This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10 2013-Release Notes"
(added '|year=2013 |language=en, prev={{Top_10:LanguageFile...}}, |next={{Top_10:LanguageFile...}}' at Top/BottomTemplates and '|language=en' where it has been missing) |
(Internationalized 2013-Links and corrected description for 2013-A7 and A9) |
||
Line 31: | Line 31: | ||
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
| [[Top_10_2010-A1 | A1-Injection]] | | [[Top_10_2010-A1 | A1-Injection]] | ||
− | | [[ | + | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A1-{{Top_10_2010:ByTheNumbers|1|language=en|year=2013}}|A1-{{Top_10_2010:ByTheNumbers|1|language=en|year=2013}}]] |
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
| [[Top_10_2010-A3 | A3-Broken Authentication and Session Management]] | | [[Top_10_2010-A3 | A3-Broken Authentication and Session Management]] | ||
− | | [[ | + | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A2-{{Top_10_2010:ByTheNumbers|2|language=en|year=2013}}|A2-{{Top_10_2010:ByTheNumbers|2|language=en|year=2013}}]] |
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
| [[Top_10_2010-A2 | A2-Cross Site Scripting (XSS)]] | | [[Top_10_2010-A2 | A2-Cross Site Scripting (XSS)]] | ||
− | | [[ | + | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A3-{{Top_10_2010:ByTheNumbers|3|language=en|year=2013}}|A3-{{Top_10_2010:ByTheNumbers|3|language=en|year=2013}}]] |
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
| [[Top_10_2010-A4 | A4-Insecure Direct Object Reference]] | | [[Top_10_2010-A4 | A4-Insecure Direct Object Reference]] | ||
− | | [[ | + | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A4-{{Top_10_2010:ByTheNumbers|4|language=en|year=2013}}|A4-{{Top_10_2010:ByTheNumbers|4|language=en|year=2013}}]] |
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
| [[Top_10_2010-A6 | A6-Security Misconfiguration]] | | [[Top_10_2010-A6 | A6-Security Misconfiguration]] | ||
− | | [[ | + | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A5-{{Top_10_2010:ByTheNumbers|5|language=en|year=2013}}|A5-{{Top_10_2010:ByTheNumbers|5|language=en|year=2013}}]] |
|- style="background-color: #D7D6C0;" | |- style="background-color: #D7D6C0;" | ||
| [[Top_10_2010-A7 | A7-Insecure Cryptographic Storage - Merged with A9 -->]] | | [[Top_10_2010-A7 | A7-Insecure Cryptographic Storage - Merged with A9 -->]] | ||
− | | [[ | + | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A6-{{Top_10_2010:ByTheNumbers|6|language=en|year=2013}}|A6-{{Top_10_2010:ByTheNumbers|6|language=en|year=2013}}]] |
|- style="background-color: #D7D6C0;" | |- style="background-color: #D7D6C0;" | ||
| [[Top_10_2010-A8 | A8-Failure to Restrict URL Access - Broadened into -->]] | | [[Top_10_2010-A8 | A8-Failure to Restrict URL Access - Broadened into -->]] | ||
− | | [[ | + | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A7-{{Top_10_2010:ByTheNumbers|7|language=en|year=2013}}|A7-{{Top_10_2010:ByTheNumbers|7|language=en|year=2013}}]] |
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
| [[Top_10_2007-A5 | A5-Cross Site Request Forgery (CSRF)]] | | [[Top_10_2007-A5 | A5-Cross Site Request Forgery (CSRF)]] | ||
− | | [[ | + | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A8-{{Top_10_2010:ByTheNumbers|8|language=en|year=2013}}|A8-{{Top_10_2010:ByTheNumbers|8|language=en|year=2013}}]] |
|- style="background-color: #D7D6C0;" | |- style="background-color: #D7D6C0;" | ||
| [[Top_10_2010-A6 | <buried in A6: Security Misconfiguration>]] | | [[Top_10_2010-A6 | <buried in A6: Security Misconfiguration>]] | ||
− | | [[ | + | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A9-{{Top_10_2010:ByTheNumbers|9|language=en|year=2013}}|A9-{{Top_10_2010:ByTheNumbers|9|language=en|year=2013}}]] |
|- style="background-color: #FFFFFF;" | |- style="background-color: #FFFFFF;" | ||
| [[Top_10_2010-A10 | A10-Unvalidated Redirects and Forwards]] | | [[Top_10_2010-A10 | A10-Unvalidated Redirects and Forwards]] | ||
− | | [[ | + | | [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A10-{{Top_10_2010:ByTheNumbers|10|language=en|year=2013}}|A10-{{Top_10_2010:ByTheNumbers|10|language=en|year=2013}}]] |
|- style="background-color: #E6B9B8;" | |- style="background-color: #E6B9B8;" | ||
| [[Top_10_2010-A9 | A9-Insufficient Transport Layer Protection]] | | [[Top_10_2010-A9 | A9-Insufficient Transport Layer Protection]] | ||
− | | Merged with [[Top_10_2010-A7 | 2010-A7]] into [[ | + | | Merged with [[Top_10_2010-A7 | 2010-A7]] into [[{{Top_10:LanguageFile|text=documentRootTop10|year=2013|language=en}}-A6-{{Top_10_2010:ByTheNumbers|6|language=en|year=2013}}|2013-A6]] |
|} | |} | ||
</center> | </center> |
Revision as of 23:29, 14 June 2013
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
What Changed From 2010 to 2013?
The threat landscape for applications security constantly changes. Key factors in this evolution are advances made by attackers, the release of new technologies with new weaknesses as well as more built in defenses, and the deployment of increasingly complex systems. To keep pace, we periodically update the OWASP Top 10. In this 2013 release, we made the following changes:
|