<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>5019b13e96214669a2ff78bdab77d0f0</title>
    <link>https://www.owasptopten.org</link>
    <description />
    <atom:link href="https://www.owasptopten.org/feed/rss2" type="application/rss+xml" rel="self" />
    <image>
      <title />
      <url>https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/OWASP-logo-tm.jpg</url>
      <link>https://www.owasptopten.org</link>
    </image>
    <item>
      <title>OWASP Top Ten Data Collection is Open</title>
      <link>https://www.owasptopten.org/owasp-top-ten-data-collection-is-open8c35bb28</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
  Data Collection: Now - December 2024

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/s/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/DALL-E+2024-01-19+08.13.35+-+A+conceptual+image+representing+the+OWASP+Top+10+Data+Collection-+integrating+the+OWASP+logo.+The+central+focus+is+a+large-+3D+numeral+-10-+composed+o.png" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It's time to get machinery running again and figure out what the next OWASP Top Ten is going to look like for 2024. The last two cycles have worked out well for us, so we are going to continue to use the same process for data collection and the same templates as the 2021 collection process. You can find more details in Github or in the README folder behind the bit.ly link which points to a SharePoint folder that will automatically move submissions to Azure blob storage for processing.
  
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  Templates: 
  
                    &#xD;
    &lt;a href="https://github.com/OWASP/Top10/tree/master/2024/Data"&gt;&#xD;
      
                      
    https://github.com/OWASP/Top10/tree/master/2024/Data
  
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;!--StartFragment--&gt;  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
      Contribution Process
    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    There are a few ways that data can be contributed:
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Email a CSV/Excel/JSON file with the dataset(s) to 
      
                      &#xD;
      &lt;a href="mailto:brian.glas@owasp.org"&gt;&#xD;
        
                        
        brian.glas@owasp.org
      
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Upload a CSV/Excel/JSON file to 
      
                      &#xD;
      &lt;a href="https://bit.ly/OWASPTop10Data"&gt;&#xD;
        
                        
        https://bit.ly/OWASPTop10Data
      
                      &#xD;
      &lt;/a&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://github.com/OWASP/Top10/tree/master/2024/Data#contribution-period"&gt;&#xD;
    &lt;/a&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
      Contribution Period
    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    We plan to accept contributions to the Top 10 2024 during Jun-Dec of 2024 for data dating from 2021 to current.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://github.com/OWASP/Top10/tree/master/2024/Data#data-structure"&gt;&#xD;
    &lt;/a&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
      Data Structure
    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    We have both CSV and JSON templates to aid in normalizing contributions: 


    
                    &#xD;
    &lt;!--StartFragment--&gt;    &lt;a href="https://github.com/OWASP/Top10/tree/master/2024/Data"&gt;&#xD;
      
                      
      https://github.com/OWASP/Top10/tree/master/2024/Data
    
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;!--EndFragment--&gt;  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    The following data elements are *required or optional:
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Per DataSet:
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Contributor Name (org or anon)
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Contributor Contact Email
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Time period (2023, 2022, 2021)
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      *Number of applications tested
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      *CWEs w/ number of applications found in
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Type of testing (TaH, HaT, Tools)
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Primary Language (code)
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Geographic Region (Global, North America, EU, Asia, other)
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Primary Industry (Multiple, Financial, Industrial, Software, ??)
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Whether or not data contains retests or the same applications multiple times (T/F)
    
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    If a contributor has two types of datasets, one from HaT and one from TaH sources, then it is recommended to submit them as two separate datasets.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;!--EndFragment--&gt;  &lt;b&gt;&#xD;
    
                    
    Analysis
  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
  We will conduct analysis of the data, in a similar manner as the 2021 and hope to also include some trending data over both the 2021 and 2024 collection time periods.
  
                  &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
                    
    Timeline
  
                  &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
  Data Collection: Jun - Dec
  
                  &#xD;
  &lt;br/&gt;&#xD;
  
                  
  Analysis: Early 2025
  
                  &#xD;
  &lt;br/&gt;&#xD;
  
                  
  Draft: Early 2025
  
                  &#xD;
  &lt;br/&gt;&#xD;
  
                  
  Release: First half of 2025
                  &#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <pubDate>Fri, 19 Jan 2024 14:45:09 GMT</pubDate>
      <guid>https://www.owasptopten.org/owasp-top-ten-data-collection-is-open8c35bb28</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/s/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/DALL-E+2024-01-19+08.13.35+-+A+conceptual+image+representing+the+OWASP+Top+10+Data+Collection-+integrating+the+OWASP+logo.+The+central+focus+is+a+large-+3D+numeral+-10-+composed+o.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The Release of the OWASP Top 10:2021</title>
      <link>https://www.owasptopten.org/the-release-of-the-owasp-top-10-2021c0a347a0</link>
      <description>Release of the OWASP Top 10:2021</description>
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
  Released: September 24, 2021

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/TOP_10_logo_Final_Logo_Colour.png" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The leadership team is pleased to announce the release of the OWASP Top 10:2021 on September 24, 2021
  
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  The Top 10:2021 can be found at 
  
                    &#xD;
    &lt;a href="https://owasp.org/Top10" target="_blank"&gt;&#xD;
      
                      
    https://owasp.org/Top10
  
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  We are still working on the downloadable PDF and some infographics as well.
  
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  Translations have begun, if you would like to contribute please visit the 
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    #top-10-translations
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
   in the OWASP Slack.
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  If you need to join, you can here: 
  
                    &#xD;
    &lt;a href="https://owasp.org/slack/invite"&gt;&#xD;
      
                      
    https://owasp.org/slack/invite
  
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  New in the Top 10:2021 is our own logo and icons thanks to 
  
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
    Hugo Costa!
    
                      &#xD;
      &lt;br/&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/Top10-2021-Icons.png" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/TOP_10_logo_Final_Logo_Colour.png" length="19448" type="image/png" />
      <pubDate>Fri, 24 Sep 2021 04:49:21 GMT</pubDate>
      <guid>https://www.owasptopten.org/the-release-of-the-owasp-top-10-2021c0a347a0</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/TOP_10_logo_Final_Logo_Colour.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>OWASP Top Ten September Update</title>
      <link>https://www.owasptopten.org/owasp-top-ten-september-update54837692</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
  Draft Release for Review

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/2017-2021_Top10-Mapping.png" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The draft release of the OWASP Top 10 2021 has been published for review: 
  
                    &#xD;
    &lt;a href="https://owasp.org/Top10"&gt;&#xD;
      
                      
    https://owasp.org/Top10
  
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  Feedback, comments, issues can all be filed in our GitHub project: 
  
                    &#xD;
    &lt;a href="https://github.com/OWASP/Top10/issues"&gt;&#xD;
      
                      
    https://github.com/OWASP/Top10/issues
  
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  A mammoth 
  
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
    THANK YOU
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
   to everyone that contributed data, time, thoughts, and anything else.
  
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  Hundreds of hours went into the data collection, analysis, and initial draft. Here is a high level overview of what is in the draft.
  
                    &#xD;
    &lt;br/&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    What's changed in the Top 10 for 2021
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    There are three new categories, four categories with naming and scoping changes, and some consolidation in the Top 10 for 2021.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
        A01:2021-Broken Access Control
      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
       moves up from the fifth position; 94% of applications were tested for some form of broken access control. The 34 CWEs mapped to Broken Access Control had more occurrences in applications than any other category. 
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
        A02:2021-Cryptographic Failures
      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
       shifts up one position to #2, previously known as Sensitive Data Exposure, which was broad symptom rather than a root cause. The renewed focus here is on failures related to cryptography which often leads to sensitive data exposure or system compromise.
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
        A03:2021-Injection
      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
       slides down to the third position. 94% of the applications were tested for some form of injection, and the 33 CWEs mapped into this category have the second most occurrences in applications. Cross-site Scripting is now part of this category in this edition.
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
        A04:2021-Insecure Design
      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
       is a new category for 2021, with a focus on risks related to design flaws. If we genuinely want to "move left" as an industry, it calls for more use of threat modeling, secure design patterns and principles, and reference architectures.
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
        A05:2021-Security Misconfiguration
      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
       moves up from #6 in the previous edition; 90% of applications were tested for some form of misconfiguration. With more shifts into highly configurable software, it's not surprising to see this category move up. The former category for XML External Entities (XXE) is now part of this category.
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
        A06:2021-Vulnerable and Outdated Components
      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
       was previously titled Using Components with Known Vulnerabilities and is #2 in the industry survey, but also had enough data to make the Top 10 via data analysis. This category moves up from #9 in 2017 and is a known issue that we struggle to test and assess risk. It is the only category not to have any CVEs mapped to the included CWEs, so a default exploit and impact weights of 5.0 are factored into their scores.
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
        A07:2021-Identification and Authentication Failures
      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
       was previously Broken Authentication and is sliding down from the second position, and now includes CWEs that are more related to identification failures. This category is still an integral part of the Top 10, but the increased availability of standardized frameworks seems to be helping.
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
        A08:2021-Software and Data Integrity Failures
      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
       is a new category for 2021, focusing on making assumptions related to software updates, critical data, and CI/CD pipelines without verifying integrity. One of the highest weighted impacts from CVE/CVSS data mapped to the 10 CWEs in this category. Insecure Deserialization from 2017 is now a part of this larger category.
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
        A09:2021-Security Logging and Monitoring Failures
      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
       was previously Insufficient Logging &amp;amp; Monitoring and is added from the industry survey (#3), moving up from #10 previously. This category is expanded to include more types of failures, is challenging to test for, and isn't well represented in the CVE/CVSS data. However, failures in this category can directly impact visibility, incident alerting, and forensics.
    
                    &#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      &lt;b&gt;&#xD;
        
                        
        A10:2021-Server-Side Request Forgery
      
                      &#xD;
      &lt;/b&gt;&#xD;
      
                      
       is added from the industry survey (#1). The data shows a relatively low incidence rate with above average testing coverage, along with above-average ratings for Exploit and Impact potential. This category represents the scenario where the industry professionals are telling us this is important, even though it's not illustrated in the data at this time.
    
                    &#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;br/&gt;&#xD;
  
                  
  We will be accepting feedback as long as we can and plan to release the final version as part of the OWASP 20th Anniversary on September 24, 2021. 
  
                  &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/2017-2021_Top10-Mapping.png" length="135336" type="image/png" />
      <pubDate>Sun, 12 Sep 2021 12:55:30 GMT</pubDate>
      <guid>https://www.owasptopten.org/owasp-top-ten-september-update54837692</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/2017-2021_Top10-Mapping.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>OWASP Top Ten 2021 August Update</title>
      <link>https://www.owasptopten.org/owasp-top-ten-2021-august-updatebcd737dd</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
  Update time, we are nearing the finish line.

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/andy-beales-BjcGdM-mjL0-unsplash-7d0449af-abdbf1cc.jpg" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    All told for the data collection; we have thirteen contributors and a grand total of 515k applications represented as non-retests (we have additional data marked as retest, so it's not in the initial data for building the Top 10, but will be used to look at trends and such later).
    
                    &#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
     We asked ourselves whether we wanted to go with a single CWE for each "category" in the OWASP Top 10. Based on the contributed data, this is what it could have looked something like:
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    1.     Reachable Assertion
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if !supportLists]--&gt;                            2.     
    
                    &#xD;
    &lt;!--[endif]--&gt;                            Divide by Zero
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if !supportLists]--&gt;                            3.     
    
                    &#xD;
    &lt;!--[endif]--&gt;                            Insufficient Transport Layer Encryption
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if !supportLists]--&gt;                            4.     
    
                    &#xD;
    &lt;!--[endif]--&gt;                            Clickjacking
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if !supportLists]--&gt;                            5.     
    
                    &#xD;
    &lt;!--[endif]--&gt;                            Known Vulns
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if !supportLists]--&gt;                            6.     
    
                    &#xD;
    &lt;!--[endif]--&gt;                            Deployment of the Wrong Handler
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if !supportLists]--&gt;                            7.     
    
                    &#xD;
    &lt;!--[endif]--&gt;                            Infinite Loop
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if !supportLists]--&gt;                            8.     
    
                    &#xD;
    &lt;!--[endif]--&gt;                            Known Vulns
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if !supportLists]--&gt;                            9.     
    
                    &#xD;
    &lt;!--[endif]--&gt;                            File or Dir Externally Accessible
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if !supportLists]--&gt;                            10.  
    
                    &#xD;
    &lt;!--[endif]--&gt;                            Missing Release of Resources
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    And that is why we aren't doing single CWEs from this data. It's not helpful for awareness, training, baselines, etc. So we confirmed that we are building risk categories of groups of related CWEs. As we categorized CWEs, we ran into a decision point, focusing more on 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Root Cause
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
     or 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Symptom
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
    ? 
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    For example, 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Sensitive Data Exposure
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
     is a symptom, and Cryptographic
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
       Failure
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
     is a root cause. Cryptographic Failure can likely lead to Sensitive Data Exposure, but not the other way around. Another way to think about it is a sore arm is a symptom; a broken bone is the root cause for the soreness. Grouping by 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Root Cause
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
     or 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Symptom
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
     isn't a new concept, but we wanted to call it out. Within the CWE hierarchy, there is a mix of 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Root Cause
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
     and 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Symptom 
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
    weaknesses.  After much thought, we focused on mapping primarily to 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Root Cause
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
     categories as possible, understanding that sometimes it's just going to be a 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Symptom
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
     category because it isn't classified by root cause in the data. A benefit of grouping by 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Root Cause
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
     is that it can help with identification and remediation as well.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    We spent a few months grouping and regrouping CWEs by categories and finally stopped. We could have kept going but needed to stop at some point. We have ten categories with an average of almost 20 CWEs per category. The smallest category has one CWE, and the largest category has 40 CWEs. We've received positive feedback related to grouping like this as it can make it easier for training and awareness programs to focus on CWEs that impact a targeted language or framework. Previously we had some Top 10 categories that simply no longer existed in some languages or frameworks, and that would make training a little awkward.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
      Finding Impact (via Exploit and Impact in CVSS)
    
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    In 2017, once we defined 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Likelihood
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
     using incidence rate from the data, we spent a good while discussing the high-level values for 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Exploitability
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
    , 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Detectability
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
    , and 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      Technical Impact
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
    . While four of us used decades of experience to agree, we wanted to see if it could be more data-driven this time around. (We also decided that we couldn't get 
    
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
      ﻿Detectability
    
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
    ﻿ from data so we are not going to use it for this iteration.)
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    We downloaded OWASP Dependency Check and extracted the CVSS Exploit and Impact scores grouped by related CWEs. It took a fair bit of research and effort as all the CVEs have CVSSv2 scores, but there are flaws in CVSSv2 that CVSSv3 should address. After a certain point in time, all CVEs are assigned a CVSSv3 score as well. Additionally, the scoring ranges and formulas were updated between CVSSv2 and CVSSv3.   
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    In CVSSv2, both Exploit and Impact could be up to 10.0, but the formula would knock them down to 60% for Exploit and 40% for Impact. In CVSSv3, the theoretical max was limited to 6.0 for Exploit and 4.0 for Impact. We analyzed the average scores for CVSSv3 after the changes to weighting are factored in; and the Impact scoring shifted higher, almost a point and a half on average, and exploitability moved nearly half a point lower on average. 
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    There are 125k records of a CVE mapped to a CWE in the NVD data extracted from OWASP Dependency Check at the time of extract, and there are 241 unique CWEs mapped to a CVE. 62k CWE maps have a CVSSv3 score, which is approximately half of the population in the data set. 
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    For the Top Ten, we calculated average exploit and impact scores in the following manner. We grouped all the CVEs with CVSS scores by CWE and weighted both exploit and impact scored by the percentage of the population that had CVSSv3 + the remaining population of CVSSv2 scores to get an overall average. We mapped these averages to the CWEs in the dataset as Exploit and Impact scoring for the other half of the risk equation. 
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    We agreed that we would use the high watermark of the incidence rate for each grouping to help set the order of the 2021 Top 10. The results of this will be released shortly as our target release date is Sept 24, 2021, to align with the OWASP 20th Anniversary.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/andy-beales-BjcGdM-mjL0-unsplash-7d0449af-abdbf1cc.jpg" length="842314" type="image/png" />
      <pubDate>Thu, 19 Aug 2021 22:49:40 GMT</pubDate>
      <author>183:859943589 (Brian Glas)</author>
      <guid>https://www.owasptopten.org/owasp-top-ten-2021-august-updatebcd737dd</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/andy-beales-BjcGdM-mjL0-unsplash-7d0449af-abdbf1cc.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>OWASP Top Ten 2021 April Update</title>
      <link>https://www.owasptopten.org/top-ten-april-updatebf87c9e9</link>
      <description />
      <content:encoded>&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/Blog+Post+2+Header.png" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We wanted to send everyone updates on our progress related to data analysis, survey, and format of the OWASP Top Ten 2021.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The Data

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    We are wrapping up the analysis of the data submissions, which is more intensive this cycle than before. Previous data calls for the Top Ten were limited to requesting ~30 CWEs with an option to write in more. While this would make analysis more straightforward, it has the potential not to show what’s going on in the wild. For this Top Ten cycle, we changed it up and asked for all the CWEs that organizations would map to their findings. Boy, did we get what we asked for; instead of 30 CWEs of data to process, we have data for ~380 unique CWEs to review and analyze. In 2017 we had data submitted that represented testing of ~144k applications; for 2021, we are looking at ~500k applications worth of testing data.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Similar to the last Top Ten, we are looking at incidence rate instead of frequency. We do this for two reasons. The frequency will allow a small number of risk categories to dominate the data analysis and hide more impactful issues. For example, if we have a population of 1000 applications and ten of them have an average of 4,000 instances of Cross-site Scripting (XSS) and 200 applications with an average of five instances of SQL Injection the frequency data might look like this:
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
     Cross-site Scripting: 97.6% of vulnerabilities
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
     SQL Injection: 2.4% of vulnerabilities
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    If we look at incidence rate, or how many applications in the population have a particular vulnerability, this provides a very different perspective (and arguably more accurate for measuring risk).
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
     SQL Injection: 20% incidence rate
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
     Cross-site Scripting: 1% incidence rate
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    One other item we are adding to this year’s analysis is the concept of “confidence.” When each organization sent us data, we had them send it in the form of: 
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
     “X apps were tested for Y CWE, and Z apps were positive.” 
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
     We can calculate an incidence rate for that population tested. However, we also have a larger population overall, and not all of these applications may have been tested for that type of vulnerability; this is where “confidence” factors into the equation. If we have a CWE with an incidence rate of 50%, but the total number of the overall population tested for it is just 1%, we determine there is lower confidence for that incidence rate.  On the other side, if we have a CWE with an incidence rate of .67%, but the total number of the overall population tested for it is 92%, we have high confidence that it’s accurately representing what’s in the wild.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;i&gt;&#xD;
    
                    
    Side note: Yes, you can argue against this by bringing up factors like quality of test cases, differences in testing between organizations, and so on. However, trying to get to that level of detail is far beyond what a group of volunteers can be reasonably expected to undertake at this time.
  
                  &#xD;
  &lt;/i&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The Survey

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Many thanks to everyone that took a little time from their day and completed the survey for the Top Ten! Without you, there are no results to analyze :-D.  We finished with a total of 437 responses, which is close to the 516 we had in 2017. Reviewing the timeline of submissions, nothing looks strange or out of the ordinary, so no real worries about someone trying to game the survey.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    As we have mentioned before, the reason for the survey is that solely relying on testing data has some limitations and blind spots. We will only get a volume of data on vulnerabilities found once we figure out how to manually test for them, convert that to automated testing, and scale it beyond a few organizations. As a result, we have a time lag, and looking at just the data will always be looking at some point in the past. The time lag is why we create the survey for people in the front lines to share what they believe are essential categories based on their experiences. We will use the survey results to pull in up to two categories that we don’t have data (yet) to represent.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
     I would like to look at some of the metadata of who completed the survey, as I think it holds a lot of insight and value. All the metadata questions were optional; the only required question was for ranking the top four categories one thinks are worthy of consideration in the Top Ten; thus, not all of these answers will have 437 responses.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    For the first question about experience, the distribution is reasonably balanced; we can see the industry is aging which is no surprise. One takeaway from this distribution that we should pay attention to is the 28.5% of 0-3 years. The longer we are in the industry, the further from our origins we get, and we tend to forget that new people are joining our industry daily. We need to make it a priority to build paths to help group and mature people joining our ranks; otherwise, we will not be able to make the progress we dearly need to help improve security.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Looking at the position of people completing the survey, in-house security is the largest group, with consultants at number two. We support the write-in option for most of these questions because the industry is still a long way from maturing, so we can’t possibly provide every viable option to select. 6.6% of responses wrote in something other than the two options. We have representation from both Professors and Students, people who wear multiple hats, and others.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    The primary role question usually receives the most write-in options, and for a good reason, we don’t have a good role standardization in our industry. There is quite a laundry list of submitted roles that people are assigned.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/2021-Experience.png" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/2017-Experience.png" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Looking at the position of people completing the survey, in-house security is the largest group, with consultants at number two. We support the write-in option for most of these questions because the industry is still a long way from maturing, so we can’t possibly provide every viable option to select. 6.6% of responses wrote in something other than the two options. We have representation from both Professors and Students, people who wear multiple hats, and others.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/position.png" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The primary role question usually receives the most write-in options, and for a good reason, we don’t have a good role standardization in our industry. There is quite a laundry list of submitted roles that people are assigned.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/Role.png" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Advisor / Analyst
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Developer / Engineer
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Tester
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Monitor / Responder
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Management
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Architect
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Researcher
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Consultant
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Advisor, Tester, Management, Respon…
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Audit
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Vuln Researcher
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Secure Coding Educator
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Vendor / Advisor
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    security architect
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Hacker
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Multiple
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Technical Evangelist - advisory and training fit most closely
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Security Architect
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Information Security Architect
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Security engineer
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Red Team
    
                    &#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The last metric to look at is how the Top Ten impacts work. The respondents are allowed to select all that apply, as the Top Ten can be used for many things and explains why it doesn’t add up to 100%.  The number one answer is “It helps provides structure for standards, requirements, security tests, test results, etc.,” with 72.8% of the respondents selecting that option.  Number two is “Mostly for the education of developers,” and number three is “We build processes around it.”
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/impact.png" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Formatting

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG&gt;&lt;/o:AllowPNG&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;    &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:WordDocument&gt;
  &lt;w:View&gt;Normal&lt;/w:View&gt;
  &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;
  &lt;w:TrackMoves&gt;&lt;/w:TrackMoves&gt;
  &lt;w:TrackFormatting&gt;&lt;/w:TrackFormatting&gt;
  &lt;w:PunctuationKerning&gt;&lt;/w:PunctuationKerning&gt;
  &lt;w:ValidateAgainstSchemas&gt;&lt;/w:ValidateAgainstSchemas&gt;
  &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;
  &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;
  &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;
  &lt;w:DoNotPromoteQF&gt;&lt;/w:DoNotPromoteQF&gt;
  &lt;w:LidThemeOther&gt;EN-US&lt;/w:LidThemeOther&gt;
  &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;
  &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;
  &lt;w:Compatibility&gt;
   &lt;w:BreakWrappedTables&gt;&lt;/w:BreakWrappedTables&gt;
   &lt;w:SnapToGridInCell&gt;&lt;/w:SnapToGridInCell&gt;
   &lt;w:WrapTextWithPunct&gt;&lt;/w:WrapTextWithPunct&gt;
   &lt;w:UseAsianBreakRules&gt;&lt;/w:UseAsianBreakRules&gt;
   &lt;w:DontGrowAutofit&gt;&lt;/w:DontGrowAutofit&gt;
   &lt;w:SplitPgBreakAndParaMark&gt;&lt;/w:SplitPgBreakAndParaMark&gt;
   &lt;w:EnableOpenTypeKerning&gt;&lt;/w:EnableOpenTypeKerning&gt;
   &lt;w:DontFlipMirrorIndents&gt;&lt;/w:DontFlipMirrorIndents&gt;
   &lt;w:OverrideTableStyleHps&gt;&lt;/w:OverrideTableStyleHps&gt;
  &lt;/w:Compatibility&gt;
  &lt;m:mathPr&gt;
   &lt;m:mathFont m:val="Cambria Math"&gt;&lt;/m:mathFont&gt;
   &lt;m:brkBin m:val="before"&gt;&lt;/m:brkBin&gt;
   &lt;m:brkBinSub m:val="&amp;#45;-"&gt;&lt;/m:brkBinSub&gt;
   &lt;m:smallFrac m:val="off"&gt;&lt;/m:smallFrac&gt;
   &lt;m:dispDef&gt;&lt;/m:dispDef&gt;
   &lt;m:lMargin m:val="0"&gt;&lt;/m:lMargin&gt;
   &lt;m:rMargin m:val="0"&gt;&lt;/m:rMargin&gt;
   &lt;m:defJc m:val="centerGroup"&gt;&lt;/m:defJc&gt;
   &lt;m:wrapIndent m:val="1440"&gt;&lt;/m:wrapIndent&gt;
   &lt;m:intLim m:val="subSup"&gt;&lt;/m:intLim&gt;
   &lt;m:naryLim m:val="undOvr"&gt;&lt;/m:naryLim&gt;
  &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt;
&lt;/xml&gt;&lt;![endif]--&gt;    &lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="false"
  DefSemiHidden="false" DefQFormat="false" DefPriority="99"
  LatentStyleCount="376"&gt;
  &lt;w:LsdException Locked="false" Priority="0" QFormat="true" Name="Normal"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="9" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="heading 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" Name="toc 9"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footer"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="index heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="35" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="caption"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of figures"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="envelope return"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="footnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="line number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="page number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="endnote text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="table of authorities"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="macro"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="toa heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Bullet 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Number 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="10" QFormat="true" Name="Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Closing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" SemiHidden="true"
   UnhideWhenUsed="true" Name="Default Paragraph Font"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="List Continue 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Message Header"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="11" QFormat="true" Name="Subtitle"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Salutation"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Date"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text First Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Note Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Body Text Indent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Block Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="FollowedHyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="22" QFormat="true" Name="Strong"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="20" QFormat="true" Name="Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Document Map"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Plain Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="E-mail Signature"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Top of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Bottom of Form"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal (Web)"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Acronym"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Address"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Cite"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Code"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Definition"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Keyboard"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Preformatted"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Sample"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Typewriter"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="HTML Variable"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Normal Table"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="annotation subject"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="No List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Outline List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Simple 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Classic 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Colorful 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Columns 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Grid 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 7"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table List 8"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table 3D effects 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Contemporary"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Elegant"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Professional"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Subtle 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Web 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Balloon Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" Name="Table Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Table Theme"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Placeholder Text"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="1" QFormat="true" Name="No Spacing"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" Name="Revision"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="34" QFormat="true"
   Name="List Paragraph"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="29" QFormat="true" Name="Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="30" QFormat="true"
   Name="Intense Quote"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="60" Name="Light Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="61" Name="Light List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="62" Name="Light Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="63" Name="Medium Shading 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="64" Name="Medium Shading 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="65" Name="Medium List 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="66" Name="Medium List 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="67" Name="Medium Grid 1 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="68" Name="Medium Grid 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="69" Name="Medium Grid 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="70" Name="Dark List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="71" Name="Colorful Shading Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="72" Name="Colorful List Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="73" Name="Colorful Grid Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="19" QFormat="true"
   Name="Subtle Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="21" QFormat="true"
   Name="Intense Emphasis"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="31" QFormat="true"
   Name="Subtle Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="32" QFormat="true"
   Name="Intense Reference"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="33" QFormat="true" Name="Book Title"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="37" SemiHidden="true"
   UnhideWhenUsed="true" Name="Bibliography"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="39" SemiHidden="true"
   UnhideWhenUsed="true" QFormat="true" Name="TOC Heading"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="41" Name="Plain Table 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="42" Name="Plain Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="43" Name="Plain Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="44" Name="Plain Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="45" Name="Plain Table 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="40" Name="Grid Table Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="Grid Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="Grid Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="Grid Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="Grid Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="Grid Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="Grid Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="Grid Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="Grid Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="Grid Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="Grid Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46" Name="List Table 1 Light"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51" Name="List Table 6 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52" Name="List Table 7 Colorful"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 1"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 2"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 3"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 4"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 5"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="46"
   Name="List Table 1 Light Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="47" Name="List Table 2 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="48" Name="List Table 3 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="49" Name="List Table 4 Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="50" Name="List Table 5 Dark Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="51"
   Name="List Table 6 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" Priority="52"
   Name="List Table 7 Colorful Accent 6"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Mention"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Hyperlink"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Hashtag"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Unresolved Mention"&gt;&lt;/w:LsdException&gt;
  &lt;w:LsdException Locked="false" SemiHidden="true" UnhideWhenUsed="true"
   Name="Smart Link"&gt;&lt;/w:LsdException&gt;
 &lt;/w:LatentStyles&gt;
&lt;/xml&gt;&lt;![endif]--&gt;    &lt;!--[if gte mso 10]&gt;
&lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
	{mso-style-name:"Table Normal";
	mso-tstyle-rowband-size:0;
	mso-tstyle-colband-size:0;
	mso-style-noshow:yes;
	mso-style-priority:99;
	mso-style-parent:"";
	mso-padding-alt:0in 5.4pt 0in 5.4pt;
	mso-para-margin:0in;
	mso-pagination:widow-orphan;
	font-size:12.0pt;
	font-family:"Calibri",sans-serif;
	mso-ascii-font-family:Calibri;
	mso-ascii-theme-font:minor-latin;
	mso-hansi-font-family:Calibri;
	mso-hansi-theme-font:minor-latin;
	mso-bidi-font-family:"Times New Roman";
	mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt;
&lt;![endif]--&gt;    &lt;!--StartFragment--&gt;  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    For this round of updates for the OWASP Top Ten, we plan to focus
on a more mobile friendly version of the output. We also plan to update
graphics and provide more supporting content and links from the Top Ten.  More updates to follow in the near future.
    
                    &#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;!--EndFragment--&gt;  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/Blog+Post+2+Header.png" length="167149" type="image/png" />
      <pubDate>Sun, 25 Apr 2021 21:01:55 GMT</pubDate>
      <guid>https://www.owasptopten.org/top-ten-april-updatebf87c9e9</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/Blog+Post+2+Header.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Building the 2021 Top Ten Survey</title>
      <link>https://www.owasptopten.org/building-the-2021-top-ten-survey36d809db</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
  Help build the survey for the 2021 Top Ten

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/122519-7b785efc-65eb40e3.jpeg" alt="" title=""/&gt;&#xD;
  &lt;span&gt;&#xD;
  &lt;/span&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As we're putting together the survey for the next Top Ten so that you can help pick two vulnerability categories or risks for inclusion, we face the challenge of what to include in the survey.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Remember, for the Top 10 2017, we determined as a team that we would pick eight risks from the data submitted and two risks from a survey that would be completed by industry practitioners.  We did this as the data will always show us information from the past and is only as good as the testing coverage from the submitting organizations. The hope was that the practitioners in the trenches would help determine a couple of risks that might not show up in the data yet.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    What this also means is that the two risks that were selected by survey in 2017 are on the block again this time around when we ask you to pick again. Now, there is the possibility that testing has caught up since the first survey and Deserialization and Insufficient Logging and Monitoring might be able take their place in the data, they might not, that remains to be seen.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    ---------------------------------------------------------
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Below is the history and process for creating this survey, it sums up with a call to action. If you have a CWE that you think should be added to the survey, please open an issue in the Top Ten GitHub Repo with the label "
    
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
      2021-Survey
    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
    " and we'll review and possibly add it to the survey: 
    
                    &#xD;
    &lt;a href="https://github.com/OWASP/Top10/issues/new"&gt;&#xD;
      
                      
      https://github.com/OWASP/Top10/issues/new
    
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    ---------------------------------------------------------
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Here is a little bit of background from last time we did this; some of you remember, some don't, and some were not working in this industry yet. 
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    In 2017, we submitted a survey with the following CWEs
    
                    &#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;table&gt;&#xD;
    &lt;tbody&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-799
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Improper Control of Interaction Frequency (Anti-Automation)
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-223/778
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Insufficient Logging and Monitoring
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-918
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Server-Side Request Forgery (SSRF)
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-915
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Mass Assignment
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-829
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Inclusion of Functionality from Untrusted Control Sphere (3rd Party Content)
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-639
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Authorization Bypass Through User-Controlled Key (IDOR &amp;amp; Path Traversal)
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-611
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Improper Restriction of XML External Entity Reference ('XXE')
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-601
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Unvalidated Forward and Redirects
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-502
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Deserialization of Untrusted Data
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-451
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            User Interface (UI) Misrepresentation of Critical Information (Clickjacking and others)
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-400
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Application Denial of Service 
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-359                                               
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Exposure of Private Information ('Privacy Violation')
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            CWE-310/311/312/326/327
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Cryptographic Failures
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
    &lt;/tbody&gt;&#xD;
  &lt;/table&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    We asked everyone to rank their top four choices (1-4), then scored them to see what you all felt where the most important. We had 550 responses to the survey.  The end results looked like this:
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;table&gt;&#xD;
    &lt;tbody&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Rank
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Vulnerability Categories
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Score
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            1               
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Exposure of Private Information ('Privacy Violation') [CWE-359]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            748
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            2
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Cryptographic Failures [CWE-310/311/312/326/327]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            584
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            3
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Deserialization of Untrusted Data [CWE-502]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            514
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            4
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Authorization Bypass Through User-Controlled Key (IDOR &amp;amp; Path Traversal) [CWE-639]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            493
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            5
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Insufficient Logging and Monitoring [CWE-223 / CWE-778]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            440
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            6
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Server-Side Request Forgery (SSRF) [CWE-918]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            390
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            7
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Inclusion of Functionality from Untrusted Control Sphere (3rd Party Content) [CWE-829]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            351
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            8
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Improper Restriction of XML External Entity Reference ('XXE') [CWE-611]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            300
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            9
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Application Denial of Service [CWE-400]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            292
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            10
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Unvalidated Forward and Redirects [CWE-601]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            252
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            11
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            User Interface (UI) Misrepresentation of Critical Information (Clickjacking and others) [CWE-451]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            174
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            12
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Improper Control of Interaction Frequency (Anti-Automation) [CWE-799]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            126
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          
                          
          13
        
                        &#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Mass Assignment [CWE-915]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            76
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
    &lt;/tbody&gt;&#xD;
  &lt;/table&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    After reviewing which categories would already be covered by data, the end result were the additions of 
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if !supportLists]--&gt;                            -        
    
                    &#xD;
    &lt;!--[endif]--&gt;                            A8-2017 Insecure Deserialization
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;!--[if !supportLists]--&gt;                            -        
    
                    &#xD;
    &lt;!--[endif]--&gt;                            A10-2017 Insufficient Logging and Monitoring
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Especially A10 would be unlikely to show up in the data set as that CWE is rarely reported by the assessment testing at the time and is fairly difficult to find in an automated fashion. But that's why we have this survey to add to the data collection, because the data can't tell us everything we need to know.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Also in the 2017 survey, we asked respondents to tell us what they think might need to be included in the next Top Ten.  
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    These are the summarized results:
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    From 2017 Survey
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;ul&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Session Fixation – 
      
                      &#xD;
      &lt;i&gt;&#xD;
        
                        
        (Already in Top 10 2017)
      
                      &#xD;
      &lt;/i&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      CORS Misconfiguration - 
      
                      &#xD;
      &lt;i&gt;&#xD;
        
                        
        (Already in Top 10 2017)
      
                      &#xD;
      &lt;/i&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Architecture/Design Issues
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Components with known Vulns - 
      
                      &#xD;
      &lt;i&gt;&#xD;
        
                        
        (Already in Top 10 2017)
      
                      &#xD;
      &lt;/i&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Private Data Exposure - 
      
                      &#xD;
      &lt;i&gt;&#xD;
        
                        
        (Already in Top 10 2017)
      
                      &#xD;
      &lt;/i&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Logic flaws
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Template Injection
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      RCE through XSS in RPC
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Attacks against template engines
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      EL/OGNL/etc injections
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Cloud Configuration Failures - 
      
                      &#xD;
      &lt;i&gt;&#xD;
        
                        
        (Already in Top 10 2017)
      
                      &#xD;
      &lt;/i&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      SubDomain Takeovers
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Missing business logic validation
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      API AuthN/AuthZ – 
      
                      &#xD;
      &lt;i&gt;&#xD;
        
                        
        (API Top 10 2019)
      
                      &#xD;
      &lt;/i&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Logic flow bypass
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Protecting sensitive pages from automation
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Malicious File Upload
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Slow/lack of process to update apps
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Web Cache Deception 
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      API related weaknesses – 
      
                      &#xD;
      &lt;i&gt;&#xD;
        
                        
        (API Top 10 2019)
      
                      &#xD;
      &lt;/i&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Privacy Related - 
      
                      &#xD;
      &lt;i&gt;&#xD;
        
                        
        (Already in Top 10 2017)
      
                      &#xD;
      &lt;/i&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      SSRF
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      OAuth token vulns (clientside heavy Auth)
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Excessive 3rd party JS live inclusion
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ul&gt;&#xD;
  &lt;!--[if !supportLists]--&gt;  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
      Though I'm pretty sure the best answer was: "One does not simply predict TOP 10 of vulnerability categories for three years ahead."
    
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Now that we have covered the history, time to move forward to the here and now.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    As we look to what may be in the next survey, there are considerations to take into account. We can look at the CWE Top 25 published by Mitre.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://cwe.mitre.org/top25/archive/2020/2020_cwe_top25.html"&gt;&#xD;
      
                      
      https://cwe.mitre.org/top25/archive/2020/2020_cwe_top25.html
    
                    &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    Rank    ID-Name
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [1]      CWE-79  Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [2]      CWE-787 Out-of-bounds Write
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [3]      CWE-20  Improper Input Validation
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [4]      CWE-125 Out-of-bounds Read
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [5]      CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [6]      CWE-89  Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [7]      CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [8]      CWE-416 Use After Free
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [9]      CWE-352 Cross-Site Request Forgery (CSRF)
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [10]  CWE-78  Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [11]  CWE-190 Integer Overflow or Wraparound
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [12]  CWE-22  Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [13]  CWE-476 NULL Pointer Dereference
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [14]  CWE-287 Improper Authentication
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [15]  CWE-434 Unrestricted Upload of File with Dangerous Type
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [16]  CWE-732 Incorrect Permission Assignment for Critical Resource
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [17]  CWE-94  Improper Control of Generation of Code ('Code Injection')
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [18]  CWE-522 Insufficiently Protected Credentials
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [19]  CWE-611 Improper Restriction of XML External Entity Reference
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [20]  CWE-798 Use of Hard-coded Credentials
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [21]  CWE-502 Deserialization of Untrusted Data
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [22]  CWE-269 Improper Privilege Management
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [23]  CWE-400 Uncontrolled Resource Consumption
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [24]  CWE-306 Missing Authentication for Critical Function
    
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
    [25]    CWE-862 Missing Authorization
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    For a number of reasons, I disagree with this list; but that’s not the point. I’m trying to find CWEs that may exist, but aren’t really easily testable or are new enough that there aren’t many tests so I can add them to the survey to see if other in the industry think they have risen to that level of importance.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    My goal for CWEs on the survey are to list CWEs that contain one or more of the following:
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;ol&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
       Hard to test: these are risk that are real, but unlikely to be exhibited in the data
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      Emerging risks: these are newer that there isn’t good testing coverage yet (usually at least a couple year lag)
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
    &lt;li&gt;&#xD;
      
                      
      TBD?
      
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/li&gt;&#xD;
  &lt;/ol&gt;&#xD;
  &lt;!--[if !supportLists]--&gt;  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    With those goals in mind, here is the draft of the Top 10 2021 Survey for feedback:
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;table&gt;&#xD;
    &lt;tbody&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            &lt;b&gt;&#xD;
              
                              
              #       
            
                            &#xD;
            &lt;/b&gt;&#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            &lt;b&gt;&#xD;
              
                              
              CWE 
            
                            &#xD;
            &lt;/b&gt;&#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            &lt;b&gt;&#xD;
              
                              
              Note
            
                            &#xD;
            &lt;/b&gt;&#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            1
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Insufficient Logging and Monitoring [CWE-223/778]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Current Top 10, important, and hard to test for.
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            2
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Server-Side Request Forgery (SSRF) [CWE-918]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Might be in the data this cycle, wasn’t last; but was hot in 2017-2018
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            3
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Mass Assignment [CWE-915]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            From 2017 Survey
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            4
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Inclusion of Functionality from Untrusted Control Sphere (3rd Party Content) [CWE-829]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            With the increased dynamic integration of web content, this is ever growing; but may not really be tested for.
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            5
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Unvalidated Forward and Redirects [CWE-601]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            From 2017 Survey and additional risks to consider
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            6
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Improper Control of Interaction Frequency (Anti-Automation) [CWE-799]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            From 2017 Survey and additional risks to consider
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            7
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Improper Restriction of Operations within the Bounds of a Memory Buffer [CWE-119]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            From CWE Top 25 2020 and parent of CWE-125/CWE-787 aka Buffer Overflow and related
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            8
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Unrestricted Upload of File with Dangerous Type [CWE-434]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            In CWE Top 25 2020 and additional risks to consider 2017
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            9
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Cross-Site Request Forgery (CSRF) [CWE-352]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Former Top 10 and in additional risks to consider 2017
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            10
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Excessive Attack Surface [CWE-1125]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Testing the water for branching into a little more architecture/design related
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            11 
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Use of Unmaintained Third Party Components [CWE-1104]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Finally have an official CWE for this one
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            12
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Inconsistency Between Implementation and Documented Design [CWE-1068]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Should we consider some more architectural risks? Incomplete Design Documentation [CWE-1110] and Missing Documentation for Design [1053]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            13
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Deserialization of Untrusted Data [CWE-502]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Current Top 10, didn’t seem to have a lot of testing
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
      &lt;tr&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            14
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            Unprotected Storage of Credentials [CWE-256]
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
        &lt;td&gt;&#xD;
          &lt;p&gt;&#xD;
            
                            
            It might be in the data, but may also be a hot enough topic to stand on its own.
          
                          &#xD;
          &lt;/p&gt;&#xD;
        &lt;/td&gt;&#xD;
      &lt;/tr&gt;&#xD;
    &lt;/tbody&gt;&#xD;
  &lt;/table&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    There is nothing for API specific as we have an OWASP Top 10 API 2019 already and I don’t see a need to duplicate any of that work.  Similarly, we have IoT and Mobile Top 10s, so no need to go there either.
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    I plan to use a similar format for the survey with some base demographic information and having people pick their top four. 
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    This worked well last time and allows for a good understanding of priorities from a varied audience. 
  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    If you have a CWE that you think should be added to the survey, please open an issue in the Top Ten GitHub Repo with the label "
    
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
      2021-Survey
    
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
    " and we'll review and possibly add it to the survey: 
    
                    &#xD;
    &lt;a href="https://github.com/OWASP/Top10/issues/new"&gt;&#xD;
      
                      
      https://github.com/OWASP/Top10/issues/new
    
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/122519-7b785efc-65eb40e3.jpeg" length="801220" type="image/png" />
      <pubDate>Tue, 02 Feb 2021 14:17:47 GMT</pubDate>
      <guid>https://www.owasptopten.org/building-the-2021-top-ten-survey36d809db</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/609a498d52df4a68af74ef94a8ef02aa/dms3rep/multi/122519-7b785efc-65eb40e3.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
  </channel>
</rss>
