OWASP Top 10


OWASP Top 10

2010 Top Ten

2013 Top Ten

1 Injection flaws Injection flaws
2 Cross-Site Scripting flaws Broken Authentication and Session Management
3 Broken Authentication and Session Management Cross-Site Scripting flaws
4 Insecure Direct Object References Insecure Direct Object References
5 Cross-Site Request Forgery Security Mis-configuration
6 Security Mis-configuration Sensitive Data Exposure
7 Insecure Cryptographic Storage Missing Function Level Access Control
8 Failure to Restrict URL Access Cross-Site Request Forgery
9 Insufficient Transport Layer Protection Using Components with Known Vulnerabilities
10 Un-validated Redirects and Forwards Un-validated Redirects and Forwards

 

Cloud Computing – Download Free EBooks and Whitepapers
Java – Download Free EBooks and Whitepapers
Windows – Download Free EBooks and Whitepapers
Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s