Editing:Top 10 2007

This page is intended as an aid to editors of the 2007 Top 10 Vulnerabilities list.

Please help grow this page.

{|- border="1" cellpadding="2"|colspan="2"

Content Pages
!width="50%" style="background:#FFFF99"|Page Link !width="50%" style="background:#FFFF99"|Contents of Page

Top 10 2007-A1 Top 10 2007-XSS Top 10 2007-A2 Top 10 2007-A3 Top 10 2007-A4 Top 10 2007-A5 Top 10 2007-CSRF Top 10 2007-Improper Error Handling Top 10 2007-Information Leakage Top 10 2007-A6 Top 10 2007-Broken Authentication Top 10 2007-Session Management Top 10 2007-A7 Top 10 2007-A8 Top 10 2007-A9 Top 10 2007-A10
 * Top_10_2007
 * The main page.
 * Top 10 2007-Summary
 * The summary section.
 * Top 10 2007-Methodology
 * The methodology section.
 * Top 10 2007-Cross Site Scripting
 * Top 10 2007-Methodology
 * The methodology section.
 * Top 10 2007-Cross Site Scripting
 * Top 10 2007-Cross Site Scripting
 * A1: XSS vulnerability
 * Top 10 2007-Injection Flaws
 * Top 10 2007-Injection Flaws
 * A2: Injection Flaws
 * Top 10 2007-Malicious File Execution
 * Top 10 2007-Malicious File Execution
 * A3: Malicious File Execution
 * Top 10 2007-Insecure Direct Object Reference
 * Top 10 2007-Insecure Direct Object Reference
 * A4: Insecure Direct Object Reference
 * Top 10 2007-Cross Site Request Forgery
 * Top 10 2007-Cross Site Request Forgery
 * A5: Cross Site Request Forgery
 * Top 10 2007-Information Leakage and Improper Error Handling
 * Top 10 2007-Information Leakage and Improper Error Handling
 * A6: Information Leakage and Improper Error Handling
 * Top 10 2007-Broken Authentication and Session Management
 * Top 10 2007-Broken Authentication and Session Management
 * A7: Broken Authentication and Session Management
 * Top 10 2007-Insecure Cryptographic Storage
 * Top 10 2007-Insecure Cryptographic Storage
 * A8: Insecure Cryptographic Storage
 * Top 10 2007-Insecure Communications
 * Top 10 2007-Insecure Communications
 * A9: Insecure Communications
 * Top 10 2007-Failure to Restrict URL Access
 * Top 10 2007-Failure to Restrict URL Access
 * A10: Failure to Restrict URL Access
 * Top 10 2007-Where to Go From Here
 * Where to Go From Here
 * Top 10 2007-References
 * References
 * }
 * References
 * }

Before doing anything with the templates I strongly suggest you have familiarity with and.