{"id":2300,"date":"2013-06-16T00:00:00","date_gmt":"2013-06-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/06\/16\/owasp-published-2013-top-10-vulnerabilities\/"},"modified":"2021-12-30T11:41:02","modified_gmt":"2021-12-30T11:41:02","slug":"owasp-published-2013-top-10-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2013\/06\/16\/owasp-published-2013-top-10-vulnerabilities\/","title":{"rendered":"OWASP PUBLISHED 2013 TOP 10 VULNERABILITIES"},"content":{"rendered":"<p style=\"margin: 0px;\">The Open Web Application Security Project (OWASP) have published the top 10 most dangerous vulnerabilities in web-applications for 2013. This release comes to raise awareness about application security by identifying some of the most critical risks facing organizations. Injection flaws, such as SQL, OS, and LDAP injection remains the top security vulnerability for web application. This widely used bug allows attacker\u2019s hostile data to trick the interpreter into executing unintended commands or accessing data without proper authorization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p style=\"margin: 0px;\"><\/p>\n<p style=\"margin: 0px;\">The OWASP Top 10 for 2013 is based on 8 datasets from 7 firms that specialize in application security, including 4 consulting companies and 3 tool\/SaaS vendors (1 static, 1 dynamic, and 1 with both). The Top 10 items are selected and prioritized according to this prevalence data, in combination with consensus estimates of exploitability, detectability, and impact estimates.<\/p>\n<p style=\"margin: 0px; min-height: 14px;\"><\/p>\n<p style=\"margin: 0px;\">Looking at the XSS flaws last year was ranked at the second place now it is in the third in the top. XSS allows attackers to execute scripts in the victim\u2019s browser which can hijack user sessions, deface web sites, or redirect the user to malicious sites.<\/p>\n<p>\nLink: <a href=\"http:\/\/www.sectechno.com\/2013\/06\/15\/owasp-published-2013-top-10-vulnerabilities\/\">http:\/\/www.sectechno.com\/2013\/06\/15\/owasp-published-2013-top-10-vulnerabilities\/<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,11],"tags":[],"class_list":["post-2300","post","type-post","status-publish","format-standard","hentry","category-malware","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2300"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2300\/revisions"}],"predecessor-version":[{"id":4787,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2300\/revisions\/4787"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}