;&amp;quot;&amp;gt;&amp;amp;nbsp;&amp;amp;rarr;&amp;lt;/span&amp;gt;]]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile2016PrevLink&amp;diff=225553</id>
		<title>Template:Mobile2016PrevLink</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile2016PrevLink&amp;diff=225553"/>
				<updated>2017-01-24T18:41:27Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;&amp;lt;span style=&amp;quot;font-size:120%;&amp;quot;&amp;gt;&amp;amp;larr;&amp;amp;nbsp;&amp;lt;/span&amp;gt;{{{1}}}&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[{{Mobile_Top_10:LanguageFile|text=documentRootMobileTop10|language={{{language}}}|year={{{year}}} }}-{{{1}}}|&amp;lt;span style=&amp;quot;font-size:120%;&amp;quot;&amp;gt;&amp;amp;larr;&amp;amp;nbsp;&amp;lt;/span&amp;gt;{{{1}}}]]&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableHeaderEndTemplate&amp;diff=225503</id>
		<title>Template:Mobile Top 10 2016:SummaryTableHeaderEndTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableHeaderEndTemplate&amp;diff=225503"/>
				<updated>2017-01-23T20:32:50Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;     &amp;lt;td style=&amp;quot;font-size: 100%; font-weight: bold; background-color: #D9D9D9; color: #000000; border: 3px solid #444444&amp;quot;&amp;gt; {{Top_10:LanguageFile|text=applicationBusinessSpecif...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;     &amp;lt;td style=&amp;quot;font-size: 100%; font-weight: bold; background-color: #D9D9D9; color: #000000; border: 3px solid #444444&amp;quot;&amp;gt; {{Top_10:LanguageFile|text=applicationBusinessSpecific|language={{{language}}} }} &amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr valign=&amp;quot;top&amp;quot;&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableValue-3-Template&amp;diff=225502</id>
		<title>Template:Mobile Top 10 2016:SummaryTableValue-3-Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableValue-3-Template&amp;diff=225502"/>
				<updated>2017-01-23T20:31:37Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;&amp;lt;td style=&amp;quot;{{{style}}}; background-color: #FFFF00; color: #000000; border: 3px solid #444444&amp;quot; width=&amp;quot;16.5%&amp;quot;&amp;gt;{{{1}}} {{{2}}}&amp;lt;/td&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;td style=&amp;quot;{{{style}}}; background-color: #FFFF00; color: #000000; border: 3px solid #444444&amp;quot; width=&amp;quot;16.5%&amp;quot;&amp;gt;{{{1}}}&lt;br /&gt;
{{{2}}}&amp;lt;/td&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableValue-2-Template&amp;diff=225501</id>
		<title>Template:Mobile Top 10 2016:SummaryTableValue-2-Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableValue-2-Template&amp;diff=225501"/>
				<updated>2017-01-23T20:31:14Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;&amp;lt;td style=&amp;quot;{{{style}}}; background-color: #FFB200; color: #000000; border: 3px solid #444444&amp;quot; width=&amp;quot;16.5%&amp;quot;&amp;gt;{{{1}}} {{{2}}}&amp;lt;/td&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;td style=&amp;quot;{{{style}}}; background-color: #FFB200; color: #000000; border: 3px solid #444444&amp;quot; width=&amp;quot;16.5%&amp;quot;&amp;gt;{{{1}}}&lt;br /&gt;
{{{2}}}&amp;lt;/td&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableValue-0-Template&amp;diff=225500</id>
		<title>Template:Mobile Top 10 2016:SummaryTableValue-0-Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableValue-0-Template&amp;diff=225500"/>
				<updated>2017-01-23T20:30:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;&amp;lt;td style=&amp;quot;background-color: #FF00FF; color: #000000; border: 3px solid #444444&amp;quot; width=&amp;quot;16.5%&amp;quot;&amp;gt;{{{1}}} {{{2}}}&amp;lt;/td&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;td style=&amp;quot;background-color: #FF00FF; color: #000000; border: 3px solid #444444&amp;quot; width=&amp;quot;16.5%&amp;quot;&amp;gt;{{{1}}}&lt;br /&gt;
{{{2}}}&amp;lt;/td&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableValue-1-Template&amp;diff=225499</id>
		<title>Template:Mobile Top 10 2016:SummaryTableValue-1-Template</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SummaryTableValue-1-Template&amp;diff=225499"/>
				<updated>2017-01-23T20:30:14Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;&amp;lt;td style=&amp;quot;{{{style}}}; background-color: #FF0000; color: #000000; border: 3px solid #444444&amp;quot; width=&amp;quot;16.5%&amp;quot;&amp;gt;{{{1}}} {{{2}}}&amp;lt;/td&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;td style=&amp;quot;{{{style}}}; background-color: #FF0000; color: #000000; border: 3px solid #444444&amp;quot; width=&amp;quot;16.5%&amp;quot;&amp;gt;{{{1}}}&lt;br /&gt;
{{{2}}}&amp;lt;/td&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:SummaryTableTemplate&amp;diff=225497</id>
		<title>Template:Mobile Top 10:SummaryTableTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:SummaryTableTemplate&amp;diff=225497"/>
				<updated>2017-01-23T20:12:50Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;==Usage==   &amp;lt;nowiki&amp;gt;  {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016}}  {{Mobile_Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impa...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Usage==&lt;br /&gt;
  &amp;lt;nowiki&amp;gt;&lt;br /&gt;
 {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016}}&lt;br /&gt;
 {{Mobile_Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2016}}&lt;br /&gt;
 {{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
 {{Mobile_Top_10_2016:SummaryTableEndTemplate|year=2016}}&lt;br /&gt;
 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|year=2016}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2016}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableEndTemplate|year=2016}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
  &amp;lt;nowiki&amp;gt;&lt;br /&gt;
 {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|language=de|year=2016}}&lt;br /&gt;
 {{Mobile_Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2016|language=de}}&lt;br /&gt;
 {{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
 {{Mobile_Top_10_2016:SummaryTableEndTemplate|year=2016}}&lt;br /&gt;
 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|language=de|year=2016}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2016|language=de}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableEndTemplate|year=2016}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
  &amp;lt;nowiki&amp;gt;&lt;br /&gt;
 {{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|language=de|year=2016}}&lt;br /&gt;
 {{Mobile_Top_10:SummaryTableTemplate|exploitability=2|prevalence=0|detectability=1|impact=2|year=2016|language=de}}&lt;br /&gt;
 {{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
 {{Mobile_Top_10_2016:SummaryTableEndTemplate|year=2016}}&lt;br /&gt;
 &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderBeginTemplate|language=de|year=2016}}&lt;br /&gt;
{{Mobile_Top_10:SummaryTableTemplate|type=valueOnly|exploitability=2|prevalence=0|detectability=1|impact=2|year=2016|language=de}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableHeaderEndTemplate|year=2016}}&lt;br /&gt;
{{Mobile_Top_10_2016:SummaryTableEndTemplate|year=2016}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt; {{#switch: {{{type}}}&lt;br /&gt;
   | valueOnly = &lt;br /&gt;
     {{#switch: {{{exploitability}}}&lt;br /&gt;
      |1&lt;br /&gt;
      |easy=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-1-Template||{{Mobile_Top_10:LanguageFile|text=easy|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |2&lt;br /&gt;
      |average=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-2-Template||{{Mobile_Top_10:LanguageFile|text=average|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |3&lt;br /&gt;
      |difficult=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-3-Template||{{Mobile_Top_10:LanguageFile|text=difficult|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
     }}&lt;br /&gt;
   &lt;br /&gt;
     {{#switch: {{{prevalence}}}&lt;br /&gt;
      |0&lt;br /&gt;
      |veryWidespread=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-0-Template||{{Mobile_Top_10:LanguageFile|text=veryWidespread|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |1&lt;br /&gt;
      |widespread=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-1-Template||{{Mobile_Top_10:LanguageFile|text=widespread|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |2&lt;br /&gt;
      |common=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-2-Template||{{Mobile_Top_10:LanguageFile|text=common|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |3&lt;br /&gt;
      |uncommon=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-3-Template||{{Mobile_Top_10:LanguageFile|text=uncommon|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
     }}&lt;br /&gt;
&lt;br /&gt;
    {{#switch: {{{detectability}}}&lt;br /&gt;
      |1&lt;br /&gt;
      |easy=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-1-Template||{{Mobile_Top_10:LanguageFile|text=easy|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |2&lt;br /&gt;
      |average=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-2-Template||{{Mobile_Top_10:LanguageFile|text=average|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |3&lt;br /&gt;
      |difficult=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-3-Template||{{Mobile_Top_10:LanguageFile|text=difficult|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
     }}&lt;br /&gt;
&lt;br /&gt;
     {{#switch: {{{impact}}}&lt;br /&gt;
      |1&lt;br /&gt;
      |severe=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-1-Template||{{Mobile_Top_10:LanguageFile|text=severe|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |2&lt;br /&gt;
      |common=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-2-Template||{{Mobile_Top_10:LanguageFile|text=moderate|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |3&lt;br /&gt;
      |minor=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-3-Template||{{Mobile_Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
     }}&lt;br /&gt;
   | #default = {{#switch: {{{exploitability}}}&lt;br /&gt;
      |1&lt;br /&gt;
      |easy=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-1-Template|{{Mobile_Top_10:LanguageFile|text=exploitability|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=easy|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |2&lt;br /&gt;
      |average=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-2-Template|{{Mobile_Top_10:LanguageFile|text=exploitability|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=average|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |3&lt;br /&gt;
      |difficult=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-3-Template|{{Mobile_Top_10:LanguageFile|text=exploitability|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=difficult|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
     }}&lt;br /&gt;
   &lt;br /&gt;
     {{#switch: {{{prevalence}}}&lt;br /&gt;
      |0&lt;br /&gt;
      |veryWidespread=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-0-Template|{{Mobile_Top_10:LanguageFile|text=prevalence|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=veryWidespread|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |1&lt;br /&gt;
      |widespread=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-1-Template|{{Mobile_Top_10:LanguageFile|text=prevalence|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=widespread|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |2&lt;br /&gt;
      |common=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-2-Template|{{Mobile_Top_10:LanguageFile|text=prevalence|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=common|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |3&lt;br /&gt;
      |uncommon=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-3-Template|{{Mobile_Top_10:LanguageFile|text=prevalence|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=uncommon|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
     }}&lt;br /&gt;
&lt;br /&gt;
    {{#switch: {{{detectability}}}&lt;br /&gt;
      |1&lt;br /&gt;
      |easy=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-1-Template|{{Mobile_Top_10:LanguageFile|text=detectability|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=easy|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |2&lt;br /&gt;
      |average=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-2-Template|{{Mobile_Top_10:LanguageFile|text=detectability|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=average|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |3&lt;br /&gt;
      |difficult=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-3-Template|{{Mobile_Top_10:LanguageFile|text=detectability|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=difficult|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
     }}&lt;br /&gt;
&lt;br /&gt;
     {{#switch: {{{impact}}}&lt;br /&gt;
      |1&lt;br /&gt;
      |severe=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-1-Template|{{Mobile_Top_10:LanguageFile|text=impact|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=severe|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |2&lt;br /&gt;
      |common=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-2-Template|{{Mobile_Top_10:LanguageFile|text=impact|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=moderate|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
      |3&lt;br /&gt;
      |minor=&lt;br /&gt;
        {{Mobile_Top_10_2016:SummaryTableValue-3-Template|{{Mobile_Top_10:LanguageFile|text=impact|language={{{language}}} }}|{{Mobile_Top_10:LanguageFile|text=minor|language={{{language}}} }}|year={{{year}}}|style={{{style}}} }}&lt;br /&gt;
     }}&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:RoundedBoxLinkBegin&amp;diff=225493</id>
		<title>Template:Mobile Top 10:RoundedBoxLinkBegin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:RoundedBoxLinkBegin&amp;diff=225493"/>
				<updated>2017-01-23T19:38:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[MobileTopTen2016-M{{{risk}}} | &lt;br /&gt;
{{Top 10:RoundedBoxBegin|year={{{year}}} }}&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:RoundedBoxLinkBegin&amp;diff=225492</id>
		<title>Template:Mobile Top 10:RoundedBoxLinkBegin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:RoundedBoxLinkBegin&amp;diff=225492"/>
				<updated>2017-01-23T19:38:25Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Test [[MobileTopTen2016-M{{{risk}}} | &lt;br /&gt;
{{Top 10:RoundedBoxBegin|year={{{year}}} }}&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:RoundedBoxLinkBegin&amp;diff=225487</id>
		<title>Template:Mobile Top 10:RoundedBoxLinkBegin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:RoundedBoxLinkBegin&amp;diff=225487"/>
				<updated>2017-01-23T19:30:43Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[MobileTopTen2016-M{{{risk}}} | &lt;br /&gt;
{{Top 10:RoundedBoxBegin|year={{{year}}} }}&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Board&amp;diff=222891</id>
		<title>Board</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Board&amp;diff=222891"/>
				<updated>2016-11-01T15:35:46Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= About the OWASP Board =&lt;br /&gt;
&lt;br /&gt;
== Current OWASP Global Board - Effective January 2016 ==&lt;br /&gt;
&lt;br /&gt;
* [[Matt Konda]]  Chicago, USA - matt.konda(at)owasp.org&lt;br /&gt;
* [[User:Jsokol|Josh Sokol]] Texas, USA - josh.sokol(at)owasp.org&lt;br /&gt;
* [[Andrew van der Stock]]  Australia - vanderaj(at)owasp.org&lt;br /&gt;
* [[User:MichaelCoates|Michael Coates]] -  California, USA - michael.coates(at)owasp.org&lt;br /&gt;
* [[User:Tgondrom|Tobias Gondrom]]  Hong Kong - tobias.gondrom(at)owasp.org&lt;br /&gt;
* [[User:brennan|Tom Brennan]]  New Jersey, USA - tomb(at)owasp.org&lt;br /&gt;
* [[User:Jonathan_Carter|Jonathan Carter]] California, USA - jonathan.carter(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
== OWASP Board Elections ==&lt;br /&gt;
=== 2016 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2016_Global_Board_of_Directors_Election 2016 Board Election]&lt;br /&gt;
=== 2015 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2015_Global_Board_of_Directors_Election 2015 Board Election]&lt;br /&gt;
=== 2014 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2014_Board_Elections 2014 Board Election]&lt;br /&gt;
=== 2013 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2013_Board_Elections 2013 Board Election]&lt;br /&gt;
=== 2012 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2012_Election 2012 Board Election]&lt;br /&gt;
=== 2011 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2011Election 2011 Board Election]&lt;br /&gt;
=== 2009 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Board_Election_2009 2009 Board Election]&lt;br /&gt;
&lt;br /&gt;
= Agenda for 2016 Meetings =&lt;br /&gt;
&lt;br /&gt;
* Teleconference Information: **CHECK MEETING INFORMATION**&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/International_Toll_Free_Calling_Information International Toll Free Calling Info]&lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracking]&lt;br /&gt;
* Meeting Template found [https://www.owasp.org/index.php/Board-Meeting-template here]&lt;br /&gt;
&lt;br /&gt;
== Upcoming 2016 Meetings ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[November 8, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[November 30, 2016]], 15:00-16:30 PST - placeholder only optional if needed - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=30&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[December 14, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=12&amp;amp;day=14&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
&lt;br /&gt;
== Past 2016 Meetings ==&lt;br /&gt;
* [[October 11, 2016]], at AppSecUSA 18:00 - 21:00 EDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[September 21, 2016]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=09&amp;amp;day=21&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[August 23, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=08&amp;amp;day=23&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[July 1, 2016]], 18:00-21:00 CEST, in Rome at AppSecEU - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=01&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[July 27, 2016]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=27&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[May 18, 2016]],  07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=05&amp;amp;day=18&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[April 20, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=04&amp;amp;day=20&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[March 16, 2016]], 16:00-17:00 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=03&amp;amp;day=16&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152  TimeZone Converter ]&lt;br /&gt;
* [[February 17, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=02&amp;amp;day=17&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[January 13, 2016]], 16:00-17:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=01&amp;amp;day=14&amp;amp;hour=00&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
&lt;br /&gt;
= Board Communication =&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Foundation_ByLaws ByLaws]&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conflict_of_Interest_Policy Conflict of Interest Policy and Signed Conflict Statements]&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://docs.google.com/a/owasp.org/folder/d/0BxI4iTO_QojvNW9jaXFyWGZwR28/edit Weekly Board/Staff Communication Documents]&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://www.google.com/calendar/embed?src=owasp.org_d1dcflbc5oul9nji1ftc3pjji8@group.calendar.google.com&amp;amp;ctz=Pacific/Honolulu OWASP Board Calendar]&lt;br /&gt;
&lt;br /&gt;
== Best practices ==&lt;br /&gt;
&lt;br /&gt;
Note: these best practices are merely a collection of procedures deemed good process for a board. '''They are not binding''' and have not been voted on or ratified by the board to this date. Online: [http://www.rulesonline.com/rror--00.htm http://www.rulesonline.com/rror--00.htm]&lt;br /&gt;
&lt;br /&gt;
=== Best Practices for Board conduct:===&lt;br /&gt;
We consider it best practices for our board to follow in spirit the &amp;quot;Robert's Rules of Order&amp;quot;.&lt;br /&gt;
* That means that board votes require a motion brought forth by one board member and to be seconded by an other board member. &lt;br /&gt;
** A motion should be specific, unique, and concise. It should include all the relevant details, be unambiguous, and leave as little room for interpretation as possible. &lt;br /&gt;
* After the motion has been seconded the board may discuss the issue and / or vote on it. &lt;br /&gt;
&lt;br /&gt;
A board member makes a motion and the board waits for your motion to be seconded. With few exceptions, all motions need to be seconded by another member of the Board. This is to ensure that the Board does spend its time effectively and not evaluating a proposal which only one member favors. &lt;br /&gt;
* In a formal setting, they will say something along the lines of &amp;quot;I second the motion,&amp;quot; or even just &amp;quot;I second.&amp;quot;&lt;br /&gt;
* In certain cases, such as when a general consensus is apparent, the presiding officer can choose to skip this step and move on to the next one.&lt;br /&gt;
&lt;br /&gt;
= Archive and Voting History =&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History Historical Board Members by Year]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_Votes Historical Board Votes]&lt;br /&gt;
&lt;br /&gt;
=== Past OWASP Boards ===&lt;br /&gt;
[[Board-2014]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2013]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2012]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2011]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2015 Meetings ==&lt;br /&gt;
* [[December 9, 2015]], 15:00-17:00 PST &lt;br /&gt;
* [[November 18, 2015]], 14:00-15:30 PST&lt;br /&gt;
* [[November 4, 2015]], 12:00-13:30 PST&lt;br /&gt;
* [[October 14, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[September 25, 2015]] at AppSecUSA 18:00 - 20:00 PST&lt;br /&gt;
* [[August 12, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[July 22, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[June 24, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[May 22, 2015]],  18:00-20:00 CEST in Amsterdam @ AppSec-EU , 9:00am-11:00am PST;&lt;br /&gt;
* [[April 29, 2015]], 12:00-13:00 PST&lt;br /&gt;
* [[March 25, 2015]], 12:00-13:00 PST &lt;br /&gt;
* [[February 11, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[January 14, 2015]], 9am-10am PST&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive for 2014 Meetings ==&lt;br /&gt;
* [[December 10, 2014]], 9am-10am PST&lt;br /&gt;
* [[November 12, 2014]], 9am - 10am PST&lt;br /&gt;
* [[October 8, 2014]], 9am-10am PST&lt;br /&gt;
* [[September 16, 2014]], 6pm - 9pm MST, In person at Appsec USA &lt;br /&gt;
* [[August 13, 2014]], 9am-10am PST&lt;br /&gt;
* [[July 9, 2014]], 9am-10am PST&lt;br /&gt;
* [[June 27, 2014]], 8am - 4 pm BST, In person at AppSec Europe&lt;br /&gt;
* [[April 30, 2014]],9am - 12pm PST&lt;br /&gt;
* [[March 3, 2014]], 7am - 10am PST&lt;br /&gt;
* [[February 24, 2014]], 8am - 10am PST&lt;br /&gt;
&lt;br /&gt;
== Archive for 2013 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[December 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
* December 2, 2013 - Special Board Meeting - [https://docs.google.com/spreadsheet/ccc?key=0ApZ9zE0hx0LNdGdJZ1BIaEZkc2V1QV81NmJ4dnI0R1E&amp;amp;usp=sharing 2014 Budget] walk through, Q &amp;amp; A (no meeting notes)&lt;br /&gt;
&lt;br /&gt;
*[[November 22, 2013]] - In person meeting at AppSec USA - New York, NY&lt;br /&gt;
&lt;br /&gt;
* November 11, 2013 - cancelled due to in person meeting on Nov. 22&lt;br /&gt;
&lt;br /&gt;
*[[October 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[September 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[In person meeting at AppSec EU - Hamburg, Germany; August 19-24]]&lt;br /&gt;
&lt;br /&gt;
* August 12, 2013 - canceled due to in person meeting on Aug 19&lt;br /&gt;
&lt;br /&gt;
*[[July 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[June 10, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 31, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 13, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[April 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[March 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[February 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[January 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2012 Meetings ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation [https://www.owasp.org/images/a/ae/2012ByLawsFINAL.pdf ByLaws]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Global_Committee_Pages Global Committees] &lt;br /&gt;
&lt;br /&gt;
*[[January 9, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 6, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 15, 2012]] &lt;br /&gt;
&lt;br /&gt;
*[[March 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[April 5, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[May 14,2012]]&lt;br /&gt;
&lt;br /&gt;
*[[June 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Aug 13, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Sept 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 8, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 24, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 26, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
*[[Dec 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Dec 27, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
== Archive for 2011 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[March 7, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[April_4_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[May_2_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[June 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[August 8, 2011]] &lt;br /&gt;
&lt;br /&gt;
*[[September 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 20, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 22, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[October 10, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[November 14, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[December 5, 2011]]&lt;br /&gt;
&lt;br /&gt;
== Minutes for 2011 Meetings ==  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Board_Votes Board Votes Historical]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[[Minutes January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes March 8, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 4, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 2, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VD9ZHEwht9tmM8FKEQ6DBrtmL_gTAhSSnQhiFXYkJ7I/edit?hl=en_US&amp;amp;authkey=CIavkP4B June 6 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VMwYrP6owtZ-SchBxUcWTIF-ITvzUX8PjUkLPwr2ipg/edit?hl=en_US&amp;amp;authkey=CIGTx5sD July 11 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1CLu9aQpS7LdeX87rJ5N9cuJ-RGGVzDWf34l6gdMml7M/edit?hl=en_US&amp;amp;authkey=CI-U5qEP August 8, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1HM32VcvWb0hizD5_mhWMULLaouzuRgA3ZYjODRZwyAs/edit?hl=en_US September 6, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1Y-8tZisUZM5ZKP8AxJqvkiNtFanVFM0m--bMG2PZ3ww/edit October 10, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/13-aHX2pSUXjCP8ivsbls6u1VX1BVSYewyMUH8LI7zpQ/edit November 14, 2011]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2010 Meetings ==&lt;br /&gt;
*[[January 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[February 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]] &amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;Postponed until March 9, 2010&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[[April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[May 4, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[August 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[September 8, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[December_6_2010]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2010 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[Jan 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Feb 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes_December_6,_2010]]&lt;br /&gt;
&lt;br /&gt;
*[[OWASP Board Meetings January Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings February Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June 09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting July 7, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting August 4, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting September 1, 2009 Agenda]] &lt;br /&gt;
*[[OWASP Board Meeting October 6, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting November 10, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting December 1, 2009 Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2009 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 01-06-09]]&lt;br /&gt;
* [[OWASP Board Meetings 02-03-09]]&lt;br /&gt;
* [[OWASP Board Meetings 03-10-09]]&lt;br /&gt;
* [[OWASP Board Meetings April 09]]&lt;br /&gt;
* [[OWASP Board Meetings May 09]]&lt;br /&gt;
* [[OWASP Board Meetings June 09]]&lt;br /&gt;
* [[OWASP Board Meeting July 09]]&lt;br /&gt;
* [[OWASP Board Meeting August 09]]&lt;br /&gt;
* [[OWASP Board Meeting September 09]]&lt;br /&gt;
* [[OWASP Board Meeting October 09]]&lt;br /&gt;
* [[OWASP Board Meeting December 09]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2008 Meetings ==&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings July Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings August Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings September Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings October Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings December Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2008 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 2-7-08]]&lt;br /&gt;
* [[OWASP Board Meetings 3-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 5-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 6-3-08]]&lt;br /&gt;
* [[OWASP Board Meetings 8-14-08]]&lt;br /&gt;
* [[OWASP Board Meetings 9-2-08]] &lt;br /&gt;
* [[Owasp Board Meetings 10-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 11-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 12-02-08]]&lt;br /&gt;
&lt;br /&gt;
= Board Focus Ideas  =&lt;br /&gt;
&lt;br /&gt;
== First suggested priority of Board  from Paul ==&lt;br /&gt;
* What are the top 5 &amp;quot;Initiatives&amp;quot; we want or believe the OWASP Community should be focusing on in 2016-2017? (Areas that should receive our time effort &amp;amp; money.)&lt;br /&gt;
* Intent here is to stimulate a Board level &amp;amp; Community discussion about strategic goals, and then actionable objectives that.....a) align with mission of OWASP, and b) stimulate enough interest at Community level to cause volunteers to engage &amp;amp; participate, and c) produce output of value and benefit to owasp community on a Global basis.&lt;br /&gt;
&lt;br /&gt;
== Projects Ideas==&lt;br /&gt;
&lt;br /&gt;
* Project Review &amp;amp; Project Platform - good progress, keep it going. We need &amp;quot;more&amp;quot; volunteer engagement to provide more diverse review.&lt;br /&gt;
* New Project Ideas. Where is industry going, where will it be in 5 years? OWASP should suggest projects that we need and find team to build them!&lt;br /&gt;
* Project Summit support &amp;amp; funding&lt;br /&gt;
* International Chapter / Region support &amp;amp; funding for projects&lt;br /&gt;
* Hire full or part time technical writer to help with project (from Simon, flagship project lead)&lt;br /&gt;
* a platform for funding pull requests / contributions to projects - this could be a way to financially reward folks for contributing. I know ZAP recently experimented with this - not sure how it went, but we have money - might be a good way to spend it (maybe leveraging something like the bithub idea https://whispersystems.org/blog/bithub/). I would want the ability to personally remove myself from the ability of receiving payment. (from John Melton, flagship project lead)&lt;br /&gt;
* help with applying for grants - including letting us know of available grants and helping us do the paperwork if necessary&lt;br /&gt;
* make inter-project recommendations - since you sit at a level where you see various projects, maybe make recommendations for areas where multiple projects could collaborate for added value  (from John Melton, flagship project lead)&lt;br /&gt;
* project of the month - this may already happen, but if not, maybe the newsletter could feature a project every month, including information like a project overview, an audio interview with the project leader(s), a list of priority tasks for people to help with, etc.  (from John Melton, flagship project lead)&lt;br /&gt;
* get access to available free tools - I've actually seen several tools that are available for use within OWASP, though I hear about them haphazardly. It would be good if there were a single resource for leads to know what was available. Thinking of things like: free licenses of paid software (intellij, webex) or access to products/services (surveymonkey, AWS, GCE or Azure credits) that could be useful to the project  (from John Melton, flagship project lead)&lt;br /&gt;
* conducting surveys - We do surveys periodically, and I fill them out. Joanna has used them to good effect. We might be able to make that more regular and get good data on our projects.&lt;br /&gt;
* &amp;quot;help wanted&amp;quot; site - We use github issues on our project. However, one thing I hear repeatedly is project leaders saying they need help, and owasp members asking how to help. It seems like we could put up a &amp;quot;jobs&amp;quot; board of some kind to connect folks within the community for things like this. We could probably connect this to $ in some way if we wanted to. I imagine there's a tool out there that already does this too.  (from John Melton, flagship project lead)&lt;br /&gt;
* continue and expand &amp;quot;summer of code&amp;quot; programs - I believe these programs add lots of value. Not only do they get practical things done on the projects, but they give us good visibility, get people involved in the projects (many continue to contribute), give us good press in the community, and invigorate the mentors as well.  (from John Melton, flagship project lead)&lt;br /&gt;
&lt;br /&gt;
== Training ==&lt;br /&gt;
* Training is OK now....but what do we want to do here?  Business as usual?&lt;br /&gt;
* Update current project level training docs, or&lt;br /&gt;
* Begin some form of Curriculum for Academic use?&lt;br /&gt;
&lt;br /&gt;
== Advocacy==&lt;br /&gt;
* Liaison with other Orgs&lt;br /&gt;
** ID those Developer groups and go to their conferences &amp;amp; meetings&lt;br /&gt;
** ...just a few, but caution is to approach 1-2 at a time and get an outcome&lt;br /&gt;
* Regulatory policy (lobbying).  OK, if its is a hot topic to some....then BoD should encourage it and help first set of people get that WG started and  provide small set of guidelines on Advocacy vs. Lobbying.&lt;br /&gt;
* Crank out true press releases or blogs say on quarterly basis when we have couple public releases.&lt;br /&gt;
* Consider WG and provide small set of guidelines on Advocacy vs. Lobbying.&lt;br /&gt;
&lt;br /&gt;
== Community Portals ==&lt;br /&gt;
* Should be our goto destination for owasp community to access for current &amp;amp; relevant info on OWASP activities.   &lt;br /&gt;
* Focused WG to take action on Wiki Cleanup &amp;amp; ease of use. &lt;br /&gt;
* Consider funding larger wiki cleanup and migration effort (Jim)&lt;br /&gt;
&lt;br /&gt;
== Marketing ==&lt;br /&gt;
* General PR &amp;amp; Marketing the OWASP Story - Promote ourselves more!&lt;br /&gt;
* Crank up a Recruiting program - Both Corporate &amp;amp; Individual.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Board&amp;diff=222890</id>
		<title>Board</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Board&amp;diff=222890"/>
				<updated>2016-11-01T15:34:53Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
= About the OWASP Board =&lt;br /&gt;
&lt;br /&gt;
== Current OWASP Global Board - Effective January 2016 ==&lt;br /&gt;
&lt;br /&gt;
* [[Matt Konda]]  Chicago, USA - matt.konda(at)owasp.org&lt;br /&gt;
* [[User:Jsokol|Josh Sokol]] Texas, USA - josh.sokol(at)owasp.org&lt;br /&gt;
* [[Andrew van der Stock]]  Australia - vanderaj(at)owasp.org&lt;br /&gt;
* [[User:MichaelCoates|Michael Coates]] -  California, USA - michael.coates(at)owasp.org&lt;br /&gt;
* [[User:Tgondrom|Tobias Gondrom]]  Hong Kong - tobias.gondrom(at)owasp.org&lt;br /&gt;
* [[User:brennan|Tom Brennan]]  New Jersey, USA - tomb(at)owasp.org&lt;br /&gt;
* [[User:jcarter|Jonathan Carter]] California, USA - jonathan.carter(at)owasp.org&lt;br /&gt;
&lt;br /&gt;
== OWASP Board Elections ==&lt;br /&gt;
=== 2016 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2016_Global_Board_of_Directors_Election 2016 Board Election]&lt;br /&gt;
=== 2015 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2015_Global_Board_of_Directors_Election 2015 Board Election]&lt;br /&gt;
=== 2014 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2014_Board_Elections 2014 Board Election]&lt;br /&gt;
=== 2013 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/2013_Board_Elections 2013 Board Election]&lt;br /&gt;
=== 2012 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2012_Election 2012 Board Election]&lt;br /&gt;
=== 2011 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Membership/2011Election 2011 Board Election]&lt;br /&gt;
=== 2009 Election ===&lt;br /&gt;
[https://www.owasp.org/index.php/Board_Election_2009 2009 Board Election]&lt;br /&gt;
&lt;br /&gt;
= Agenda for 2016 Meetings =&lt;br /&gt;
&lt;br /&gt;
* Teleconference Information: **CHECK MEETING INFORMATION**&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/International_Toll_Free_Calling_Information International Toll Free Calling Info]&lt;br /&gt;
&lt;br /&gt;
* [https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracking]&lt;br /&gt;
* Meeting Template found [https://www.owasp.org/index.php/Board-Meeting-template here]&lt;br /&gt;
&lt;br /&gt;
== Upcoming 2016 Meetings ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* [[November 8, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=09&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[November 30, 2016]], 15:00-16:30 PST - placeholder only optional if needed - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=11&amp;amp;day=30&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[December 14, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=12&amp;amp;day=14&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
&lt;br /&gt;
== Past 2016 Meetings ==&lt;br /&gt;
* [[October 11, 2016]], at AppSecUSA 18:00 - 21:00 EDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=10&amp;amp;day=11&amp;amp;hour=22&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[September 21, 2016]] 07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=09&amp;amp;day=21&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[August 23, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=08&amp;amp;day=23&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[July 1, 2016]], 18:00-21:00 CEST, in Rome at AppSecEU - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=01&amp;amp;hour=16&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[July 27, 2016]], 07:00-08:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=07&amp;amp;day=27&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[May 18, 2016]],  07:00-08:30 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=05&amp;amp;day=18&amp;amp;hour=14&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[April 20, 2016]], 16:00-17:00 PDT - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=04&amp;amp;day=20&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[March 16, 2016]], 16:00-17:00 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=03&amp;amp;day=16&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152  TimeZone Converter ]&lt;br /&gt;
* [[February 17, 2016]], 15:00-16:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=02&amp;amp;day=17&amp;amp;hour=23&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
* [[January 13, 2016]], 16:00-17:30 PST - [http://www.timeanddate.com/worldclock/meetingdetails.html?year=2016&amp;amp;month=01&amp;amp;day=14&amp;amp;hour=00&amp;amp;min=0&amp;amp;sec=0&amp;amp;p1=224&amp;amp;p2=24&amp;amp;p3=263&amp;amp;p4=78&amp;amp;p5=37&amp;amp;p6=102&amp;amp;p7=152 TimeZone Converter ]&lt;br /&gt;
&lt;br /&gt;
= Board Communication =&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Foundation_ByLaws ByLaws]&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/Governance/Conflict_of_Interest_Policy Conflict of Interest Policy and Signed Conflict Statements]&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://docs.google.com/a/owasp.org/folder/d/0BxI4iTO_QojvNW9jaXFyWGZwR28/edit Weekly Board/Staff Communication Documents]&amp;lt;br/&amp;gt;&lt;br /&gt;
[https://www.google.com/calendar/embed?src=owasp.org_d1dcflbc5oul9nji1ftc3pjji8@group.calendar.google.com&amp;amp;ctz=Pacific/Honolulu OWASP Board Calendar]&lt;br /&gt;
&lt;br /&gt;
== Best practices ==&lt;br /&gt;
&lt;br /&gt;
Note: these best practices are merely a collection of procedures deemed good process for a board. '''They are not binding''' and have not been voted on or ratified by the board to this date. Online: [http://www.rulesonline.com/rror--00.htm http://www.rulesonline.com/rror--00.htm]&lt;br /&gt;
&lt;br /&gt;
=== Best Practices for Board conduct:===&lt;br /&gt;
We consider it best practices for our board to follow in spirit the &amp;quot;Robert's Rules of Order&amp;quot;.&lt;br /&gt;
* That means that board votes require a motion brought forth by one board member and to be seconded by an other board member. &lt;br /&gt;
** A motion should be specific, unique, and concise. It should include all the relevant details, be unambiguous, and leave as little room for interpretation as possible. &lt;br /&gt;
* After the motion has been seconded the board may discuss the issue and / or vote on it. &lt;br /&gt;
&lt;br /&gt;
A board member makes a motion and the board waits for your motion to be seconded. With few exceptions, all motions need to be seconded by another member of the Board. This is to ensure that the Board does spend its time effectively and not evaluating a proposal which only one member favors. &lt;br /&gt;
* In a formal setting, they will say something along the lines of &amp;quot;I second the motion,&amp;quot; or even just &amp;quot;I second.&amp;quot;&lt;br /&gt;
* In certain cases, such as when a general consensus is apparent, the presiding officer can choose to skip this step and move on to the next one.&lt;br /&gt;
&lt;br /&gt;
= Archive and Voting History =&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_History Historical Board Members by Year]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_Board_Votes Historical Board Votes]&lt;br /&gt;
&lt;br /&gt;
=== Past OWASP Boards ===&lt;br /&gt;
[[Board-2014]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2013]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2012]]&lt;br /&gt;
&lt;br /&gt;
[[Board-2011]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2015 Meetings ==&lt;br /&gt;
* [[December 9, 2015]], 15:00-17:00 PST &lt;br /&gt;
* [[November 18, 2015]], 14:00-15:30 PST&lt;br /&gt;
* [[November 4, 2015]], 12:00-13:30 PST&lt;br /&gt;
* [[October 14, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[September 25, 2015]] at AppSecUSA 18:00 - 20:00 PST&lt;br /&gt;
* [[August 12, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[July 22, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[June 24, 2015]], 14:00-15:00 PDT&lt;br /&gt;
* [[May 22, 2015]],  18:00-20:00 CEST in Amsterdam @ AppSec-EU , 9:00am-11:00am PST;&lt;br /&gt;
* [[April 29, 2015]], 12:00-13:00 PST&lt;br /&gt;
* [[March 25, 2015]], 12:00-13:00 PST &lt;br /&gt;
* [[February 11, 2015]], 16:00-17:00 PST&lt;br /&gt;
* [[January 14, 2015]], 9am-10am PST&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Archive for 2014 Meetings ==&lt;br /&gt;
* [[December 10, 2014]], 9am-10am PST&lt;br /&gt;
* [[November 12, 2014]], 9am - 10am PST&lt;br /&gt;
* [[October 8, 2014]], 9am-10am PST&lt;br /&gt;
* [[September 16, 2014]], 6pm - 9pm MST, In person at Appsec USA &lt;br /&gt;
* [[August 13, 2014]], 9am-10am PST&lt;br /&gt;
* [[July 9, 2014]], 9am-10am PST&lt;br /&gt;
* [[June 27, 2014]], 8am - 4 pm BST, In person at AppSec Europe&lt;br /&gt;
* [[April 30, 2014]],9am - 12pm PST&lt;br /&gt;
* [[March 3, 2014]], 7am - 10am PST&lt;br /&gt;
* [[February 24, 2014]], 8am - 10am PST&lt;br /&gt;
&lt;br /&gt;
== Archive for 2013 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[December 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
* December 2, 2013 - Special Board Meeting - [https://docs.google.com/spreadsheet/ccc?key=0ApZ9zE0hx0LNdGdJZ1BIaEZkc2V1QV81NmJ4dnI0R1E&amp;amp;usp=sharing 2014 Budget] walk through, Q &amp;amp; A (no meeting notes)&lt;br /&gt;
&lt;br /&gt;
*[[November 22, 2013]] - In person meeting at AppSec USA - New York, NY&lt;br /&gt;
&lt;br /&gt;
* November 11, 2013 - cancelled due to in person meeting on Nov. 22&lt;br /&gt;
&lt;br /&gt;
*[[October 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[September 9, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[In person meeting at AppSec EU - Hamburg, Germany; August 19-24]]&lt;br /&gt;
&lt;br /&gt;
* August 12, 2013 - canceled due to in person meeting on Aug 19&lt;br /&gt;
&lt;br /&gt;
*[[July 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[June 10, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 31, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[May 13, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[April 8, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[March 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[February 11, 2013]]&lt;br /&gt;
&lt;br /&gt;
*[[January 14, 2013]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2012 Meetings ==&lt;br /&gt;
&lt;br /&gt;
[https://docs.google.com/a/owasp.org/spreadsheet/ccc?key=0ApZ9zE0hx0LNdG5uRzNYZE8ycDFabnBWNkU4SFpwREE Board Meeting Attendance Tracking]&lt;br /&gt;
&lt;br /&gt;
OWASP Foundation [https://www.owasp.org/images/a/ae/2012ByLawsFINAL.pdf ByLaws]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Global_Committee_Pages Global Committees] &lt;br /&gt;
&lt;br /&gt;
*[[January 9, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 6, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[February 15, 2012]] &lt;br /&gt;
&lt;br /&gt;
*[[March 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[April 5, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[May 14,2012]]&lt;br /&gt;
&lt;br /&gt;
*[[June 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Aug 13, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Sept 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 8, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Oct 24, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 12, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Nov 26, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
*[[Dec 10, 2012]]&lt;br /&gt;
&lt;br /&gt;
*[[Dec 27, 2012]] - 2013 Budget Focused&lt;br /&gt;
&lt;br /&gt;
== Archive for 2011 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[March 7, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[April_4_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[May_2_2011]]&lt;br /&gt;
&lt;br /&gt;
*[[June 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[July 11, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[August 8, 2011]] &lt;br /&gt;
&lt;br /&gt;
*[[September 6, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 20, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[September 22, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[October 10, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[November 14, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[December 5, 2011]]&lt;br /&gt;
&lt;br /&gt;
== Minutes for 2011 Meetings ==  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/OWASP_Board_Votes Board Votes Historical]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
*[[Minutes January 3, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes March 8, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 4, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 2, 2011]]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VD9ZHEwht9tmM8FKEQ6DBrtmL_gTAhSSnQhiFXYkJ7I/edit?hl=en_US&amp;amp;authkey=CIavkP4B June 6 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1VMwYrP6owtZ-SchBxUcWTIF-ITvzUX8PjUkLPwr2ipg/edit?hl=en_US&amp;amp;authkey=CIGTx5sD July 11 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1CLu9aQpS7LdeX87rJ5N9cuJ-RGGVzDWf34l6gdMml7M/edit?hl=en_US&amp;amp;authkey=CI-U5qEP August 8, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1HM32VcvWb0hizD5_mhWMULLaouzuRgA3ZYjODRZwyAs/edit?hl=en_US September 6, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/1Y-8tZisUZM5ZKP8AxJqvkiNtFanVFM0m--bMG2PZ3ww/edit October 10, 2011]&lt;br /&gt;
&lt;br /&gt;
*[https://docs.google.com/a/owasp.org/document/d/13-aHX2pSUXjCP8ivsbls6u1VX1BVSYewyMUH8LI7zpQ/edit November 14, 2011]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2010 Meetings ==&lt;br /&gt;
*[[January 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[February 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]] &amp;lt;span style=&amp;quot;color:blue&amp;quot;&amp;gt;Postponed until March 9, 2010&amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*[[April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[May 4, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[August 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[September 8, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[December_6_2010]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2010 Meetings ==&lt;br /&gt;
&lt;br /&gt;
*[[Jan 5, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Feb 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[March 2, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes April 6, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes May 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes June 7, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes July 12, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes October 11, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes November 9, 2010]]&lt;br /&gt;
&lt;br /&gt;
*[[Minutes_December_6,_2010]]&lt;br /&gt;
&lt;br /&gt;
*[[OWASP Board Meetings January Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings February Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June 09 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting July 7, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting August 4, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting September 1, 2009 Agenda]] &lt;br /&gt;
*[[OWASP Board Meeting October 6, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting November 10, 2009 Agenda]]&lt;br /&gt;
*[[OWASP Board Meeting December 1, 2009 Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2009 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 01-06-09]]&lt;br /&gt;
* [[OWASP Board Meetings 02-03-09]]&lt;br /&gt;
* [[OWASP Board Meetings 03-10-09]]&lt;br /&gt;
* [[OWASP Board Meetings April 09]]&lt;br /&gt;
* [[OWASP Board Meetings May 09]]&lt;br /&gt;
* [[OWASP Board Meetings June 09]]&lt;br /&gt;
* [[OWASP Board Meeting July 09]]&lt;br /&gt;
* [[OWASP Board Meeting August 09]]&lt;br /&gt;
* [[OWASP Board Meeting September 09]]&lt;br /&gt;
* [[OWASP Board Meeting October 09]]&lt;br /&gt;
* [[OWASP Board Meeting December 09]]&lt;br /&gt;
&lt;br /&gt;
== Archive for 2008 Meetings ==&lt;br /&gt;
*[[OWASP Board Meetings March Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings April Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings May Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings June Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings July Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings August Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings September Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings October Agenda]]&lt;br /&gt;
*[[OWASP Board Meetings December Agenda]]&lt;br /&gt;
&lt;br /&gt;
== Archive of 2008 Meetings ==&lt;br /&gt;
* [[OWASP Board Meetings 2-7-08]]&lt;br /&gt;
* [[OWASP Board Meetings 3-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 5-6-08]]&lt;br /&gt;
* [[OWASP Board Meetings 6-3-08]]&lt;br /&gt;
* [[OWASP Board Meetings 8-14-08]]&lt;br /&gt;
* [[OWASP Board Meetings 9-2-08]] &lt;br /&gt;
* [[Owasp Board Meetings 10-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 11-07-08]]&lt;br /&gt;
* [[Owasp Board Meetings 12-02-08]]&lt;br /&gt;
&lt;br /&gt;
= Board Focus Ideas  =&lt;br /&gt;
&lt;br /&gt;
== First suggested priority of Board  from Paul ==&lt;br /&gt;
* What are the top 5 &amp;quot;Initiatives&amp;quot; we want or believe the OWASP Community should be focusing on in 2016-2017? (Areas that should receive our time effort &amp;amp; money.)&lt;br /&gt;
* Intent here is to stimulate a Board level &amp;amp; Community discussion about strategic goals, and then actionable objectives that.....a) align with mission of OWASP, and b) stimulate enough interest at Community level to cause volunteers to engage &amp;amp; participate, and c) produce output of value and benefit to owasp community on a Global basis.&lt;br /&gt;
&lt;br /&gt;
== Projects Ideas==&lt;br /&gt;
&lt;br /&gt;
* Project Review &amp;amp; Project Platform - good progress, keep it going. We need &amp;quot;more&amp;quot; volunteer engagement to provide more diverse review.&lt;br /&gt;
* New Project Ideas. Where is industry going, where will it be in 5 years? OWASP should suggest projects that we need and find team to build them!&lt;br /&gt;
* Project Summit support &amp;amp; funding&lt;br /&gt;
* International Chapter / Region support &amp;amp; funding for projects&lt;br /&gt;
* Hire full or part time technical writer to help with project (from Simon, flagship project lead)&lt;br /&gt;
* a platform for funding pull requests / contributions to projects - this could be a way to financially reward folks for contributing. I know ZAP recently experimented with this - not sure how it went, but we have money - might be a good way to spend it (maybe leveraging something like the bithub idea https://whispersystems.org/blog/bithub/). I would want the ability to personally remove myself from the ability of receiving payment. (from John Melton, flagship project lead)&lt;br /&gt;
* help with applying for grants - including letting us know of available grants and helping us do the paperwork if necessary&lt;br /&gt;
* make inter-project recommendations - since you sit at a level where you see various projects, maybe make recommendations for areas where multiple projects could collaborate for added value  (from John Melton, flagship project lead)&lt;br /&gt;
* project of the month - this may already happen, but if not, maybe the newsletter could feature a project every month, including information like a project overview, an audio interview with the project leader(s), a list of priority tasks for people to help with, etc.  (from John Melton, flagship project lead)&lt;br /&gt;
* get access to available free tools - I've actually seen several tools that are available for use within OWASP, though I hear about them haphazardly. It would be good if there were a single resource for leads to know what was available. Thinking of things like: free licenses of paid software (intellij, webex) or access to products/services (surveymonkey, AWS, GCE or Azure credits) that could be useful to the project  (from John Melton, flagship project lead)&lt;br /&gt;
* conducting surveys - We do surveys periodically, and I fill them out. Joanna has used them to good effect. We might be able to make that more regular and get good data on our projects.&lt;br /&gt;
* &amp;quot;help wanted&amp;quot; site - We use github issues on our project. However, one thing I hear repeatedly is project leaders saying they need help, and owasp members asking how to help. It seems like we could put up a &amp;quot;jobs&amp;quot; board of some kind to connect folks within the community for things like this. We could probably connect this to $ in some way if we wanted to. I imagine there's a tool out there that already does this too.  (from John Melton, flagship project lead)&lt;br /&gt;
* continue and expand &amp;quot;summer of code&amp;quot; programs - I believe these programs add lots of value. Not only do they get practical things done on the projects, but they give us good visibility, get people involved in the projects (many continue to contribute), give us good press in the community, and invigorate the mentors as well.  (from John Melton, flagship project lead)&lt;br /&gt;
&lt;br /&gt;
== Training ==&lt;br /&gt;
* Training is OK now....but what do we want to do here?  Business as usual?&lt;br /&gt;
* Update current project level training docs, or&lt;br /&gt;
* Begin some form of Curriculum for Academic use?&lt;br /&gt;
&lt;br /&gt;
== Advocacy==&lt;br /&gt;
* Liaison with other Orgs&lt;br /&gt;
** ID those Developer groups and go to their conferences &amp;amp; meetings&lt;br /&gt;
** ...just a few, but caution is to approach 1-2 at a time and get an outcome&lt;br /&gt;
* Regulatory policy (lobbying).  OK, if its is a hot topic to some....then BoD should encourage it and help first set of people get that WG started and  provide small set of guidelines on Advocacy vs. Lobbying.&lt;br /&gt;
* Crank out true press releases or blogs say on quarterly basis when we have couple public releases.&lt;br /&gt;
* Consider WG and provide small set of guidelines on Advocacy vs. Lobbying.&lt;br /&gt;
&lt;br /&gt;
== Community Portals ==&lt;br /&gt;
* Should be our goto destination for owasp community to access for current &amp;amp; relevant info on OWASP activities.   &lt;br /&gt;
* Focused WG to take action on Wiki Cleanup &amp;amp; ease of use. &lt;br /&gt;
* Consider funding larger wiki cleanup and migration effort (Jim)&lt;br /&gt;
&lt;br /&gt;
== Marketing ==&lt;br /&gt;
* General PR &amp;amp; Marketing the OWASP Story - Promote ourselves more!&lt;br /&gt;
* Crank up a Recruiting program - Both Corporate &amp;amp; Individual.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionAdvancedTemplate&amp;diff=210873</id>
		<title>Template:Mobile Top 10 2016:SubsectionAdvancedTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionAdvancedTemplate&amp;diff=210873"/>
				<updated>2016-03-10T08:05:55Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!----------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!--   Template:Mobile Top 10 2016:SubsectionAdvancedTemplate   --&amp;gt;&lt;br /&gt;
&amp;lt;!----------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
# Start Table &lt;br /&gt;
#* &amp;lt;nowiki&amp;gt;{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}}      &amp;lt;!--- in the main page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#* &amp;lt;nowiki&amp;gt;{{Mobile_Top_10:SubsectionTableBeginTemplate|type=headertab}} &amp;lt;!--- in the languages part, like JAVA ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#:&lt;br /&gt;
# hint: use 'position=firstLeft', 'firstWhole' or 'firstLongLeft' for the 1st element&amp;lt;br/&amp;gt; &lt;br /&gt;
::{| &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;{{Mobile_Top_10_2016_Developer_Edition_De:SubsectionAdvancedTemplate&amp;lt;/nowiki&amp;gt; ||  &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|type={{Mobile_Top_10_2016:StyleTemplate}}&amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!---  =&amp;gt; box  ---&amp;gt; &amp;lt;/nowiki&amp;gt; &lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|subsection=&amp;lt;defOp|example|freetext|howPrevent|references|userImpact|vulnerableTo&amp;gt;&amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|title=your title&amp;lt;/nowiki&amp;gt;                    || &amp;lt;nowiki&amp;gt; &amp;lt;!--- additional parameter for subsection=freetext or defOp (for the number) ---&amp;gt; &amp;lt;/nowiki&amp;gt;                &lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|position=&amp;lt;firstLeft|firstWhole|firstLongLeft|left|right|whole|longLeft|longRight&amp;gt;&amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|risk=&amp;lt;1-10|11&amp;gt;                    &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!--- additional parameter for subsection=&amp;lt;defOp|example|howPrevent|vulnerableTo&amp;gt;:&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;                                                           || according to [[:Template:Mobile_Top_10_2016:ByTheNumbers]] &amp;lt;nowiki&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|year=&amp;lt;2016|2016&amp;gt;                  &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!--- changes year of the Top-10-Version for subsection=&amp;lt;defOp|example|howPrevent|vulnerableTo&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|language=de                       &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!---  additional parameter for all subsection-tags without fulltext ---&amp;gt; &amp;lt;/nowiki&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;                                                           || according to [[:Template:Mobile Top 10:LanguageFile]] &amp;lt;nowiki&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;}}                                       &amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;outdatet:                                             || &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&amp;lt;nowiki&amp;gt;|number=&amp;lt;1|2|3|4|left|right|whole&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;/span&amp;gt;  || &amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&amp;lt;nowiki&amp;gt; &amp;lt;!--- backward compatible for Template:Top 10 2016:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
:3. End Table&lt;br /&gt;
:* &amp;lt;nowiki&amp;gt;{{Mobile_Top_10:SubsectionTableEndTemplate}}                       &amp;lt;!--- in the main page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:* &amp;lt;nowiki&amp;gt;{{Mobile_Top_10_2016:BottomAdvancedTemplate   &amp;lt;!--- end of the page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |type={{Mobile_Top_10_2016:StyleTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |useprev=PrevLink_Germany_Projekte&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |prev=Top_10_fuer_Entwickler&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |usenext=NextLink_Germany_Projekte&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |next=Top_10_fuer_Entwickler/Die Top-10-Risiken&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:: &amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''Example:''' ===&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|type={{Mobile_Top_10_2016:StyleTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|subsection=vulnerableTo&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|position=firstLeft&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|risk=1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|year=2016&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|language=de&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;1st box&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;{{Mobile_Top_10:SubsectionTableEndTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===English New Syntax===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2016}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2016}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|year=2016}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|year=2016}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|year=2016}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===English old Syntax 2016===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=1|risk=1|year=2016}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=2|risk=1|year=2016}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=3|risk=1|year=2016}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=4|risk=1|year=2016}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===English Old Syntax 2016===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=1|risk=1}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=2|risk=1}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=3|risk=1}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=4|risk=1}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===German 2016===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2016|language=de}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2016|language=de}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|year=2016|language=de}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|year=2016|language=de}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|year=2016|language=de}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===German 2016===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|language=de}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|language=de}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|language=de}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|language=de}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|language=de}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===Special 2016===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=2|year=2016}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=2|year=2016}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=2|year=2016}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=userImpact|position=right|risk=2|year=2016}}  &lt;br /&gt;
4th box &lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=longLeft|risk=2|year=2016}}  &lt;br /&gt;
5th box (long box)&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=2|position=right|risk=2|year=2016}} &lt;br /&gt;
6th box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2016:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=left|risk=2|year=2016}}  &lt;br /&gt;
7th box&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt; {{#ifeq: {{{type}}} | box |&lt;br /&gt;
    {{#switch: {{{position}}}&lt;br /&gt;
      | firstLeft = &amp;lt;!-- first element: left half --&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | firstWhole = &amp;lt;!-- first element with full width --&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td colspan=&amp;quot;2&amp;quot;&lt;br /&gt;
      | firstLongLeft =&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | left = &amp;lt;!-- left half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | right = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt; &lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | whole =        &lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td colspan=&amp;quot;2&amp;quot;&lt;br /&gt;
      | longLeft =&lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | longRight = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt; &lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | #default = &amp;lt;!-- no 'position' set yet (old style)--&amp;gt;&lt;br /&gt;
         {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2016:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
           | left =  &amp;lt;!-- first element: left half (=&amp;gt; firstLeft in new nomenclature for position!--&amp;gt;&lt;br /&gt;
               {{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | right = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt; &lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | whole =  &amp;lt;!-- first element with full width (=&amp;gt; firstWhole in new nomenclature for position!--&amp;gt;  &lt;br /&gt;
                  {{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 1 = &amp;lt;!-- number 1: Left 1st Element   =&amp;gt; firstLeft in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                 {{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 2 =  &amp;lt;!-- number 2: right 2nd Element =&amp;gt; right in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt; &lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 3 =  &amp;lt;!-- number 3: Links 3rd Element =&amp;gt; left in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 4 =  &amp;lt;!-- number 4: right 4th Element =&amp;gt; right in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
         }}&lt;br /&gt;
    }}&lt;br /&gt;
    style=&amp;quot;vertical-align: top; padding:5px; width: 50%;&lt;br /&gt;
           border: 3px solid {{Mobile_Top_10:BorderColor|year={{{year}}} }};&lt;br /&gt;
           background-color: {{Mobile_Top_10:BackgroundColor|year={{{year}}} }};&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;font-style: bold; &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2016=color: #000000; border-bottom: #999999 solid 1px; margin-bottom: 3px; padding-bottom: 3px;&lt;br /&gt;
             | #default=color: #4F81BD;&lt;br /&gt;
           }}; &lt;br /&gt;
           font-size: 150%;&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;!--- Box-Sub-Headline ---&amp;gt;&lt;br /&gt;
    {{#switch: {{{subsection}}}&lt;br /&gt;
      | freetext=    {{{title}}} &lt;br /&gt;
      | example=     {{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
      | howPrevent=  {{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
      | defOp=       {{Mobile_Top_10:LanguageFile|text=defendingOption|language={{{language}}} }} {{{title}}} {{Mobile_Top_10:LanguageFile|text=against|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;: &lt;br /&gt;
      | userImpact=  {{Mobile_Top_10:LanguageFile|text=userImpact|language={{{language}}} }}&lt;br /&gt;
      | references=  {{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
      | vulnerableTo={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }}&lt;br /&gt;
      | #default= &amp;lt;!-- no 'subsection' set yet (old style)--&amp;gt;&lt;br /&gt;
         {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2016:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
           | left &lt;br /&gt;
           | right &lt;br /&gt;
           | whole={{{title}}}&lt;br /&gt;
           | 1={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }} &lt;br /&gt;
           | 2={{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
           | 3={{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
           | 4={{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
       }} &lt;br /&gt;
   }}&amp;lt;/div&amp;gt;&lt;br /&gt;
|&amp;lt;br/&amp;gt;{{Mobile_Top_10_2016:SubsectionColoredTemplate|&lt;br /&gt;
    {{#switch: {{{subsection}}}&lt;br /&gt;
      | freetext=   {{{title}}} &lt;br /&gt;
      | example=    {{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
      | howPrevent= {{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
      | defOp=      {{Mobile_Top_10:LanguageFile|text=defendingOption|language={{{language}}} }} {{{title}}} {{Mobile_Top_10:LanguageFile|text=against|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;:&lt;br /&gt;
      | userImpact= {{Mobile_Top_10:LanguageFile|text=userImpact|language={{{language}}} }}&lt;br /&gt;
      | references= {{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
      | vulnerableTo= {{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }}&lt;br /&gt;
      | #default= &amp;lt;!-- no 'subsection' set yet (old style)--&amp;gt;&lt;br /&gt;
       {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2016:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
         | left &lt;br /&gt;
         | right &lt;br /&gt;
         | whole={{{title}}}&lt;br /&gt;
         | 1={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }} &lt;br /&gt;
         | 2={{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
         | 3={{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
         | 4={{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
       }}&lt;br /&gt;
   }}|}}&lt;br /&gt;
}} &amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionColoredTemplate&amp;diff=210872</id>
		<title>Template:Mobile Top 10 2016:SubsectionColoredTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionColoredTemplate&amp;diff=210872"/>
				<updated>2016-03-10T08:04:28Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;&amp;lt;div style=&amp;quot;background-color: {{#switch: {{{year}}} | 2016=#55DF8E | #default=#558EDF}}; color: #FFFFFF; font-size: 180%; padding: 6px; padding-top: 8px; font-weight: bold; bo...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;background-color: {{#switch: {{{year}}} | 2016=#55DF8E | #default=#558EDF}}; color: #FFFFFF; font-size: 180%; padding: 6px; padding-top: 8px; font-weight: bold; border: 3px solid {{#switch: {{{year}}} | 2016=#207F4A | #default=#204A7F}}; border-right: none; border-left: none; margin: 0;&amp;quot;&amp;gt;{{{1}}}&amp;lt;/div&amp;gt;&lt;br /&gt;
{{{2}}}&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:SubsectionTableEndTemplate&amp;diff=210870</id>
		<title>Template:Mobile Top 10:SubsectionTableEndTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10:SubsectionTableEndTemplate&amp;diff=210870"/>
				<updated>2016-03-10T08:03:30Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionAdvancedTemplate&amp;diff=210868</id>
		<title>Template:Mobile Top 10 2016:SubsectionAdvancedTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionAdvancedTemplate&amp;diff=210868"/>
				<updated>2016-03-10T07:55:33Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!---------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!--   Template:Top 10 2010:SubsectionAdvancedTemplate   --&amp;gt;&lt;br /&gt;
&amp;lt;!---------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
# Start Table &lt;br /&gt;
#* &amp;lt;nowiki&amp;gt;{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}}      &amp;lt;!--- in the main page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#* &amp;lt;nowiki&amp;gt;{{Mobile_Top_10:SubsectionTableBeginTemplate|type=headertab}} &amp;lt;!--- in the languages part, like JAVA ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#:&lt;br /&gt;
# hint: use 'position=firstLeft', 'firstWhole' or 'firstLongLeft' for the 1st element&amp;lt;br/&amp;gt; &lt;br /&gt;
::{| &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;{{Top_10_2010_Developer_Edition_De:SubsectionAdvancedTemplate&amp;lt;/nowiki&amp;gt; ||  &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|type={{Mobile_Top_10_2016:StyleTemplate}}&amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!---  =&amp;gt; box  ---&amp;gt; &amp;lt;/nowiki&amp;gt; &lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|subsection=&amp;lt;defOp|example|freetext|howPrevent|references|userImpact|vulnerableTo&amp;gt;&amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|title=your title&amp;lt;/nowiki&amp;gt;                    || &amp;lt;nowiki&amp;gt; &amp;lt;!--- additional parameter for subsection=freetext or defOp (for the number) ---&amp;gt; &amp;lt;/nowiki&amp;gt;                &lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|position=&amp;lt;firstLeft|firstWhole|firstLongLeft|left|right|whole|longLeft|longRight&amp;gt;&amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|risk=&amp;lt;1-10|11&amp;gt;                    &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!--- additional parameter for subsection=&amp;lt;defOp|example|howPrevent|vulnerableTo&amp;gt;:&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;                                                           || according to [[:Template:Mobile_Top_10_2016:ByTheNumbers]] &amp;lt;nowiki&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|year=&amp;lt;2010|2013&amp;gt;                  &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!--- changes year of the Top-10-Version for subsection=&amp;lt;defOp|example|howPrevent|vulnerableTo&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|language=de                       &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!---  additional parameter for all subsection-tags without fulltext ---&amp;gt; &amp;lt;/nowiki&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;                                                           || according to [[:Template:Top 10:LanguageFile]] &amp;lt;nowiki&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;}}                                       &amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;outdatet:                                             || &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&amp;lt;nowiki&amp;gt;|number=&amp;lt;1|2|3|4|left|right|whole&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;/span&amp;gt;  || &amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&amp;lt;nowiki&amp;gt; &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
:3. End Table&lt;br /&gt;
:* &amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableEndTemplate}}                       &amp;lt;!--- in the main page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:* &amp;lt;nowiki&amp;gt;{{Top_10_2010:BottomAdvancedTemplate   &amp;lt;!--- end of the page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |type={{Mobile_Top_10_2016:StyleTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |useprev=PrevLink_Germany_Projekte&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |prev=Top_10_fuer_Entwickler&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |usenext=NextLink_Germany_Projekte&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |next=Top_10_fuer_Entwickler/Die Top-10-Risiken&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:: &amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''Example:''' ===&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|type={{Mobile_Top_10_2016:StyleTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|subsection=vulnerableTo&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|position=firstLeft&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|risk=1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|year=2013&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|language=de&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;1st box&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableEndTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===English New Syntax===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|year=2013}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===English old Syntax 2013===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=1|risk=1|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=2|risk=1|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=3|risk=1|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=4|risk=1|year=2013}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===English Old Syntax 2010===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=1|risk=1}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=2|risk=1}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=3|risk=1}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=4|risk=1}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===German 2013===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2013|language=de}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2013|language=de}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=de}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=de}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|year=2013|language=de}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===German 2010===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|language=de}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|language=de}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|language=de}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|language=de}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|language=de}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===Special 2013===&lt;br /&gt;
{{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=2|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=2|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=2|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=userImpact|position=right|risk=2|year=2013}}  &lt;br /&gt;
4th box &lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=longLeft|risk=2|year=2013}}  &lt;br /&gt;
5th box (long box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=2|position=right|risk=2|year=2013}} &lt;br /&gt;
6th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=left|risk=2|year=2013}}  &lt;br /&gt;
7th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt; {{#ifeq: {{{type}}} | box |&lt;br /&gt;
    {{#switch: {{{position}}}&lt;br /&gt;
      | firstLeft = &amp;lt;!-- first element: left half --&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | firstWhole = &amp;lt;!-- first element with full width --&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td colspan=&amp;quot;2&amp;quot;&lt;br /&gt;
      | firstLongLeft =&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | left = &amp;lt;!-- left half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | right = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt; &lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | whole =        &lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td colspan=&amp;quot;2&amp;quot;&lt;br /&gt;
      | longLeft =&lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | longRight = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt; &lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | #default = &amp;lt;!-- no 'position' set yet (old style)--&amp;gt;&lt;br /&gt;
         {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
           | left =  &amp;lt;!-- first element: left half (=&amp;gt; firstLeft in new nomenclature for position!--&amp;gt;&lt;br /&gt;
               {{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | right = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt; &lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | whole =  &amp;lt;!-- first element with full width (=&amp;gt; firstWhole in new nomenclature for position!--&amp;gt;  &lt;br /&gt;
                  {{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 1 = &amp;lt;!-- number 1: Left 1st Element   =&amp;gt; firstLeft in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                 {{Mobile_Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 2 =  &amp;lt;!-- number 2: right 2nd Element =&amp;gt; right in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt; &lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 3 =  &amp;lt;!-- number 3: Links 3rd Element =&amp;gt; left in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 4 =  &amp;lt;!-- number 4: right 4th Element =&amp;gt; right in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
         }}&lt;br /&gt;
    }}&lt;br /&gt;
    style=&amp;quot;vertical-align: top; padding:5px; width: 50%;&lt;br /&gt;
           border: 3px solid {{Mobile_Top_10:BorderColor|year={{{year}}} }};&lt;br /&gt;
           background-color: {{Mobile_Top_10:BackgroundColor|year={{{year}}} }};&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;font-style: bold; &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2013=color: #000000; border-bottom: #999999 solid 1px; margin-bottom: 3px; padding-bottom: 3px;&lt;br /&gt;
             | #default=color: #4F81BD;&lt;br /&gt;
           }}; &lt;br /&gt;
           font-size: 150%;&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;!--- Box-Sub-Headline ---&amp;gt;&lt;br /&gt;
    {{#switch: {{{subsection}}}&lt;br /&gt;
      | freetext=    {{{title}}} &lt;br /&gt;
      | example=     {{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
      | howPrevent=  {{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
      | defOp=       {{Mobile_Top_10:LanguageFile|text=defendingOption|language={{{language}}} }} {{{title}}} {{Mobile_Top_10:LanguageFile|text=against|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;: &lt;br /&gt;
      | userImpact=  {{Mobile_Top_10:LanguageFile|text=userImpact|language={{{language}}} }}&lt;br /&gt;
      | references=  {{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
      | vulnerableTo={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }}&lt;br /&gt;
      | #default= &amp;lt;!-- no 'subsection' set yet (old style)--&amp;gt;&lt;br /&gt;
         {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
           | left &lt;br /&gt;
           | right &lt;br /&gt;
           | whole={{{title}}}&lt;br /&gt;
           | 1={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }} &lt;br /&gt;
           | 2={{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
           | 3={{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
           | 4={{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
       }} &lt;br /&gt;
   }}&amp;lt;/div&amp;gt;&lt;br /&gt;
|&amp;lt;br/&amp;gt;{{Top_10_2010:SubsectionColoredTemplate|&lt;br /&gt;
    {{#switch: {{{subsection}}}&lt;br /&gt;
      | freetext=   {{{title}}} &lt;br /&gt;
      | example=    {{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
      | howPrevent= {{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
      | defOp=      {{Mobile_Top_10:LanguageFile|text=defendingOption|language={{{language}}} }} {{{title}}} {{Mobile_Top_10:LanguageFile|text=against|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;:&lt;br /&gt;
      | userImpact= {{Mobile_Top_10:LanguageFile|text=userImpact|language={{{language}}} }}&lt;br /&gt;
      | references= {{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
      | vulnerableTo= {{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }}&lt;br /&gt;
      | #default= &amp;lt;!-- no 'subsection' set yet (old style)--&amp;gt;&lt;br /&gt;
       {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
         | left &lt;br /&gt;
         | right &lt;br /&gt;
         | whole={{{title}}}&lt;br /&gt;
         | 1={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }} &lt;br /&gt;
         | 2={{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
         | 3={{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
         | 4={{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
       }}&lt;br /&gt;
   }}|}}&lt;br /&gt;
}} &amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:ByTheNumbers&amp;diff=210867</id>
		<title>Template:Mobile Top 10 2016:ByTheNumbers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:ByTheNumbers&amp;diff=210867"/>
				<updated>2016-03-10T07:52:27Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!---------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- Template:Mobile Top 10 2016:ByTheNumbers                  --&amp;gt;&lt;br /&gt;
&amp;lt;!---------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
  &amp;lt;nowiki&amp;gt;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
=== '''Example:''' ===&lt;br /&gt;
  &amp;lt;nowiki&amp;gt;{{Mobile_Top_10_2016:ByTheNumbers|1|language=de|year=2016}}&lt;br /&gt;
 {{Mobile_Top_10_2016:ByTheNumbers|2|year=2016}}   &amp;lt;!-- Default-Language = English ---&amp;gt;&lt;br /&gt;
 {{Mobile_Top_10_2016:ByTheNumbers|2|language=de}} &amp;lt;!-- Default-Year = 2010 ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; width=&amp;quot;100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;min-width: 4%&amp;quot;  |Number &lt;br /&gt;
! style=&amp;quot;min-width: 48%&amp;quot; |English 2016 &lt;br /&gt;
! style=&amp;quot;min-width: 48%&amp;quot; |German 2016&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|1}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|1|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|2}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|2|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|3}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|3|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|4}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|4|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|5}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|5|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|6}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|6|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|7}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|7|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|8}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|8|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|9}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|9|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|10}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|10|language=de}}&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|11}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|11|language=de}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{year}}}&lt;br /&gt;
    | 2013 =&lt;br /&gt;
        {{#switch: {{{1}}}&lt;br /&gt;
            | 1={{Mobile_Top_10:LanguageFile|text=injection|language={{{language}}} }}&lt;br /&gt;
            | 2={{Mobile_Top_10:LanguageFile|text=brokenAuthSessionMgmt|language={{{language}}} }}&lt;br /&gt;
            | 3={{Mobile_Top_10:LanguageFile|text=xss|language={{{language}}} }}&lt;br /&gt;
            | 4={{Mobile_Top_10:LanguageFile|text=insecureDirectObjectReference|language={{{language}}} }}&lt;br /&gt;
            | 5={{Mobile_Top_10:LanguageFile|text=securityMisconfig|language={{{language}}} }}&lt;br /&gt;
            | 6={{Mobile_Top_10:LanguageFile|text=sensitiveDataExposure|language={{{language}}} }}&lt;br /&gt;
            | 7={{Mobile_Top_10:LanguageFile|text=missingFunctionLevelACL|language={{{language}}} }}&lt;br /&gt;
            | 8={{Mobile_Top_10:LanguageFile|text=csrf|language={{{language}}} }}&lt;br /&gt;
            | 9={{Mobile_Top_10:LanguageFile|text=usingVulnerableComponents|language={{{language}}} }}&lt;br /&gt;
            | 10={{Mobile_Top_10:LanguageFile|text=unvalidatedRedirectsForwards|language={{{language}}} }}&lt;br /&gt;
            | 11={{Mobile_Top_10:LanguageFile|text=inProgress|language={{{language}}} }}&lt;br /&gt;
        }}&lt;br /&gt;
    | #default = &lt;br /&gt;
        {{#switch: {{{1}}}&lt;br /&gt;
            | 1={{Mobile_Top_10:LanguageFile|text=injection|language={{{language}}} }}&lt;br /&gt;
            | 2={{Mobile_Top_10:LanguageFile|text=xss|language={{{language}}} }}&lt;br /&gt;
            | 3={{Mobile_Top_10:LanguageFile|text=brokenAuthSessionMgmt|language={{{language}}} }}&lt;br /&gt;
            | 4={{Mobile_Top_10:LanguageFile|text=insecureDirectObjectReference|language={{{language}}} }}&lt;br /&gt;
            | 5={{Mobile_Top_10:LanguageFile|text=csrf|language={{{language}}} }}&lt;br /&gt;
            | 6={{Mobile_Top_10:LanguageFile|text=securityMisconfig|language={{{language}}} }}&lt;br /&gt;
            | 7={{Mobile_Top_10:LanguageFile|text=insecureCryptographicStorage|language={{{language}}} }}&lt;br /&gt;
            | 8={{Mobile_Top_10:LanguageFile|text=failureRestrictUrlAccess|language={{{language}}} }}&lt;br /&gt;
            | 9={{Mobile_Top_10:LanguageFile|text=insufficientTLProtection|language={{{language}}} }}&lt;br /&gt;
            | 10={{Mobile_Top_10:LanguageFile|text=unvalidatedRedirectsForwards|language={{{language}}} }}&lt;br /&gt;
            | 11={{Mobile_Top_10:LanguageFile|text=inProgress|language={{{language}}} }}&lt;br /&gt;
        }}&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:ByTheNumbers&amp;diff=210865</id>
		<title>Template:Mobile Top 10 2016:ByTheNumbers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:ByTheNumbers&amp;diff=210865"/>
				<updated>2016-03-10T07:49:22Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;&amp;lt;!---------------------------------------------------------------&amp;gt;  &amp;lt;!-- Template:Mobile Top 10 2016:ByTheNumbers                  --&amp;gt; &amp;lt;!--------------------------------------...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!---------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- Template:Mobile Top 10 2016:ByTheNumbers                  --&amp;gt;&lt;br /&gt;
&amp;lt;!---------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
  &amp;lt;nowiki&amp;gt;{{Mobile_Top_10_2016:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
=== '''Example:''' ===&lt;br /&gt;
  &amp;lt;nowiki&amp;gt;{{Mobile_Top_10_2016:ByTheNumbers|1|language=de|year=2016}}&lt;br /&gt;
 {{Mobile_Top_10_2016:ByTheNumbers|2|year=2016}}   &amp;lt;!-- Default-Language = English ---&amp;gt;&lt;br /&gt;
 {{Mobile_Top_10_2016:ByTheNumbers|2|language=de}} &amp;lt;!-- Default-Year = 2010 ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;1&amp;quot; width=&amp;quot;100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! style=&amp;quot;min-width: 4%&amp;quot;  |Number &lt;br /&gt;
! style=&amp;quot;min-width: 24%&amp;quot; |English 2016 &lt;br /&gt;
! style=&amp;quot;min-width: 24%&amp;quot; |German 2016&lt;br /&gt;
! style=&amp;quot;min-width: 24%&amp;quot; |English 2016&lt;br /&gt;
! style=&amp;quot;min-width: 24%&amp;quot; |German 2016&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|1}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|1|language=de}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|1|year=2016}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|1|language=de|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|2}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|2|language=de}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|2|year=2016}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|2|language=de|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|3}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|3|language=de}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|3|year=2016}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|3|language=de|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|4}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|4|language=de}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|4|year=2016}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|4|language=de|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|5}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|5|language=de}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|5|year=2016}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|5|language=de|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|6}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|6|language=de}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|6|year=2016}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|6|language=de|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|7}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|7|language=de}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|7|year=2016}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|7|language=de|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|8}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|8|language=de}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|8|year=2016}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|8|language=de|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|9}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|9|language=de}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|9|year=2016}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|9|language=de|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|10}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|10|language=de}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|10|year=2016}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|10|language=de|year=2016}}&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|11}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|11|language=de}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|11|year=2016}}&lt;br /&gt;
| {{Mobile_Top_10_2016:ByTheNumbers|11|language=de|year=2016}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{year}}}&lt;br /&gt;
    | 2013 =&lt;br /&gt;
        {{#switch: {{{1}}}&lt;br /&gt;
            | 1={{Mobile_Top_10:LanguageFile|text=injection|language={{{language}}} }}&lt;br /&gt;
            | 2={{Mobile_Top_10:LanguageFile|text=brokenAuthSessionMgmt|language={{{language}}} }}&lt;br /&gt;
            | 3={{Mobile_Top_10:LanguageFile|text=xss|language={{{language}}} }}&lt;br /&gt;
            | 4={{Mobile_Top_10:LanguageFile|text=insecureDirectObjectReference|language={{{language}}} }}&lt;br /&gt;
            | 5={{Mobile_Top_10:LanguageFile|text=securityMisconfig|language={{{language}}} }}&lt;br /&gt;
            | 6={{Mobile_Top_10:LanguageFile|text=sensitiveDataExposure|language={{{language}}} }}&lt;br /&gt;
            | 7={{Mobile_Top_10:LanguageFile|text=missingFunctionLevelACL|language={{{language}}} }}&lt;br /&gt;
            | 8={{Mobile_Top_10:LanguageFile|text=csrf|language={{{language}}} }}&lt;br /&gt;
            | 9={{Mobile_Top_10:LanguageFile|text=usingVulnerableComponents|language={{{language}}} }}&lt;br /&gt;
            | 10={{Mobile_Top_10:LanguageFile|text=unvalidatedRedirectsForwards|language={{{language}}} }}&lt;br /&gt;
            | 11={{Mobile_Top_10:LanguageFile|text=inProgress|language={{{language}}} }}&lt;br /&gt;
        }}&lt;br /&gt;
    | #default = &lt;br /&gt;
        {{#switch: {{{1}}}&lt;br /&gt;
            | 1={{Mobile_Top_10:LanguageFile|text=injection|language={{{language}}} }}&lt;br /&gt;
            | 2={{Mobile_Top_10:LanguageFile|text=xss|language={{{language}}} }}&lt;br /&gt;
            | 3={{Mobile_Top_10:LanguageFile|text=brokenAuthSessionMgmt|language={{{language}}} }}&lt;br /&gt;
            | 4={{Mobile_Top_10:LanguageFile|text=insecureDirectObjectReference|language={{{language}}} }}&lt;br /&gt;
            | 5={{Mobile_Top_10:LanguageFile|text=csrf|language={{{language}}} }}&lt;br /&gt;
            | 6={{Mobile_Top_10:LanguageFile|text=securityMisconfig|language={{{language}}} }}&lt;br /&gt;
            | 7={{Mobile_Top_10:LanguageFile|text=insecureCryptographicStorage|language={{{language}}} }}&lt;br /&gt;
            | 8={{Mobile_Top_10:LanguageFile|text=failureRestrictUrlAccess|language={{{language}}} }}&lt;br /&gt;
            | 9={{Mobile_Top_10:LanguageFile|text=insufficientTLProtection|language={{{language}}} }}&lt;br /&gt;
            | 10={{Mobile_Top_10:LanguageFile|text=unvalidatedRedirectsForwards|language={{{language}}} }}&lt;br /&gt;
            | 11={{Mobile_Top_10:LanguageFile|text=inProgress|language={{{language}}} }}&lt;br /&gt;
        }}&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionAdvancedTemplate&amp;diff=210862</id>
		<title>Template:Mobile Top 10 2016:SubsectionAdvancedTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionAdvancedTemplate&amp;diff=210862"/>
				<updated>2016-03-10T07:40:25Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!---------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!--   Template:Top 10 2010:SubsectionAdvancedTemplate   --&amp;gt;&lt;br /&gt;
&amp;lt;!---------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
# Start Table &lt;br /&gt;
#* &amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableBeginTemplate|type=main}}      &amp;lt;!--- in the main page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#* &amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableBeginTemplate|type=headertab}} &amp;lt;!--- in the languages part, like JAVA ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#:&lt;br /&gt;
# hint: use 'position=firstLeft', 'firstWhole' or 'firstLongLeft' for the 1st element&amp;lt;br/&amp;gt; &lt;br /&gt;
::{| &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;{{Top_10_2010_Developer_Edition_De:SubsectionAdvancedTemplate&amp;lt;/nowiki&amp;gt; ||  &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|type={{Mobile_Top_10_2016:StyleTemplate}}&amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!---  =&amp;gt; box  ---&amp;gt; &amp;lt;/nowiki&amp;gt; &lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|subsection=&amp;lt;defOp|example|freetext|howPrevent|references|userImpact|vulnerableTo&amp;gt;&amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|title=your title&amp;lt;/nowiki&amp;gt;                    || &amp;lt;nowiki&amp;gt; &amp;lt;!--- additional parameter for subsection=freetext or defOp (for the number) ---&amp;gt; &amp;lt;/nowiki&amp;gt;                &lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|position=&amp;lt;firstLeft|firstWhole|firstLongLeft|left|right|whole|longLeft|longRight&amp;gt;&amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|risk=&amp;lt;1-10|11&amp;gt;                    &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!--- additional parameter for subsection=&amp;lt;defOp|example|howPrevent|vulnerableTo&amp;gt;:&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;                                                           || according to [[:Template:Top_10_2010:ByTheNumbers]] &amp;lt;nowiki&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|year=&amp;lt;2010|2013&amp;gt;                  &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!--- changes year of the Top-10-Version for subsection=&amp;lt;defOp|example|howPrevent|vulnerableTo&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|language=de                       &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!---  additional parameter for all subsection-tags without fulltext ---&amp;gt; &amp;lt;/nowiki&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;                                                           || according to [[:Template:Top 10:LanguageFile]] &amp;lt;nowiki&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;}}                                       &amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;outdatet:                                             || &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&amp;lt;nowiki&amp;gt;|number=&amp;lt;1|2|3|4|left|right|whole&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;/span&amp;gt;  || &amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&amp;lt;nowiki&amp;gt; &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
:3. End Table&lt;br /&gt;
:* &amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableEndTemplate}}                       &amp;lt;!--- in the main page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:* &amp;lt;nowiki&amp;gt;{{Top_10_2010:BottomAdvancedTemplate   &amp;lt;!--- end of the page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |type={{Mobile_Top_10_2016:StyleTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |useprev=PrevLink_Germany_Projekte&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |prev=Top_10_fuer_Entwickler&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |usenext=NextLink_Germany_Projekte&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |next=Top_10_fuer_Entwickler/Die Top-10-Risiken&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:: &amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''Example:''' ===&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|type={{Mobile_Top_10_2016:StyleTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|subsection=vulnerableTo&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|position=firstLeft&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|risk=1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|year=2013&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|language=de&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;1st box&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableEndTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===English New Syntax===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|year=2013}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===English old Syntax 2013===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=1|risk=1|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=2|risk=1|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=3|risk=1|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=4|risk=1|year=2013}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===English Old Syntax 2010===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=1|risk=1}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=2|risk=1}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=3|risk=1}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|number=4|risk=1}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===German 2013===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2013|language=de}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2013|language=de}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=de}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=de}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|year=2013|language=de}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===German 2010===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|language=de}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|language=de}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=1|language=de}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=right|risk=1|language=de}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|language=de}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===Special 2013===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=2|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=howPrevent|position=right|risk=2|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=example|position=left|risk=2|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=userImpact|position=right|risk=2|year=2013}}  &lt;br /&gt;
4th box &lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=1|position=longLeft|risk=2|year=2013}}  &lt;br /&gt;
5th box (long box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=defOp|title=2|position=right|risk=2|year=2013}} &lt;br /&gt;
6th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2016:StyleTemplate}}|subsection=references|position=left|risk=2|year=2013}}  &lt;br /&gt;
7th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt; {{#ifeq: {{{type}}} | box |&lt;br /&gt;
    {{#switch: {{{position}}}&lt;br /&gt;
      | firstLeft = &amp;lt;!-- first element: left half --&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | firstWhole = &amp;lt;!-- first element with full width --&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td colspan=&amp;quot;2&amp;quot;&lt;br /&gt;
      | firstLongLeft =&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | left = &amp;lt;!-- left half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | right = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt; &lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | whole =        &lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td colspan=&amp;quot;2&amp;quot;&lt;br /&gt;
      | longLeft =&lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | longRight = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt; &lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | #default = &amp;lt;!-- no 'position' set yet (old style)--&amp;gt;&lt;br /&gt;
         {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
           | left =  &amp;lt;!-- first element: left half (=&amp;gt; firstLeft in new nomenclature for position!--&amp;gt;&lt;br /&gt;
               {{Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | right = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt; &lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | whole =  &amp;lt;!-- first element with full width (=&amp;gt; firstWhole in new nomenclature for position!--&amp;gt;  &lt;br /&gt;
                  {{Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 1 = &amp;lt;!-- number 1: Left 1st Element   =&amp;gt; firstLeft in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                 {{Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 2 =  &amp;lt;!-- number 2: right 2nd Element =&amp;gt; right in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt; &lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 3 =  &amp;lt;!-- number 3: Links 3rd Element =&amp;gt; left in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 4 =  &amp;lt;!-- number 4: right 4th Element =&amp;gt; right in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
         }}&lt;br /&gt;
    }}&lt;br /&gt;
    style=&amp;quot;vertical-align: top; padding:5px; width: 50%;&lt;br /&gt;
           border: 3px solid {{Mobile_Top_10:BorderColor|year={{{year}}} }};&lt;br /&gt;
           background-color: {{Mobile_Top_10:BackgroundColor|year={{{year}}} }};&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;font-style: bold; &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2013=color: #000000; border-bottom: #999999 solid 1px; margin-bottom: 3px; padding-bottom: 3px;&lt;br /&gt;
             | #default=color: #4F81BD;&lt;br /&gt;
           }}; &lt;br /&gt;
           font-size: 150%;&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;!--- Box-Sub-Headline ---&amp;gt;&lt;br /&gt;
    {{#switch: {{{subsection}}}&lt;br /&gt;
      | freetext=    {{{title}}} &lt;br /&gt;
      | example=     {{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
      | howPrevent=  {{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
      | defOp=       {{Mobile_Top_10:LanguageFile|text=defendingOption|language={{{language}}} }} {{{title}}} {{Mobile_Top_10:LanguageFile|text=against|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;: &lt;br /&gt;
      | userImpact=  {{Mobile_Top_10:LanguageFile|text=userImpact|language={{{language}}} }}&lt;br /&gt;
      | references=  {{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
      | vulnerableTo={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }}&lt;br /&gt;
      | #default= &amp;lt;!-- no 'subsection' set yet (old style)--&amp;gt;&lt;br /&gt;
         {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
           | left &lt;br /&gt;
           | right &lt;br /&gt;
           | whole={{{title}}}&lt;br /&gt;
           | 1={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }} &lt;br /&gt;
           | 2={{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
           | 3={{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
           | 4={{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
       }} &lt;br /&gt;
   }}&amp;lt;/div&amp;gt;&lt;br /&gt;
|&amp;lt;br/&amp;gt;{{Top_10_2010:SubsectionColoredTemplate|&lt;br /&gt;
    {{#switch: {{{subsection}}}&lt;br /&gt;
      | freetext=   {{{title}}} &lt;br /&gt;
      | example=    {{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
      | howPrevent= {{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
      | defOp=      {{Mobile_Top_10:LanguageFile|text=defendingOption|language={{{language}}} }} {{{title}}} {{Mobile_Top_10:LanguageFile|text=against|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;:&lt;br /&gt;
      | userImpact= {{Mobile_Top_10:LanguageFile|text=userImpact|language={{{language}}} }}&lt;br /&gt;
      | references= {{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
      | vulnerableTo= {{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }}&lt;br /&gt;
      | #default= &amp;lt;!-- no 'subsection' set yet (old style)--&amp;gt;&lt;br /&gt;
       {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
         | left &lt;br /&gt;
         | right &lt;br /&gt;
         | whole={{{title}}}&lt;br /&gt;
         | 1={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }} &lt;br /&gt;
         | 2={{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
         | 3={{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
         | 4={{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
       }}&lt;br /&gt;
   }}|}}&lt;br /&gt;
}} &amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionAdvancedTemplate&amp;diff=210860</id>
		<title>Template:Mobile Top 10 2016:SubsectionAdvancedTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionAdvancedTemplate&amp;diff=210860"/>
				<updated>2016-03-10T07:34:54Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!---------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!--   Template:Top 10 2010:SubsectionAdvancedTemplate   --&amp;gt;&lt;br /&gt;
&amp;lt;!---------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
# Start Table &lt;br /&gt;
#* &amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableBeginTemplate|type=main}}      &amp;lt;!--- in the main page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#* &amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableBeginTemplate|type=headertab}} &amp;lt;!--- in the languages part, like JAVA ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#:&lt;br /&gt;
# hint: use 'position=firstLeft', 'firstWhole' or 'firstLongLeft' for the 1st element&amp;lt;br/&amp;gt; &lt;br /&gt;
::{| &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;{{Top_10_2010_Developer_Edition_De:SubsectionAdvancedTemplate&amp;lt;/nowiki&amp;gt; ||  &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|type={{Top_10_2010:StyleTemplate}}&amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!---  =&amp;gt; box  ---&amp;gt; &amp;lt;/nowiki&amp;gt; &lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|subsection=&amp;lt;defOp|example|freetext|howPrevent|references|userImpact|vulnerableTo&amp;gt;&amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|title=your title&amp;lt;/nowiki&amp;gt;                    || &amp;lt;nowiki&amp;gt; &amp;lt;!--- additional parameter for subsection=freetext or defOp (for the number) ---&amp;gt; &amp;lt;/nowiki&amp;gt;                &lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|position=&amp;lt;firstLeft|firstWhole|firstLongLeft|left|right|whole|longLeft|longRight&amp;gt;&amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|risk=&amp;lt;1-10|11&amp;gt;                    &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!--- additional parameter for subsection=&amp;lt;defOp|example|howPrevent|vulnerableTo&amp;gt;:&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;                                                           || according to [[:Template:Top_10_2010:ByTheNumbers]] &amp;lt;nowiki&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|year=&amp;lt;2010|2013&amp;gt;                  &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!--- changes year of the Top-10-Version for subsection=&amp;lt;defOp|example|howPrevent|vulnerableTo&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|language=de                       &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!---  additional parameter for all subsection-tags without fulltext ---&amp;gt; &amp;lt;/nowiki&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;                                                           || according to [[:Template:Top 10:LanguageFile]] &amp;lt;nowiki&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;}}                                       &amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;outdatet:                                             || &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&amp;lt;nowiki&amp;gt;|number=&amp;lt;1|2|3|4|left|right|whole&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;/span&amp;gt;  || &amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&amp;lt;nowiki&amp;gt; &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
:3. End Table&lt;br /&gt;
:* &amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableEndTemplate}}                       &amp;lt;!--- in the main page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:* &amp;lt;nowiki&amp;gt;{{Top_10_2010:BottomAdvancedTemplate   &amp;lt;!--- end of the page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |type={{Top_10_2010:StyleTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |useprev=PrevLink_Germany_Projekte&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |prev=Top_10_fuer_Entwickler&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |usenext=NextLink_Germany_Projekte&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |next=Top_10_fuer_Entwickler/Die Top-10-Risiken&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:: &amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''Example:''' ===&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|type={{Top_10_2010:StyleTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|subsection=vulnerableTo&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|position=firstLeft&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|risk=1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|year=2013&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|language=de&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;1st box&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableEndTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===English New Syntax===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|year=2013}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===English old Syntax 2013===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=1|risk=1|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=3|risk=1|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=4|risk=1|year=2013}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===English Old Syntax 2010===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=1|risk=1}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=3|risk=1}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=4|risk=1}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===German 2013===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2013|language=de}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2013|language=de}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=de}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=de}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|year=2013|language=de}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===German 2010===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|language=de}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|language=de}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|language=de}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|language=de}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|language=de}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===Special 2013===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=2|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=2|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=2|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=userImpact|position=right|risk=2|year=2013}}  &lt;br /&gt;
4th box &lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=defOp|title=1|position=longLeft|risk=2|year=2013}}  &lt;br /&gt;
5th box (long box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=defOp|title=2|position=right|risk=2|year=2013}} &lt;br /&gt;
6th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=left|risk=2|year=2013}}  &lt;br /&gt;
7th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt; {{#ifeq: {{{type}}} | box |&lt;br /&gt;
    {{#switch: {{{position}}}&lt;br /&gt;
      | firstLeft = &amp;lt;!-- first element: left half --&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | firstWhole = &amp;lt;!-- first element with full width --&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td colspan=&amp;quot;2&amp;quot;&lt;br /&gt;
      | firstLongLeft =&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | left = &amp;lt;!-- left half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | right = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt; &lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | whole =        &lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td colspan=&amp;quot;2&amp;quot;&lt;br /&gt;
      | longLeft =&lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | longRight = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt; &lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | #default = &amp;lt;!-- no 'position' set yet (old style)--&amp;gt;&lt;br /&gt;
         {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
           | left =  &amp;lt;!-- first element: left half (=&amp;gt; firstLeft in new nomenclature for position!--&amp;gt;&lt;br /&gt;
               {{Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | right = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt; &lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | whole =  &amp;lt;!-- first element with full width (=&amp;gt; firstWhole in new nomenclature for position!--&amp;gt;  &lt;br /&gt;
                  {{Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 1 = &amp;lt;!-- number 1: Left 1st Element   =&amp;gt; firstLeft in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                 {{Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 2 =  &amp;lt;!-- number 2: right 2nd Element =&amp;gt; right in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt; &lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 3 =  &amp;lt;!-- number 3: Links 3rd Element =&amp;gt; left in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 4 =  &amp;lt;!-- number 4: right 4th Element =&amp;gt; right in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
         }}&lt;br /&gt;
    }}&lt;br /&gt;
    style=&amp;quot;vertical-align: top; padding:5px; width: 50%;&lt;br /&gt;
           border: 3px solid {{Top_10:BorderColor|year={{{year}}} }};&lt;br /&gt;
           background-color: {{Top_10:BackgroundColor|year={{{year}}} }};&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;font-style: bold; &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2013=color: #000000; border-bottom: #999999 solid 1px; margin-bottom: 3px; padding-bottom: 3px;&lt;br /&gt;
             | #default=color: #4F81BD;&lt;br /&gt;
           }}; &lt;br /&gt;
           font-size: 150%;&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;!--- Box-Sub-Headline ---&amp;gt;&lt;br /&gt;
    {{#switch: {{{subsection}}}&lt;br /&gt;
      | freetext=    {{{title}}} &lt;br /&gt;
      | example=     {{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
      | howPrevent=  {{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
      | defOp=       {{Mobile_Top_10:LanguageFile|text=defendingOption|language={{{language}}} }} {{{title}}} {{Mobile_Top_10:LanguageFile|text=against|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;: &lt;br /&gt;
      | userImpact=  {{Mobile_Top_10:LanguageFile|text=userImpact|language={{{language}}} }}&lt;br /&gt;
      | references=  {{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
      | vulnerableTo={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }}&lt;br /&gt;
      | #default= &amp;lt;!-- no 'subsection' set yet (old style)--&amp;gt;&lt;br /&gt;
         {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
           | left &lt;br /&gt;
           | right &lt;br /&gt;
           | whole={{{title}}}&lt;br /&gt;
           | 1={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }} &lt;br /&gt;
           | 2={{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
           | 3={{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
           | 4={{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
       }} &lt;br /&gt;
   }}&amp;lt;/div&amp;gt;&lt;br /&gt;
|&amp;lt;br/&amp;gt;{{Top_10_2010:SubsectionColoredTemplate|&lt;br /&gt;
    {{#switch: {{{subsection}}}&lt;br /&gt;
      | freetext=   {{{title}}} &lt;br /&gt;
      | example=    {{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
      | howPrevent= {{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
      | defOp=      {{Mobile_Top_10:LanguageFile|text=defendingOption|language={{{language}}} }} {{{title}}} {{Mobile_Top_10:LanguageFile|text=against|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;:&lt;br /&gt;
      | userImpact= {{Mobile_Top_10:LanguageFile|text=userImpact|language={{{language}}} }}&lt;br /&gt;
      | references= {{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
      | vulnerableTo= {{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }}&lt;br /&gt;
      | #default= &amp;lt;!-- no 'subsection' set yet (old style)--&amp;gt;&lt;br /&gt;
       {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
         | left &lt;br /&gt;
         | right &lt;br /&gt;
         | whole={{{title}}}&lt;br /&gt;
         | 1={{Mobile_Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }} &lt;br /&gt;
         | 2={{Mobile_Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Mobile_Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
         | 3={{Mobile_Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
         | 4={{Mobile_Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
       }}&lt;br /&gt;
   }}|}}&lt;br /&gt;
}} &amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionAdvancedTemplate&amp;diff=210858</id>
		<title>Template:Mobile Top 10 2016:SubsectionAdvancedTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:SubsectionAdvancedTemplate&amp;diff=210858"/>
				<updated>2016-03-10T07:25:47Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;&amp;lt;!---------------------------------------------------------&amp;gt;  &amp;lt;!--   Template:Top 10 2010:SubsectionAdvancedTemplate   --&amp;gt; &amp;lt;!--------------------------------------------------...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!---------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!--   Template:Top 10 2010:SubsectionAdvancedTemplate   --&amp;gt;&lt;br /&gt;
&amp;lt;!---------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
# Start Table &lt;br /&gt;
#* &amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableBeginTemplate|type=main}}      &amp;lt;!--- in the main page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#* &amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableBeginTemplate|type=headertab}} &amp;lt;!--- in the languages part, like JAVA ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
#:&lt;br /&gt;
# hint: use 'position=firstLeft', 'firstWhole' or 'firstLongLeft' for the 1st element&amp;lt;br/&amp;gt; &lt;br /&gt;
::{| &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;{{Top_10_2010_Developer_Edition_De:SubsectionAdvancedTemplate&amp;lt;/nowiki&amp;gt; ||  &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|type={{Top_10_2010:StyleTemplate}}&amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!---  =&amp;gt; box  ---&amp;gt; &amp;lt;/nowiki&amp;gt; &lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|subsection=&amp;lt;defOp|example|freetext|howPrevent|references|userImpact|vulnerableTo&amp;gt;&amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|title=your title&amp;lt;/nowiki&amp;gt;                    || &amp;lt;nowiki&amp;gt; &amp;lt;!--- additional parameter for subsection=freetext or defOp (for the number) ---&amp;gt; &amp;lt;/nowiki&amp;gt;                &lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|position=&amp;lt;firstLeft|firstWhole|firstLongLeft|left|right|whole|longLeft|longRight&amp;gt;&amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|risk=&amp;lt;1-10|11&amp;gt;                    &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!--- additional parameter for subsection=&amp;lt;defOp|example|howPrevent|vulnerableTo&amp;gt;:&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;                                                           || according to [[:Template:Top_10_2010:ByTheNumbers]] &amp;lt;nowiki&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|year=&amp;lt;2010|2013&amp;gt;                  &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!--- changes year of the Top-10-Version for subsection=&amp;lt;defOp|example|howPrevent|vulnerableTo&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;|language=de                       &amp;lt;/nowiki&amp;gt;  || &amp;lt;nowiki&amp;gt; &amp;lt;!---  additional parameter for all subsection-tags without fulltext ---&amp;gt; &amp;lt;/nowiki&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;                                                           || according to [[:Template:Top 10:LanguageFile]] &amp;lt;nowiki&amp;gt; ---&amp;gt; &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;lt;nowiki&amp;gt;}}                                       &amp;lt;/nowiki&amp;gt;  || &amp;amp;nbsp;&lt;br /&gt;
|- &lt;br /&gt;
| &amp;amp;nbsp;outdatet:                                             || &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&amp;amp;nbsp;&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&amp;lt;nowiki&amp;gt;|number=&amp;lt;1|2|3|4|left|right|whole&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;/span&amp;gt;  || &amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;&amp;lt;nowiki&amp;gt; &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
:3. End Table&lt;br /&gt;
:* &amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableEndTemplate}}                       &amp;lt;!--- in the main page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:* &amp;lt;nowiki&amp;gt;{{Top_10_2010:BottomAdvancedTemplate   &amp;lt;!--- end of the page ---&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |type={{Top_10_2010:StyleTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |useprev=PrevLink_Germany_Projekte&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |prev=Top_10_fuer_Entwickler&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |usenext=NextLink_Germany_Projekte&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::: &amp;lt;nowiki&amp;gt;    |next=Top_10_fuer_Entwickler/Die Top-10-Risiken&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:: &amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== '''Example:''' ===&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|type={{Top_10_2010:StyleTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|subsection=vulnerableTo&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|position=firstLeft&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|risk=1&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|year=2013&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
::&amp;lt;nowiki&amp;gt;|language=de&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;1st box&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;{{Top_10:SubsectionTableEndTemplate}}&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===English New Syntax===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|year=2013}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===English old Syntax 2013===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=1|risk=1|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=3|risk=1|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=4|risk=1|year=2013}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===English Old Syntax 2010===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=1|risk=1}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=3|risk=1}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=4|risk=1}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===German 2013===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|year=2013|language=de}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|year=2013|language=de}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|year=2013|language=de}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|year=2013|language=de}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|year=2013|language=de}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===German 2010===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=1|language=de}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=1|language=de}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=1|language=de}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=1|language=de}}  &lt;br /&gt;
4th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=defOp|title=1|position=whole|risk=1|language=de}}  &lt;br /&gt;
5th box (big box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
===Special 2013===&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=2|year=2013}}  &lt;br /&gt;
1st box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=2|year=2013}}  &lt;br /&gt;
2nd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=2|year=2013}}  &lt;br /&gt;
3rd box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=userImpact|position=right|risk=2|year=2013}}  &lt;br /&gt;
4th box &lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=defOp|title=1|position=longLeft|risk=2|year=2013}}  &lt;br /&gt;
5th box (long box)&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=defOp|title=2|position=right|risk=2|year=2013}} &lt;br /&gt;
6th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=left|risk=2|year=2013}}  &lt;br /&gt;
7th box&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt; {{#ifeq: {{{type}}} | box |&lt;br /&gt;
    {{#switch: {{{position}}}&lt;br /&gt;
      | firstLeft = &amp;lt;!-- first element: left half --&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | firstWhole = &amp;lt;!-- first element with full width --&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td colspan=&amp;quot;2&amp;quot;&lt;br /&gt;
      | firstLongLeft =&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | left = &amp;lt;!-- left half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | right = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt; &lt;br /&gt;
              &amp;lt;td &lt;br /&gt;
      | whole =        &lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td colspan=&amp;quot;2&amp;quot;&lt;br /&gt;
      | longLeft =&lt;br /&gt;
              &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
              &amp;lt;tr&amp;gt;&lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | longRight = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
              &amp;lt;/td&amp;gt; &lt;br /&gt;
              &amp;lt;td rowspan=&amp;quot;2&amp;quot; &lt;br /&gt;
      | #default = &amp;lt;!-- no 'position' set yet (old style)--&amp;gt;&lt;br /&gt;
         {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
           | left =  &amp;lt;!-- first element: left half (=&amp;gt; firstLeft in new nomenclature for position!--&amp;gt;&lt;br /&gt;
               {{Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | right = &amp;lt;!-- right half --&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt; &lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | whole =  &amp;lt;!-- first element with full width (=&amp;gt; firstWhole in new nomenclature for position!--&amp;gt;  &lt;br /&gt;
                  {{Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 1 = &amp;lt;!-- number 1: Left 1st Element   =&amp;gt; firstLeft in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                 {{Top_10:SubsectionTableBeginTemplate|type=main}}&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 2 =  &amp;lt;!-- number 2: right 2nd Element =&amp;gt; right in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt; &lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 3 =  &amp;lt;!-- number 3: Links 3rd Element =&amp;gt; left in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
                   &amp;lt;tr&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
           | 4 =  &amp;lt;!-- number 4: right 4th Element =&amp;gt; right in new nomenclature for position!--&amp;gt;&lt;br /&gt;
                   &amp;lt;/td&amp;gt;&lt;br /&gt;
                   &amp;lt;td &lt;br /&gt;
         }}&lt;br /&gt;
    }}&lt;br /&gt;
    style=&amp;quot;vertical-align: top; padding:5px; width: 50%;&lt;br /&gt;
           border: 3px solid {{Top_10:BorderColor|year={{{year}}} }};&lt;br /&gt;
           background-color: {{Top_10:BackgroundColor|year={{{year}}} }};&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;div style=&amp;quot;font-style: bold; &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2013=color: #000000; border-bottom: #999999 solid 1px; margin-bottom: 3px; padding-bottom: 3px;&lt;br /&gt;
             | #default=color: #4F81BD;&lt;br /&gt;
           }}; &lt;br /&gt;
           font-size: 150%;&amp;quot;&amp;gt;&lt;br /&gt;
    &amp;lt;!--- Box-Sub-Headline ---&amp;gt;&lt;br /&gt;
    {{#switch: {{{subsection}}}&lt;br /&gt;
      | freetext=    {{{title}}} &lt;br /&gt;
      | example=     {{Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
      | howPrevent=  {{Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
      | defOp=       {{Top_10:LanguageFile|text=defendingOption|language={{{language}}} }} {{{title}}} {{Top_10:LanguageFile|text=against|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;: &lt;br /&gt;
      | userImpact=  {{Top_10:LanguageFile|text=userImpact|language={{{language}}} }}&lt;br /&gt;
      | references=  {{Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
      | vulnerableTo={{Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }}&lt;br /&gt;
      | #default= &amp;lt;!-- no 'subsection' set yet (old style)--&amp;gt;&lt;br /&gt;
         {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
           | left &lt;br /&gt;
           | right &lt;br /&gt;
           | whole={{{title}}}&lt;br /&gt;
           | 1={{Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }} &lt;br /&gt;
           | 2={{Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
           | 3={{Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
           | 4={{Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
       }} &lt;br /&gt;
   }}&amp;lt;/div&amp;gt;&lt;br /&gt;
|&amp;lt;br/&amp;gt;{{Top_10_2010:SubsectionColoredTemplate|&lt;br /&gt;
    {{#switch: {{{subsection}}}&lt;br /&gt;
      | freetext=   {{{title}}} &lt;br /&gt;
      | example=    {{Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
      | howPrevent= {{Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
      | defOp=      {{Top_10:LanguageFile|text=defendingOption|language={{{language}}} }} {{{title}}} {{Top_10:LanguageFile|text=against|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;:&lt;br /&gt;
      | userImpact= {{Top_10:LanguageFile|text=userImpact|language={{{language}}} }}&lt;br /&gt;
      | references= {{Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
      | vulnerableTo= {{Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }}&lt;br /&gt;
      | #default= &amp;lt;!-- no 'subsection' set yet (old style)--&amp;gt;&lt;br /&gt;
       {{#switch: {{{number}}} &amp;lt;!--- backward compatible for Template:Top 10 2010:SubsectionAdvancedTemplate; please do NOT use any longer ---&amp;gt;&lt;br /&gt;
         | left &lt;br /&gt;
         | right &lt;br /&gt;
         | whole={{{title}}}&lt;br /&gt;
         | 1={{Top_10:LanguageFile|text=vulnerableTo1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Top_10:LanguageFile|text=vulnerableTo2|language={{{language}}} }} &lt;br /&gt;
         | 2={{Top_10:LanguageFile|text=howPrevent1|language={{{language}}} }} &amp;amp;apos;{{Top_10_2010:ByTheNumbers|{{{risk}}}|language={{{language}}}|year={{{year}}} }}&amp;amp;apos;{{Top_10:LanguageFile|text=howPrevent2|language={{{language}}} }}&lt;br /&gt;
         | 3={{Top_10:LanguageFile|text=exampleScenarios|language={{{language}}} }}&lt;br /&gt;
         | 4={{Top_10:LanguageFile|text=references|language={{{language}}} }}&lt;br /&gt;
       }}&lt;br /&gt;
   }}|}}&lt;br /&gt;
}} &amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:StyleTemplate&amp;diff=210855</id>
		<title>Template:Mobile Top 10 2016:StyleTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:StyleTemplate&amp;diff=210855"/>
				<updated>2016-03-10T07:13:10Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;box&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;box&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:BottomTemplate&amp;diff=210854</id>
		<title>Template:Mobile Top 10 2016:BottomTemplate</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Mobile_Top_10_2016:BottomTemplate&amp;diff=210854"/>
				<updated>2016-03-10T07:10:34Z</updated>
		
		<summary type="html">&lt;p&gt;Jonathan Carter: Created page with &amp;quot;{{LinkBar     |useprev={{{useprev}}}     |prev={{{prev}}}     |usenext={{{usenext}}}     |next={{{next}}}     |usemain=Template:Mobile_Top_10_2016-CenterLink     | year={{{yea...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{LinkBar&lt;br /&gt;
    |useprev={{{useprev}}}&lt;br /&gt;
    |prev={{{prev}}}&lt;br /&gt;
    |usenext={{{usenext}}}&lt;br /&gt;
    |next={{{next}}}&lt;br /&gt;
    |usemain=Template:Mobile_Top_10_2016-CenterLink&lt;br /&gt;
    | year={{{year}}}&lt;br /&gt;
    |language={{{language}}}&lt;br /&gt;
}}&lt;br /&gt;
----&lt;br /&gt;
&amp;lt;center&amp;gt;''© 2002-2016 OWASP Foundation''&lt;br /&gt;
This document is licensed under the Creative Commons [http://creativecommons.org/licenses/by-sa/3.0/ Attribution-ShareAlike 3.0] license. Some rights reserved. [http://creativecommons.org/licenses/by-sa/3.0/ [[File:CC-by-sa-3_0-88x31.png]] ]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10:LanguageFile|text=projectCategory|language={{{language}}}|year={{{year}}} }}&lt;/div&gt;</summary>
		<author><name>Jonathan Carter</name></author>	</entry>

	</feed>