{"id":130255,"date":"2009-11-14T02:44:00","date_gmt":"2009-11-14T07:44:00","guid":{"rendered":"tag:blogger.com,1999:blog-7196788127833928948.post-5622341738670314089"},"modified":"2009-11-14T02:44:00","modified_gmt":"2009-11-14T07:44:00","slug":"owasp-publishes-top-10-web-app-security-risks-for-2010","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/130255","title":{"rendered":"OWASP Publishes Top 10 Web App Security Risks for 2010"},"content":{"rendered":"<p>Last night the <a href=\"http:\/\/www.owasp.org\/index.php\/Main_Page\">OWASP project<\/a> published the 2010 issue of their Top 10 Web Application Security Risks. The list is still in Release Candidate status, so it may change. The difference from the previous lists according to the statement by OWASP<br \/><a onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\" href=\"http:\/\/2.bp.blogspot.com\/_Hu1rpxRsqcU\/Sv5omRpsn0I\/AAAAAAAAAWc\/laA-pMaMhTI\/s1600-h\/OWASP.jpg\"><img decoding=\"async\" style=\"margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 134px; height: 134px;\" src=\"http:\/\/2.bp.blogspot.com\/_Hu1rpxRsqcU\/Sv5omRpsn0I\/AAAAAAAAAWc\/laA-pMaMhTI\/s400\/OWASP.jpg\" alt=\"\" id=\"BLOGGER_PHOTO_ID_5403871609673785154\" border=\"0\" \/><\/a><a onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\" href=\"http:\/\/3.bp.blogspot.com\/_Hu1rpxRsqcU\/Sv5oeniI7oI\/AAAAAAAAAWU\/o1po5PSxH-4\/s1600-h\/OWASP.jpg\"><br \/><\/a><\/p>\n<blockquote>\n<p style=\"font-style: italic;\">A significant change for this update will be that the OWASP Top 10 will be focused on the Top 10 <b>Risks<\/b> to Web Applications, not just the most common vulnerabilities. At the conference will be the debut of the release candidate of the new Top 10, which will open up a 60 day comment period.<\/p>\n<\/blockquote>\n<p>As a summary, <span style=\"font-weight: bold;\">the top 10 risks to your Web Apps are:<\/span><\/p>\n<ol>\n<li>Injection flaws<\/li>\n<li>Cross Site Scripting (XSS)<\/li>\n<li>Broken Authentication and Session Management<\/li>\n<li>Insecure Direct Object References<\/li>\n<li>Cross Site Request Forgery (CSRF)<\/li>\n<li>Security Misconfiguration<\/li>\n<li>Failure to Restrict URL Access<\/li>\n<li>Unvalidated Redirects and Forwards<\/li>\n<li>Insecure Cryptographic Storage<\/li>\n<li>Insufficient Transport Layer Protection<\/li>\n<\/ol>\n<p>It is evident that OWASP hasn&#8217;t invented the wheel all over again, and that this list has already been discussed for years. Yet it still falls on deaf ear for many developers &#8211; even large development companies.<\/p>\n<p><a href=\"http:\/\/www.owasp.org\/images\/0\/0f\/OWASP_T10_-_2010_rc1.pdf\">You can download the full list document here, with detailed explanation of each risk.<br \/><\/a><br \/>Talkback and comments are most welcome<\/p>\n<p>Related posts<br \/><a href=\"http:\/\/www.shortinfosec.net\/2009\/01\/sans-announced-top-25-programming.html\">SANS Announced Top 25 Programming Errors<\/a><\/p>\n<div class=\"blogger-post-footer\"><img width='1' height='1' src='https:\/\/blogger.googleusercontent.com\/tracker\/7196788127833928948-5622341738670314089?l=www.shortinfosec.net' alt='' \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/shortinfosec\/~4\/vIClCjp8_j0\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Last night the OWASP project published the 2010 issue of their Top 10 Web Application Security Risks. The list is still in Release Candidate status, so it may change. The difference from the previous lists according to the statement by OWASP A significant change for this update will be that the OWASP Top 10 will [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-130255","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/130255","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=130255"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/130255\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=130255"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=130255"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=130255"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}