Top 10 list of web application vulnerabilities released

Share this article:

Companies wanting to better secure their web applications and services can start the process by reviewing the newly released Top 10 list of critical web application security problems recently disseminated by the Open Web Application Security Project (OWASP).

The list, now in its second year, is organized into the types of vulnerabilities that frequently occur in web applications and is in line with the current draft web security definitions that will be incorporated into the soon-to-be-released OASIS WAS XML standard. This year's Top 10 also has a new category for web application denial of service vulnerabilities, which have become more prevalent during the last 12 months.

The categories in this year's Top 10 are Unvalidated Input, Broken Access Control, Broken Authentication and Session Management, Cross Site Scripting Flaws, Buffer Overflows, Injection Flaws, Improper Error Handling, Insecure Storage, Denial of Service, and Insecure Configuration Management. 

The complete Top 10 report is available for download at www.owasp.org

Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

TOP COMMENTS

More in News

President signs Executive Order to improve payment security

President signs Executive Order to improve payment security

President Obama signed an Executive Order at the Consumer Financial Protection Bureau calling for enhanced security measures, including microchips and PINs.

Security, tech firm coalition fights Hikit actors, other advanced groups

Security, tech firm coalition fights Hikit actors, other ...

The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.

Phishing email delivers keylogger malware, also takes screenshots

Phishing email delivers keylogger malware, also takes screenshots

The malware has various features, including the ability to start persistently, take screenshots and bypass user access controls.