SlideShare a Scribd company logo
OWASP Top-10 2013
The Top 10 Most Critical Web Application Security Risks
https://www.owasp.org/index.php/Top_10_2013-Top_10
About the OWASP Top 10
• Not a standard…
OWASP Top 10 is an Awareness Document
• Was probably 3rd or 4th OWASP project
First developed in 2003
• 2003, 2004, 2007, 2010, 2013
Released
OWASP Top Ten (2013 Edition)
What Didn’t Change
• Title is: “The Top 10 Most Critical Web Application
Security Risks”
It’s About Risks, Not Just Vulnerabilities
• Based on the OWASP Risk Rating Methodology, used to
prioritize Top 10
OWASP Top 10 Risk Rating Methodology
OWASP Top 10 Risk Rating
Methodology
Threat
Agent
Attack
Vector
Weakness Prevalence Weakness Detectability Technical Impact Business Impact
?
Easy Widespread Easy Severe
?Average Common Average Moderate
Difficult Uncommon Difficult Minor
1
2
3
What’s Changed?
• Reordered: 7
• Added: 1
• Merged: 2 merged into 1
• Broadened: 1
Risks Added, Risks Merged, Risks Reordered
• Same as 2010, but
• Used more sources of vulnerability data
• All vulnerability data made public by each provider
Development Methodology For 2013
• More transparency
• Requested vulnerability data format
• Earlier community involvement
Development Methodology for Next Version?
Mapping from 2010 to 2013
Top 10
OWASP Top 10 – 2010 (old) OWASP Top 10 – 2013 (New)
2010-A1 – Injection 2013-A1 – Injection
2010-A2 – Cross Site Scripting (XSS)
2013-A2 – Broken Authentication and Session
Management
2010-A3 – Broken Authentication and Session
Management
2013-A3 – Cross Site Scripting (XSS)
2010-A4 – Insecure Direct Object References 2013-A4 – Insecure Direct Object References
2010-A5 – Cross Site Request Forgery (CSRF) 2013-A5 – Security Misconfiguration
2010-A6 – Security Misconfiguration 2013-A6 – Sensitive Data Exposure
2010-A7 – Insecure Cryptographic Storage 2013-A7 – Missing Function Level Access Control
2010-A8 – Failure to Restrict URL Access 2013-A8 – Cross-Site Request Forgery (CSRF)
2010-A9 – Insufficient Transport Layer Protection 2013-A9 – Using Known Vulnerable Components (NEW)
2010-A10 – Unvalidated Redirects and Forwards (NEW) 2013-A10 – Unvalidated Redirects and Forwards
3 Primary Changes:  Merged: 2010-A7 and 2010-A9 -> 2013-A6
 Added New 2013-A9: Using Known Vulnerable
Components
 2010-A8 broadened to 2013-A7

More Related Content

PDF
OWASP top10 2017, Montpellier JUG de Noel
PPTX
Hack your site before someone else does it
PDF
Owasp and friends
PDF
Appsec training gme
PDF
OWASP TOP TEN 2017 RC1
PPTX
Pitfalls of top n lists 6 28-2017
PDF
SARCON Talk - Vandana Verma Sehgal
PPTX
23 owasp top 10 - resources
OWASP top10 2017, Montpellier JUG de Noel
Hack your site before someone else does it
Owasp and friends
Appsec training gme
OWASP TOP TEN 2017 RC1
Pitfalls of top n lists 6 28-2017
SARCON Talk - Vandana Verma Sehgal
23 owasp top 10 - resources

Similar to 12 owasp top 10 - introduction (20)

PDF
Owasp qatar presentation top 10 changes 2013 - Tarun Gupta
PDF
OWASP Top Ten 2013
PDF
Owasp top 10 2013
PDF
Owasp top 10_-_2013
PDF
Owasp top 10 2013
PDF
Owasp top 10
PDF
529 owasp top 10 2013 - rc1[1]
PDF
529 owasp top 10 2013 - rc1[1]
PDF
Owasp Top 10
PPT
OWASP Top Ten
PDF
Top 10 web application security risks akash mahajan
PPTX
In that case, we have an OWASP Top 10 opportunity...
PPTX
Owasp top 10_-_2010 presentation
PDF
Ofer Maor - OWASP Top 10
DOCX
OWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docx
PDF
Owasp top 10 2017 (en)
PDF
OWASP_Top_10-2017_(en).pdf.pdf
PDF
Owasp top 10-2017
PPTX
OWASP -Top 5 Jagjit
PDF
Owasp top 10 2013 - rc1
Owasp qatar presentation top 10 changes 2013 - Tarun Gupta
OWASP Top Ten 2013
Owasp top 10 2013
Owasp top 10_-_2013
Owasp top 10 2013
Owasp top 10
529 owasp top 10 2013 - rc1[1]
529 owasp top 10 2013 - rc1[1]
Owasp Top 10
OWASP Top Ten
Top 10 web application security risks akash mahajan
In that case, we have an OWASP Top 10 opportunity...
Owasp top 10_-_2010 presentation
Ofer Maor - OWASP Top 10
OWASP Top 10 - 2017The Ten Most Critical Web Application Sec.docx
Owasp top 10 2017 (en)
OWASP_Top_10-2017_(en).pdf.pdf
Owasp top 10-2017
OWASP -Top 5 Jagjit
Owasp top 10 2013 - rc1
Ad

More from appsec (11)

PPTX
15 owasp top 10 - a3-xss
PPTX
10 application security fundamentals - part 2 - security mechanisms - encry...
PPTX
11 application security fundamentals - part 2 - security mechanisms - summary
PPTX
09 application security fundamentals - part 2 - security mechanisms - logging
PPTX
08 application security fundamentals - part 2 - security mechanisms - error...
PPTX
06 application security fundamentals - part 2 - security mechanisms - sessi...
PPTX
07 application security fundamentals - part 2 - security mechanisms - data ...
PPTX
04 application security fundamentals - part 2 - security mechanisms - authe...
PPTX
05 application security fundamentals - part 2 - security mechanisms - autho...
PPTX
02 application security fundamentals - part 1 - security priciples
PPTX
01 Application Security Fundamentals - part 1 - introduction and goals
15 owasp top 10 - a3-xss
10 application security fundamentals - part 2 - security mechanisms - encry...
11 application security fundamentals - part 2 - security mechanisms - summary
09 application security fundamentals - part 2 - security mechanisms - logging
08 application security fundamentals - part 2 - security mechanisms - error...
06 application security fundamentals - part 2 - security mechanisms - sessi...
07 application security fundamentals - part 2 - security mechanisms - data ...
04 application security fundamentals - part 2 - security mechanisms - authe...
05 application security fundamentals - part 2 - security mechanisms - autho...
02 application security fundamentals - part 1 - security priciples
01 Application Security Fundamentals - part 1 - introduction and goals
Ad

Recently uploaded (20)

DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Encapsulation theory and applications.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Electronic commerce courselecture one. Pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
Encapsulation theory and applications.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Network Security Unit 5.pdf for BCA BBA.
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
“AI and Expert System Decision Support & Business Intelligence Systems”
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
Dropbox Q2 2025 Financial Results & Investor Presentation
MIND Revenue Release Quarter 2 2025 Press Release
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25 Week I
Electronic commerce courselecture one. Pdf
Chapter 3 Spatial Domain Image Processing.pdf

12 owasp top 10 - introduction

  • 1. OWASP Top-10 2013 The Top 10 Most Critical Web Application Security Risks https://www.owasp.org/index.php/Top_10_2013-Top_10
  • 2. About the OWASP Top 10 • Not a standard… OWASP Top 10 is an Awareness Document • Was probably 3rd or 4th OWASP project First developed in 2003 • 2003, 2004, 2007, 2010, 2013 Released
  • 3. OWASP Top Ten (2013 Edition)
  • 4. What Didn’t Change • Title is: “The Top 10 Most Critical Web Application Security Risks” It’s About Risks, Not Just Vulnerabilities • Based on the OWASP Risk Rating Methodology, used to prioritize Top 10 OWASP Top 10 Risk Rating Methodology
  • 5. OWASP Top 10 Risk Rating Methodology Threat Agent Attack Vector Weakness Prevalence Weakness Detectability Technical Impact Business Impact ? Easy Widespread Easy Severe ?Average Common Average Moderate Difficult Uncommon Difficult Minor 1 2 3
  • 6. What’s Changed? • Reordered: 7 • Added: 1 • Merged: 2 merged into 1 • Broadened: 1 Risks Added, Risks Merged, Risks Reordered • Same as 2010, but • Used more sources of vulnerability data • All vulnerability data made public by each provider Development Methodology For 2013 • More transparency • Requested vulnerability data format • Earlier community involvement Development Methodology for Next Version?
  • 7. Mapping from 2010 to 2013 Top 10 OWASP Top 10 – 2010 (old) OWASP Top 10 – 2013 (New) 2010-A1 – Injection 2013-A1 – Injection 2010-A2 – Cross Site Scripting (XSS) 2013-A2 – Broken Authentication and Session Management 2010-A3 – Broken Authentication and Session Management 2013-A3 – Cross Site Scripting (XSS) 2010-A4 – Insecure Direct Object References 2013-A4 – Insecure Direct Object References 2010-A5 – Cross Site Request Forgery (CSRF) 2013-A5 – Security Misconfiguration 2010-A6 – Security Misconfiguration 2013-A6 – Sensitive Data Exposure 2010-A7 – Insecure Cryptographic Storage 2013-A7 – Missing Function Level Access Control 2010-A8 – Failure to Restrict URL Access 2013-A8 – Cross-Site Request Forgery (CSRF) 2010-A9 – Insufficient Transport Layer Protection 2013-A9 – Using Known Vulnerable Components (NEW) 2010-A10 – Unvalidated Redirects and Forwards (NEW) 2013-A10 – Unvalidated Redirects and Forwards 3 Primary Changes:  Merged: 2010-A7 and 2010-A9 -> 2013-A6  Added New 2013-A9: Using Known Vulnerable Components  2010-A8 broadened to 2013-A7