This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10 2013-Risk"
From OWASP
(Created page with "{{Top_10_2013:TopTemplate |usenext=2013NextLink |next=T10 |useprev=2013PrevLink |prev=RN }} {{Top_10_2013:BottomAdvancedTemplate |type=none |usenex...") |
|||
| Line 6: | Line 6: | ||
}} | }} | ||
| − | + | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=whole|width=100%|year=2013}} | |
| − | + | What Are Application Security Risks= | |
| + | </td></tr></table> | ||
| + | Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention. | ||
{{Top_10_2013:BottomAdvancedTemplate | {{Top_10_2013:BottomAdvancedTemplate | ||
| − | |type= | + | |type=box |
|usenext=2013NextLink | |usenext=2013NextLink | ||
|next=T10 | |next=T10 | ||
|useprev=2013PrevLink | |useprev=2013PrevLink | ||
|prev=RN | |prev=RN | ||
| + | }} | ||
Revision as of 05:21, 21 February 2013
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
| [[Top 10 {{{year}}}-RN|← RN]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-T10|T10 →]] |
|
{{{title}}}
What Are Application Security Risks= |
Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention.
</td></tr></table>
| [[Top 10 {{{year}}}-RN|← RN]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-T10|T10 →]] |