Top 10 2010-A7-Insecure Cryptographic Storage

{{Top_10_2010:SubsectionVulnerableTemplate|Injection| {{Top_10_2010:SubsectionPreventionTemplate|Injection| {{Top_10_2010:SubsectionExampleTemplate|Injection| {{Top_10_2010:SubsectionReferencesTemplate|Injection|

{{Top_10_2010:BottomTemplate|usenext=NextLink|next=-Broken Authentication and Session Management|useprev=PrevLink|prev=-Cross Site Request Forgery|usemain=MainLink|main=}}