Difference between revisions of "Top 10 2013-Risk"

From OWASP
Jump to: navigation, search
(Created page with "{{Top_10_2013:TopTemplate |usenext=2013NextLink |next=T10 |useprev=2013PrevLink |prev=RN }} {{Top_10_2013:BottomAdvancedTemplate |type=none |usenex...")
 
Line 6: Line 6:
 
}}
 
}}
  
 
+
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=whole|width=100%|year=2013}}
 
+
What Are Application Security Risks=
 +
</td></tr></table>
 +
Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention.
  
 
{{Top_10_2013:BottomAdvancedTemplate
 
{{Top_10_2013:BottomAdvancedTemplate
     |type=none
+
     |type=box
 
     |usenext=2013NextLink
 
     |usenext=2013NextLink
 
     |next=T10
 
     |next=T10
 
     |useprev=2013PrevLink
 
     |useprev=2013PrevLink
 
     |prev=RN
 
     |prev=RN
 +
}}

Revision as of 00:21, 21 February 2013

[[Top 10 {{{year}}}-RN|← RN]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-T10|T10 →]]
{{{title}}}

What Are Application Security Risks=

Attackers can potentially use many different paths through your application to do harm to your business or organization. Each of these paths represents a risk that may, or may not, be serious enough to warrant attention.

</td></tr></table>

[[Top 10 {{{year}}}-RN|← RN]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-T10|T10 →]]

© 2002-2013 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png
[[Category:OWASP Top Ten {{{year}}} Project]]