This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10 2013-Release Notes"
Line 24: | Line 24: | ||
<center> | <center> | ||
− | {| style="width: | + | {| style="width: 99%; align:center; text-align:center; border: 2px solid #4d953d; background-color:#F2F2F2; padding=2;" |
|- style="background-color: #4d953d; color: #FFFFFF;" | |- style="background-color: #4d953d; color: #FFFFFF;" | ||
! OWASP Top 10 - 2010 (Previous Version) !! OWASP Top 10 - 2013 (Current Version) | ! OWASP Top 10 - 2010 (Previous Version) !! OWASP Top 10 - 2013 (Current Version) | ||
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
− | |||
| [[Top_10_2010-A1 | A1-Injection]] | | [[Top_10_2010-A1 | A1-Injection]] | ||
+ | | [[Top_10_2013-A1 | A1-Injection]] | ||
+ | |- style="background-color: #FFFFFF;" | ||
+ | | [[Top_10_2010-A3 | A3-Broken Authentication and Session Management]] | ||
+ | | [[Top_10_2013-A2 | A2-Broken Authentication and Session Management]] | ||
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
− | |||
| [[Top_10_2010-A2 | A2-Cross Site Scripting (XSS)]] | | [[Top_10_2010-A2 | A2-Cross Site Scripting (XSS)]] | ||
+ | | [[Top_10_2007-A7 | A7-Broken Authentication and Session Management]] | ||
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
− | | [[ | + | | [[Top_10_2010-A4 | A4-Insecure Direct Object Reference]] |
− | | [[ | + | | [[Top_10_2013-A4 | A4-Insecure Direct Object References]] |
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
− | | [[ | + | | [[Top_10_2010-A6 | A6 Security Misconfiguration]] |
− | | [[ | + | | [[Top_10_2013-A5 | A5 Security Misconfiguration]] |
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
| [[Top_10_2007-A5 | A5-Cross Site Request Forgery (CSRF)]] | | [[Top_10_2007-A5 | A5-Cross Site Request Forgery (CSRF)]] | ||
| [[Top_10_2010-A5 | A5-Cross Site Request Forgery (CSRF)]] | | [[Top_10_2010-A5 | A5-Cross Site Request Forgery (CSRF)]] | ||
|- style="background-color: #D7D6C0;" | |- style="background-color: #D7D6C0;" | ||
− | | [[ | + | | [[Top_10_2010-A6 | A6-Security Misconfiguration]] |
− | | [[ | + | | [[Top_10_2013-A5 | A5-Security Misconfiguration]] |
− | |- style="background-color: # | + | |- style="background-color: #D7D6C0;" |
− | | [[ | + | | [[Top_10_2010-A8 | A8-Failure to Restrict URL Access]] |
− | | [[ | + | | [[Top_10_2013-A7 | A7-Missing Function Level Action Control]] |
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
| [[Top_10_2007-A10 | A10-Failure to Restrict URL Access]] | | [[Top_10_2007-A10 | A10-Failure to Restrict URL Access]] | ||
Line 61: | Line 64: | ||
| <dropped from 2010 Top 10> | | <dropped from 2010 Top 10> | ||
|- style="background-color: #E6B9B8;" | |- style="background-color: #E6B9B8;" | ||
− | | [[ | + | | [[Top_10_2010-A9 | A9-Insufficient Transport Layer Protection]] |
− | | | + | | Merged with [[Top_10_2010-A7 | 2010-A7]] into [[Top_10_2013-A6 | 2013-A6]] |
|} | |} | ||
</center> | </center> | ||
{{Top_10_2013:BottomTemplate|usenext=2013NextLink|useprev=2013PrevLink|prev=Introduction|next=Main}} | {{Top_10_2013:BottomTemplate|usenext=2013NextLink|useprev=2013PrevLink|prev=Introduction|next=Main}} |
Revision as of 20:29, 23 February 2013
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
[[Top 10 {{{year}}}-Introduction|← Introduction]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-Risk|Risk →]] |
What Changed From 2010 to 2013?
The threat landscape for applications security constantly changes. Key factors in this evolution are advances made by attackers, the release of new technologies with new weaknesses as well as more built in defenses, and the deployment of increasingly complex systems. To keep pace, we periodically update the OWASP Top 10. In this 2013 release, we made the following changes:
|
[[Top 10 {{{year}}}-Introduction|← Introduction]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-Main|Main →]] |