<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Paul+Swift</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Paul+Swift"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Paul_Swift"/>
		<updated>2026-05-06T07:56:04Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2013-Release_Notes&amp;diff=155168</id>
		<title>Top 10 2013-Release Notes</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2013-Release_Notes&amp;diff=155168"/>
				<updated>2013-07-05T09:34:42Z</updated>
		
		<summary type="html">&lt;p&gt;Paul Swift: Removed typo.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Top_10_2013:TopTemplate&lt;br /&gt;
    |usenext=2013NextLink&lt;br /&gt;
    |next={{Top_10:LanguageFile|text=risk|year=2013|language=en}}&lt;br /&gt;
    |useprev=2013PrevLink&lt;br /&gt;
    |prev={{Top_10:LanguageFile|text=introduction|year=2013|language=en}}&lt;br /&gt;
    |year=2013&lt;br /&gt;
    |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}}{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=firstWhole|title={{Top_10:LanguageFile|text=whatChangedFrom2010to2013|year=2013|language=en}}|width=100%|year=2013|language=en}}&lt;br /&gt;
The threat landscape for applications security constantly changes. Key factors in this evolution are advances made by attackers, the release of new technologies with new weaknesses as well as more built in defenses, and the deployment of increasingly complex systems. To keep pace, we periodically update the OWASP Top 10. In this 2013 release, we made the following changes:&lt;br /&gt;
&amp;lt;ol&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Broken Authentication and Session Management moved up in prevalence based on our data set. Probably because this area is being looked at harder, not because issues are actually more prevalent. This caused Risks A2 and A3 to switch places.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Cross-Site Request Forgery (CSRF) moved down in prevalence based on our data set from 2010-A5 to 2013-A8. We believe this is because CSRF has been in the OWASP Top 10 for 6 years, and organizations and framework developers have focused on it enough to significantly reduce the number of CSRF vulnerabilities in real world applications.&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;We broadened Failure to Restrict URL Access from the 2010 OWASP Top 10 to be more inclusive:&lt;br /&gt;
&amp;lt;p style=&amp;quot;padding-left: 2em; text-indent: -2em;&amp;quot;&amp;gt;&lt;br /&gt;
+&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;2010-A8: Failure to Restrict URL Access is now &amp;lt;u&amp;gt;2013-A7: Missing Function Level Access Control&amp;lt;/u&amp;gt; – to cover all of function level access control. There are many ways to specify which function is being accessed, not just the URL.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;We merged and broadened 2010-A7 &amp;amp; 2010-A9 to CREATE: &amp;lt;u&amp;gt;2013-A6: Sensitive Data Exposure&amp;lt;/u&amp;gt;:&lt;br /&gt;
&amp;lt;p style=&amp;quot;padding-left: 2em; text-indent: -2em;&amp;quot;&amp;gt;&lt;br /&gt;
-&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;This new category was created by merging 2010-A7 – Insecure Cryptographic Storage  &amp;amp; 2010-A9 - Insufficient Transport Layer Protection, plus adding browser side sensitive data risks as well. This new category covers sensitive data protection (other than access control which is covered by 2013-A4 and 2013-A7) from the moment sensitive data is provided by the user, sent to and stored within the application, and then sent back to the browser again.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;We added: &amp;lt;u&amp;gt;2013-A9: Using Components with Known Vulnerabilities&amp;lt;/u&amp;gt;:&lt;br /&gt;
&amp;lt;p style=&amp;quot;padding-left: 2em; text-indent: -2em;&amp;quot;&amp;gt;&lt;br /&gt;
+&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;This issue was mentioned as part of 2010-A6 – Security Misconfiguration, but now has a category of its own as the growth and depth of component based development has significantly increased the risk of using components with known vulnerabilities.&amp;lt;/p&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
{{Top_10:SubsectionTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width: 99%; align:center; text-align:center; border: 2px solid #4d953d; background-color:#F2F2F2; padding=2;&amp;quot; &lt;br /&gt;
|- style=&amp;quot;background-color: #4d953d; color: #FFFFFF;&amp;quot;&lt;br /&gt;
! OWASP Top 10 - 2010 (Previous Version) !! OWASP Top 10 - 2013 (Current Version)&lt;br /&gt;
|- style=&amp;quot;background-color: #FFFFFF;&amp;quot; &lt;br /&gt;
| [[Top_10_2010-A1 | A1-Injection]]&lt;br /&gt;
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A1-{{Top_10_2010:ByTheNumbers|1|language=en|year=2013}}|A1-{{Top_10_2010:ByTheNumbers|1|language=en|year=2013}}]]&lt;br /&gt;
|- style=&amp;quot;background-color: #FFFFFF;&amp;quot; &lt;br /&gt;
| [[Top_10_2010-A3 | A3-Broken Authentication and Session Management]]&lt;br /&gt;
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A2-{{Top_10_2010:ByTheNumbers|2|language=en|year=2013}}|A2-{{Top_10_2010:ByTheNumbers|2|language=en|year=2013}}]]&lt;br /&gt;
|- style=&amp;quot;background-color: #FFFFFF;&amp;quot; &lt;br /&gt;
| [[Top_10_2010-A2 | A2-Cross Site Scripting (XSS)]]&lt;br /&gt;
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A3-{{Top_10_2010:ByTheNumbers|3|language=en|year=2013}}|A3-{{Top_10_2010:ByTheNumbers|3|language=en|year=2013}}]]&lt;br /&gt;
|- style=&amp;quot;background-color: #FFFFFF;&amp;quot; &lt;br /&gt;
| [[Top_10_2010-A4 | A4-Insecure Direct Object Reference]]&lt;br /&gt;
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A4-{{Top_10_2010:ByTheNumbers|4|language=en|year=2013}}|A4-{{Top_10_2010:ByTheNumbers|4|language=en|year=2013}}]]&lt;br /&gt;
|- style=&amp;quot;background-color: #FFFFFF;&amp;quot; &lt;br /&gt;
| [[Top_10_2010-A6 | A6-Security Misconfiguration]]&lt;br /&gt;
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A5-{{Top_10_2010:ByTheNumbers|5|language=en|year=2013}}|A5-{{Top_10_2010:ByTheNumbers|5|language=en|year=2013}}]]&lt;br /&gt;
|- style=&amp;quot;background-color: #D7D6C0;&amp;quot; &lt;br /&gt;
| [[Top_10_2010-A7 | A7-Insecure Cryptographic Storage - Merged with A9 --&amp;gt;]]&lt;br /&gt;
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A6-{{Top_10_2010:ByTheNumbers|6|language=en|year=2013}}|A6-{{Top_10_2010:ByTheNumbers|6|language=en|year=2013}}]]&lt;br /&gt;
|- style=&amp;quot;background-color: #D7D6C0;&amp;quot; &lt;br /&gt;
| [[Top_10_2010-A8 | A8-Failure to Restrict URL Access - Broadened into --&amp;gt;]]&lt;br /&gt;
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A7-{{Top_10_2010:ByTheNumbers|7|language=en|year=2013}}|A7-{{Top_10_2010:ByTheNumbers|7|language=en|year=2013}}]]&lt;br /&gt;
|- style=&amp;quot;background-color: #FFFFFF;&amp;quot; &lt;br /&gt;
| [[Top_10_2007-A5 | A5-Cross Site Request Forgery (CSRF)]]&lt;br /&gt;
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A8-{{Top_10_2010:ByTheNumbers|8|language=en|year=2013}}|A8-{{Top_10_2010:ByTheNumbers|8|language=en|year=2013}}]]&lt;br /&gt;
|- style=&amp;quot;background-color: #D7D6C0;&amp;quot; &lt;br /&gt;
| [[Top_10_2010-A6 | &amp;lt;buried in A6: Security Misconfiguration&amp;gt;]]&lt;br /&gt;
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A9-{{Top_10_2010:ByTheNumbers|9|language=en|year=2013}}|A9-{{Top_10_2010:ByTheNumbers|9|language=en|year=2013}}]]&lt;br /&gt;
|- style=&amp;quot;background-color: #FFFFFF;&amp;quot; &lt;br /&gt;
| [[Top_10_2010-A10 | A10-Unvalidated Redirects and Forwards]]&lt;br /&gt;
| [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A10-{{Top_10_2010:ByTheNumbers|10|language=en|year=2013}}|A10-{{Top_10_2010:ByTheNumbers|10|language=en|year=2013}}]]&lt;br /&gt;
|- style=&amp;quot;background-color: #E6B9B8;&amp;quot; &lt;br /&gt;
| [[Top_10_2010-A9 | A9-Insufficient Transport Layer Protection]]&lt;br /&gt;
| Merged with [[Top_10_2010-A7 | 2010-A7]] into [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A6-{{Top_10_2010:ByTheNumbers|6|language=en|year=2013}}|2013-A6]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2013:BottomTemplate&lt;br /&gt;
  |usenext=2013NextLink&lt;br /&gt;
  |useprev=2013PrevLink&lt;br /&gt;
  |next={{Top_10:LanguageFile|text=risk|year=2013|language=en}}&lt;br /&gt;
  |useprev=2013PrevLink&lt;br /&gt;
  |prev={{Top_10:LanguageFile|text=introduction|year=2013|language=en}}&lt;br /&gt;
  |year=2013&lt;br /&gt;
  |language=en&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Paul Swift</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Help:Contents&amp;diff=155167</id>
		<title>Help:Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Help:Contents&amp;diff=155167"/>
				<updated>2013-07-05T09:12:06Z</updated>
		
		<summary type="html">&lt;p&gt;Paul Swift: De-duplicated some text; added missing indefinite article.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page has some pointers to useful documentation for dealing with OWASP's Wiki.&lt;br /&gt;
&lt;br /&gt;
There is an [https://www.owasp.org/index.php/Help:Editing Editing Help] page (linked to at the bottom of every edit page) that has some useful material. If you are making small changes or only textual (as compared to formatting) then the information on that page should be fine. If you are making larger changes, look for an article that looks like what you want and steal the formatting. Remember, you can edit nearly every page so if, for example, you want to copy some formatting off of the [https://www.owasp.org/index.php/About_The_Open_Web_Application_Security_Project About OWASP] page (something you should probably never edit without great care and discussion), you can still click the edit link and copy the formatting. The Wiki does some page locking so it is generally better to hit the &amp;quot;Cancel&amp;quot; link after you have copied-and-pasted. If you forget, it is not a big deal as there is a timeout on the lock so it will fix itself eventually. For example, the previously mentioned [https://www.owasp.org/index.php/Help:Editing Editing Help] page has about as complex a table as you could want and you can copy the formatting for that table and use it.&lt;br /&gt;
&lt;br /&gt;
Should you be looking for something that is more complicated or you want more extensive documentation to help you out, then the [http://www.wikipedia.org/en Wikipedia's] help pages are your best bet. Both the OWASP Wiki and the Wikipedia are powered by the same Wiki engine, [http://www.mediawiki.org/ MediaWiki]. &lt;br /&gt;
&lt;br /&gt;
The following are some jumping off points for the Wikipedia's help pages:&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Help:Editing Wikipedia's &amp;quot;Editing Help&amp;quot;]: Similar to OWASP's &amp;quot;Editing Help&amp;quot; page.&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Wikipedia:Cheatsheet The Wikipedia Cheatsheet]: A quick reference guide.&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Help:A_quick_guide_to_templates A Quick Guide to Templates]: Templates are a macro feature that can be used for everything from reducing typing to giving multiple pages a common look-and-feel. They are not used very much in OWASP's Wiki although I do not know why. While the Wikipedia and OWASP's Wiki share the same Wiki engine, the Wikipedia has added a rather large collection of templates that are not found in OWASP so do not be surprised if some of the documentation about specific templates is incorrect.&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Help:Magic_words Magic Words]: At least some of these magic words work (e.g.: the &amp;quot;&amp;lt;nowiki&amp;gt;__TOC__&amp;lt;/nowiki&amp;gt;&amp;quot;).&lt;br /&gt;
&lt;br /&gt;
Please update this page if you have further updates.&lt;/div&gt;</summary>
		<author><name>Paul Swift</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Top_10_2013&amp;diff=155062</id>
		<title>Top 10 2013</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Top_10_2013&amp;diff=155062"/>
				<updated>2013-07-04T12:44:57Z</updated>
		
		<summary type="html">&lt;p&gt;Paul Swift: Fixed minor typos.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Top_10_2013:TopTemplate&lt;br /&gt;
   |usenext=2013NextLink&lt;br /&gt;
   |next={{Top_10:LanguageFile|text=introduction|language=en|year=2013|language=en}}&lt;br /&gt;
   |useprev=Nothing&lt;br /&gt;
   |prev=&lt;br /&gt;
   |year=2013&lt;br /&gt;
   |language=en&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
{{Top_10:SubsectionTableBeginTemplate|type=main}}{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=firstLeft|title={{Top_10:LanguageFile|text=foreword}}|year=2013|language=en}}&lt;br /&gt;
Insecure software is undermining our financial, healthcare,&lt;br /&gt;
defense, energy, and other critical infrastructure. As our&lt;br /&gt;
digital infrastructure gets increasingly complex and&lt;br /&gt;
interconnected, the difficulty of achieving application&lt;br /&gt;
security increases exponentially. We can no longer afford to&lt;br /&gt;
tolerate relatively simple security problems like those&lt;br /&gt;
presented in this OWASP Top 10.&lt;br /&gt;
&lt;br /&gt;
The goal of the Top 10 project is to raise awareness about&lt;br /&gt;
application security by identifying some of the most critical&lt;br /&gt;
risks facing organizations. The Top 10 project is referenced&lt;br /&gt;
by many standards, books, tools, and organizations, including&lt;br /&gt;
MITRE, PCI DSS, DISA, FTC, and [[Industry:Citations|many more]]. This release of&lt;br /&gt;
the OWASP Top 10 marks this project’s tenth anniversary of&lt;br /&gt;
raising awareness of the importance of application security&lt;br /&gt;
risks. The OWASP Top 10 was first released in 2003, with&lt;br /&gt;
minor updates in 2004 and 2007. The 2010 version was&lt;br /&gt;
revamped to prioritize by risk, not just prevalence. This 2013&lt;br /&gt;
edition follows the same approach.&lt;br /&gt;
&lt;br /&gt;
We encourage you to use the Top 10 to get your organization&lt;br /&gt;
started with application security. Developers can learn from&lt;br /&gt;
the mistakes of other organizations. Executives should start&lt;br /&gt;
thinking about how to manage the risk that software&lt;br /&gt;
applications create in their enterprise.&lt;br /&gt;
&lt;br /&gt;
In the long term, we encourage you to create an application&lt;br /&gt;
security program that is compatible with your culture and&lt;br /&gt;
technology. These programs come in all shapes and sizes,&lt;br /&gt;
and you should avoid attempting to do everything prescribed&lt;br /&gt;
by some process model. Instead, leverage your&lt;br /&gt;
organization’s existing strengths to do and measure what&lt;br /&gt;
works for you.&lt;br /&gt;
&lt;br /&gt;
We hope that the OWASP Top 10 is useful to your application&lt;br /&gt;
security efforts. Please don’t hesitate to contact OWASP with&lt;br /&gt;
your questions, comments, and ideas, either publicly to&lt;br /&gt;
[mailto:owasp-topten@lists.owasp.org  owasp-topten@lists.owasp.org] or privately to [mailto:dave.wichers@owasp.org dave.wichers@owasp.org]. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=freetext|position=right|title={{Top_10:LanguageFile|text=aboutOWASP}}|year=2013|language=en}}&lt;br /&gt;
&lt;br /&gt;
The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted.  At OWASP you’ll find free and open …&lt;br /&gt;
&lt;br /&gt;
* Application security tools and standards&lt;br /&gt;
* Complete books on application security testing, secure code development, and secure code review&lt;br /&gt;
* Standard security controls and libraries&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_Chapter  Local chapters worldwide]&lt;br /&gt;
* Cutting edge research&lt;br /&gt;
* [https://www.owasp.org/index.php/Category:OWASP_AppSec_Conference  Extensive conferences worldwide]&lt;br /&gt;
* Mailing lists&lt;br /&gt;
&lt;br /&gt;
Learn more at: [https://www.owasp.org/  https://www.owasp.org]  &lt;br /&gt;
&lt;br /&gt;
All of the OWASP tools, documents, forums, and chapters are&lt;br /&gt;
free and open to anyone interested in improving application&lt;br /&gt;
security. We advocate approaching application security as a&lt;br /&gt;
people, process, and technology problem, because the most&lt;br /&gt;
effective approaches to application security require&lt;br /&gt;
improvements in all of these areas.&lt;br /&gt;
&lt;br /&gt;
OWASP is a new kind of organization. Our freedom from&lt;br /&gt;
commercial pressures allows us to provide unbiased, practical,&lt;br /&gt;
cost-effective information about application security. OWASP&lt;br /&gt;
is not affiliated with any technology company, although we&lt;br /&gt;
support the informed use of commercial security technology.&lt;br /&gt;
Similar to many open source software projects, OWASP&lt;br /&gt;
produces many types of materials in a collaborative, open way.&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation is the non-profit entity that ensures&lt;br /&gt;
the project’s long-term success. Almost everyone associated&lt;br /&gt;
with OWASP is a volunteer, including the OWASP Board,&lt;br /&gt;
Global Committees, Chapter Leaders, Project Leaders, and&lt;br /&gt;
project members. We support innovative security research&lt;br /&gt;
with grants and infrastructure.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Come join us!&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&amp;lt;/table&amp;gt;&lt;br /&gt;
{{Top_10_2013:BottomTemplate&lt;br /&gt;
  |usenext=2013NextLink&lt;br /&gt;
  |next={{Top_10:LanguageFile|text=introduction|language=en|year=2013|language=en}}&lt;br /&gt;
  |useprev=Nothing&lt;br /&gt;
  |prev=&lt;br /&gt;
  |year=2013&lt;br /&gt;
  |language=en&lt;br /&gt;
}}&lt;br /&gt;
[[Category:OWASP Top Ten Project]]&lt;/div&gt;</summary>
		<author><name>Paul Swift</name></author>	</entry>

	</feed>