<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bradcausey</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bradcausey"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Bradcausey"/>
		<updated>2026-04-19T20:27:53Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Credential_Stuffing_Prevention_Cheat_Sheet&amp;diff=221555</id>
		<title>Credential Stuffing Prevention Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Credential_Stuffing_Prevention_Cheat_Sheet&amp;diff=221555"/>
				<updated>2016-09-20T16:37:40Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
This document is a work in progress.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Credential stuffing is the automated injection of breached username/password pairs in order to fraudulently gain access to user accounts. This is a subset of the brute force attack category: large numbers of spilled credentials are automatically entered into websites until they are potentially matched to an existing account, which the attacker can then hijack for their own purposes.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Credential_stuffing[https://www.owasp.org/index.php/Credential_stuffing]]&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
=Primary Defenses=&lt;br /&gt;
&lt;br /&gt;
It should be noted that defense mechanisms are intended to be used in a layered approach. In most cases, a single defense option would be inadequate to stop most Credential Stuffing attacks. &lt;br /&gt;
&lt;br /&gt;
In many cases, brute force protections will overlap with credential stuffing defenses.&lt;br /&gt;
&lt;br /&gt;
==Defense Option 1: Multi-Factor Authentication ==&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
==Defense Option 2: Multi-Step Login Process ==&lt;br /&gt;
&lt;br /&gt;
''Most of the automated account validation we've seen is using single step validation and checking for a success conditions. By forcing the client to render the response and include that in the next request (and including Synchronizer (CSRF) Tokens) we are just eliminating the basic attempts. It's not comprehensive.''&lt;br /&gt;
&lt;br /&gt;
==Defense Option 3: IP blacklists ==&lt;br /&gt;
Because the attacker requests will likely originate from a few (or one) IP, addresses attempting to log into multiple accounts can be blocked or sandboxed.&lt;br /&gt;
&lt;br /&gt;
Further, login monitoring with IP tracking could be used to eliminate (most) false positives. Use the last several IPs that the user's account logged in from and compare them to the suspected &amp;quot;bad&amp;quot; IP. &lt;br /&gt;
&lt;br /&gt;
Making the IP bans temporary, say 15 minutes, would reduce the negative impact to the customer and business services (who would have to fix false positives) significantly. &lt;br /&gt;
&lt;br /&gt;
==Defense Option 3: Device Fingerprinting ==&lt;br /&gt;
By running some simple javascript device information collections, you can learn certain things about the device(s) used to log into each account. If a Windows(OS)/English(Language)/Chrome(Browser) device logged in the last 5 times, and we have a new geolocation source with Linux/FireFox/Spanish, then we can be pretty certain that the user is not the original one. (other options include timezones, last login times, user agents, java version, flash, etc)&lt;br /&gt;
&lt;br /&gt;
The most simple implementation, while minimizing reduction in effectiveness, would be Operating System + Geolocation + Language.&lt;br /&gt;
&lt;br /&gt;
How you deal with mismatches is also a major consideration. If you are performing complex device fingerprinting, using many variables, then more severe actions might be taken, such as locking the account. &lt;br /&gt;
&lt;br /&gt;
Using simple fingerprinting, with maybe 2 or 3 variables would require that less stringent actions be taken, due to it's higher likelihood of a false positive. In this case, maybe the source IP is blocked if it attempts more than 3 user IDs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Defense Option 4: Disallow Email Addresses as User IDs ==&lt;br /&gt;
In many cases, credential reuse is an issue because user IDs are the same on multiple sites. In most cases, they are the email address of the user, for usability. This is an obvious problem when considering Credential Stuffing. One possible approach is to avoid use of email addresses as userids.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Credential_Stuffing_Prevention_Cheat_Sheet&amp;diff=221554</id>
		<title>Credential Stuffing Prevention Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Credential_Stuffing_Prevention_Cheat_Sheet&amp;diff=221554"/>
				<updated>2016-09-20T16:29:20Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
&lt;br /&gt;
This document is a work in progress.&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Credential stuffing is the automated injection of breached username/password pairs in order to fraudulently gain access to user accounts. This is a subset of the brute force attack category: large numbers of spilled credentials are automatically entered into websites until they are potentially matched to an existing account, which the attacker can then hijack for their own purposes.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Credential_stuffing[https://www.owasp.org/index.php/Credential_stuffing]]&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
=Primary Defenses=&lt;br /&gt;
&lt;br /&gt;
It should be noted that defense mechanisms are intended to be used in a layered approach. In most cases, a single defense option would be inadequate to stop most Credential Stuffing attacks. &lt;br /&gt;
&lt;br /&gt;
In many cases, brute force protections will overlap with credential stuffing defenses.&lt;br /&gt;
&lt;br /&gt;
==Defense Option 1: Multi-Factor Authentication ==&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
==Defense Option 2: Multi-Step Login Process ==&lt;br /&gt;
&lt;br /&gt;
''Most of the automated account validation we've seen is using single step validation and checking for a success conditions. By forcing the client to render the response and include that in the next request (and including Synchronizer (CSRF) Tokens) we are just eliminating the basic attempts. It's not comprehensive.''&lt;br /&gt;
&lt;br /&gt;
==Defense Option 3: IP blacklists ==&lt;br /&gt;
Because the attacker requests will likely originate from a few (or one) IP, addresses attempting to log into multiple accounts can be blocked or sandboxed. &lt;br /&gt;
&lt;br /&gt;
Further, login monitoring with IP tracking could be used to eliminate (most) false positives. Use the last several IPs that the user's account logged in from and compare them to the suspected &amp;quot;bad&amp;quot; IP. &lt;br /&gt;
&lt;br /&gt;
Making the IP bans temporary, say 15 minutes, would reduce the negative impact to the customer and business services (who would have to fix false positives) significantly. &lt;br /&gt;
&lt;br /&gt;
==Defense Option 3: Device Fingerprinting ==&lt;br /&gt;
By running some simple javascript device information collections, you can learn certain things about the device(s) used to log into each account. If a Windows(OS)/Engish(Language)/Chrome(Browser) device logged in the last 5 times, and we have a new geolocation source with Linux/FireFox/Spanish, then we can be pretty certain that the user is not the original one. (other options include timezones, last login times, user agents, java version, flash, etc)&lt;br /&gt;
&lt;br /&gt;
The most simple implementation, while minimizing reduction in effectiveness, would be Operating System + Geo Location + Language.&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
{{Cheatsheet_Navigation}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Causey,_Brad.png&amp;diff=154125</id>
		<title>File:Causey, Brad.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Causey,_Brad.png&amp;diff=154125"/>
				<updated>2013-06-19T18:17:03Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: uploaded a new version of &amp;amp;quot;File:Causey, Brad.png&amp;amp;quot;: Reverted to version as of 22:24, 15 February 2011&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Causey,_Brad.png&amp;diff=154124</id>
		<title>File:Causey, Brad.png</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Causey,_Brad.png&amp;diff=154124"/>
				<updated>2013-06-19T18:15:55Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: uploaded a new version of &amp;amp;quot;File:Causey, Brad.png&amp;amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=135102</id>
		<title>OWASP Testing Guide v4 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=135102"/>
				<updated>2012-08-30T16:22:51Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
'''This is DRAFT of the table of content of the New Testing Guide v4.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;You can download the stable version [http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf here] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Back to the OWASP Testing Guide Project:&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Testing_Project&lt;br /&gt;
&lt;br /&gt;
'''Updated: 28th August 2012'''&lt;br /&gt;
&lt;br /&gt;
The following are the main improvements we have to realize: &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(1) - Add new testing techniques and OWASP Top10 update: &amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for HTTP Verb tampering&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for HTTP Parameter Pollutions&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for URL Redirection&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Insecure Direct Object References&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Insecure Cryptographic Storage&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Failure to Restrict URL Access&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Insufficient Transport Layer Protection&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Unvalidated Redirects and Forwards.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
(2) - Review and improve all the sections in v3,&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
(3) - Create a more readable guide, eliminating some sections that are not&lt;br /&gt;
really useful, Rationalize some sections as Session Management Testing.&lt;br /&gt;
&lt;br /&gt;
(4) Pavol says: - add new opensource testing tools that appeared during last 3 years&lt;br /&gt;
(and are missing in the OWASP Testing Guide v3)&lt;br /&gt;
&lt;br /&gt;
- add few useful and life-scenarios of possible&lt;br /&gt;
vulnerabilities in Bussiness Logic Testing (many testers have no idea what&lt;br /&gt;
vulnerabilities in Business Logic exactly mean)&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;Brute force testing&amp;quot; of &amp;quot;session ID&amp;quot; is missing in &amp;quot;Session Management&lt;br /&gt;
Testing&amp;quot;, describe other tools for Session ID entropy analysis&lt;br /&gt;
(e.g. Stompy)&lt;br /&gt;
&lt;br /&gt;
- in &amp;quot;Data Validation Testing&amp;quot; describe some basic obfuscation methods for&lt;br /&gt;
malicious code injection including the statements how it is possible to&lt;br /&gt;
detect it (web application obfuscation is quite succesfull in bypassing&lt;br /&gt;
many data validation controls)&lt;br /&gt;
&lt;br /&gt;
- split the phase Logout and Browser Cache Management&amp;quot; into two sections&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The following is a DRAFT of the Toc based on the feedback already received.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''T A B L E    o f    C O N T E N T S (DRAFT)'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Foreword|Foreword by OWASP Chair]]== [To review--&amp;gt; OWASP Chair]&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Frontispiece |1. Frontispiece]]== [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[Testing Guide Frontispiece|1.1 About the OWASP Testing Guide Project]]''' [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[About The Open Web Application Security Project|1.2 About The Open Web Application Security Project]]''' [To review--&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Introduction|2. Introduction]]==&lt;br /&gt;
&lt;br /&gt;
'''2.1 The OWASP Testing Project'''&lt;br /&gt;
&lt;br /&gt;
'''2.2 Principles of Testing'''&lt;br /&gt;
&lt;br /&gt;
'''2.3 Testing Techniques Explained''' &lt;br /&gt;
&lt;br /&gt;
2.4 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Requirements_Test_Derivation Security requirements test derivation],[https://www.owasp.org/index.php/Testing_Guide_Introduction#Functional_and_Non_Functional_Test_Requirements functional and non functional test requirements], and [https://www.owasp.org/index.php/Testing_Guide_Introduction#Test_Cases_Through_Use_and_Misuse_Cases test cases through use and misuse cases]&lt;br /&gt;
&lt;br /&gt;
2.5 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Test_Data_Analysis_and_Reporting Security test data analysis and reporting: root cause identification and business/role case test data reporting]&lt;br /&gt;
&lt;br /&gt;
==[[The OWASP Testing Framework|3. The OWASP Testing Framework]]==&lt;br /&gt;
&lt;br /&gt;
'''3.1. Overview'''&lt;br /&gt;
&lt;br /&gt;
'''3.2. Phase 1: Before Development Begins '''&lt;br /&gt;
&lt;br /&gt;
'''3.3. Phase 2: During Definition and Design'''&lt;br /&gt;
&lt;br /&gt;
'''3.4. Phase 3: During Development'''&lt;br /&gt;
&lt;br /&gt;
'''3.5. Phase 4: During Deployment'''&lt;br /&gt;
&lt;br /&gt;
'''3.6. Phase 5: Maintenance and Operations'''&lt;br /&gt;
&lt;br /&gt;
'''3.7. A Typical SDLC Testing Workflow '''&lt;br /&gt;
&lt;br /&gt;
==[[Web Application Penetration Testing |4. Web Application Penetration Testing ]]==&lt;br /&gt;
&lt;br /&gt;
[[Testing: Introduction and objectives|'''4.1 Introduction and Objectives''']] [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing Checklist| 4.1.1 Testing Checklist]] [To review at the end of brainstorming --&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing: Information Gathering|'''4.2 Information Gathering ''']] [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
[[Testing for configuration management|'''4.3 Configuration and Deploy Management Testing ''']]&lt;br /&gt;
&lt;br /&gt;
Infrastructure Configuration management weakness&amp;lt;br&amp;gt;&lt;br /&gt;
Application Configuration management weakness&amp;lt;br&amp;gt;&lt;br /&gt;
File extensions handling&amp;lt;br&amp;gt;&lt;br /&gt;
Old, backup and unreferenced files&amp;lt;br&amp;gt;&lt;br /&gt;
Access to Admin interfaces&amp;lt;br&amp;gt;&lt;br /&gt;
Bad HTTP Methods enabled, [new]&amp;lt;br&amp;gt;&lt;br /&gt;
Informative Error Messages&amp;lt;br&amp;gt;&lt;br /&gt;
Database credentials/connection strings available&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for authentication|'''4.4 Authentication Testing ''']] &lt;br /&gt;
&lt;br /&gt;
Credentials transport over an unencrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
User enumeration (also Guessable user account) &amp;lt;br&amp;gt;&lt;br /&gt;
Default passwords &amp;lt;br&amp;gt;&lt;br /&gt;
Weak lock out mechanism [New!] &amp;lt;br&amp;gt;&lt;br /&gt;
Account lockout DoS [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Bypassing authentication schema&amp;lt;br&amp;gt; &lt;br /&gt;
Directory traversal/file include &amp;lt;br&amp;gt;&lt;br /&gt;
vulnerable remember password &amp;lt;br&amp;gt;&lt;br /&gt;
Logout function not properly implemented &amp;lt;br&amp;gt;&lt;br /&gt;
browser cache weakness [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Weak Password policy [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Weak username policy [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
weak security question answer [New!]&amp;lt;br&amp;gt; &lt;br /&gt;
Failure to Restrict access to authenticated resource [New!]&amp;lt;br&amp;gt; &lt;br /&gt;
Weak password change function [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Management|'''4.5 Session Management Testing''']] &lt;br /&gt;
&lt;br /&gt;
Bypassing Session Management Schema &amp;lt;br&amp;gt;&lt;br /&gt;
Weak Session Token &amp;lt;br&amp;gt;&lt;br /&gt;
Cookies are set not ‘HTTP Only’, ‘Secure’,  and no time validity&amp;lt;br&amp;gt; &lt;br /&gt;
Exposed sensitive session variables &amp;lt;br&amp;gt;&lt;br /&gt;
CSRF &amp;lt;br&amp;gt;&lt;br /&gt;
Session passed over http [New!] &amp;lt;br&amp;gt;&lt;br /&gt;
Session token within URL [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Session Fixation &amp;lt;br&amp;gt;&lt;br /&gt;
Session token not removed on server after logout [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Persistent session token [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Session token not restrcited properly (such as domain or path not set properly) [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Authorization|'''4.6 Authorization Testing''']] &lt;br /&gt;
&lt;br /&gt;
Bypassing authorization schema &amp;lt;br&amp;gt;&lt;br /&gt;
Privilege Escalation &amp;lt;br&amp;gt;&lt;br /&gt;
Insecure Direct Object References &amp;lt;br&amp;gt;&lt;br /&gt;
Failure to Restrict access to authorized resource [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for business logic   (OWASP-BL-001)|'''4.7 Business Logic Testing  (OWASP-BL-001)''']] [To review--&amp;gt; contributor here]&lt;br /&gt;
Business Logic&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Validation|'''4.8 Data Validation Testing''']] &lt;br /&gt;
&lt;br /&gt;
Reflected XSS &amp;lt;br&amp;gt;&lt;br /&gt;
Stored XSS &amp;lt;br&amp;gt;&lt;br /&gt;
HTTP Verb Tampering [Brad Causey]&amp;lt;br&amp;gt; &lt;br /&gt;
HTTP Parameter pollution [Brad Causey]&amp;lt;br&amp;gt;&lt;br /&gt;
Unvalidated Redirects and Forwards [Brad Causey]&amp;lt;br&amp;gt; &lt;br /&gt;
SQL Injection [Brad Causey]&amp;lt;br&amp;gt;&lt;br /&gt;
LDAP Injection &amp;lt;br&amp;gt;&lt;br /&gt;
ORM Injection &amp;lt;br&amp;gt;&lt;br /&gt;
XML Injection &amp;lt;br&amp;gt;&lt;br /&gt;
SSI Injection &amp;lt;br&amp;gt;&lt;br /&gt;
XPath Injection &amp;lt;br&amp;gt;&lt;br /&gt;
SOAP Injection &amp;lt;br&amp;gt;&lt;br /&gt;
IMAP/SMTP Injection &amp;lt;br&amp;gt;&lt;br /&gt;
Code Injection &amp;lt;br&amp;gt;&lt;br /&gt;
OS Commanding &amp;lt;br&amp;gt;&lt;br /&gt;
Buffer overflow &amp;lt;br&amp;gt;&lt;br /&gt;
Incubated vulnerability &amp;lt;br&amp;gt; &lt;br /&gt;
HTTP Splitting/Smuggling &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Encryption (New!)]]&lt;br /&gt;
&lt;br /&gt;
Application did not use encryption &amp;lt;br&amp;gt;&lt;br /&gt;
Weak SSL/TSL Ciphers, Insufficient &amp;lt;br&amp;gt;&lt;br /&gt;
Transport Layer Protection&amp;lt;br&amp;gt;&lt;br /&gt;
Cacheable HTTPS Response&amp;lt;br&amp;gt;&lt;br /&gt;
Cache directives insecure&amp;lt;br&amp;gt;&lt;br /&gt;
Insecure Cryptographic Storage [mainly CR Guide]&amp;lt;br&amp;gt;&lt;br /&gt;
Sensitive information sent via unencrypted&lt;br /&gt;
channels &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ XML Interpreter? (New!)]]&lt;br /&gt;
&lt;br /&gt;
Weak XML Structure&lt;br /&gt;
XML content-level&lt;br /&gt;
WS HTTP GET parameters/REST&lt;br /&gt;
WS Naughty SOAP attachments&lt;br /&gt;
WS Replay Testing&lt;br /&gt;
&lt;br /&gt;
[[ Client Side Testing (New!) ]]&lt;br /&gt;
&lt;br /&gt;
DOM XSS&amp;lt;br&amp;gt;&lt;br /&gt;
Cross Site Flashing&amp;lt;br&amp;gt;&lt;br /&gt;
ClickHijacking&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==[[Writing Reports: value the real risk |5. Writing Reports: value the real risk ]]==&lt;br /&gt;
&lt;br /&gt;
[[How to value the real risk |5.1 How to value the real risk]] [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
[[How to write the report of the testing |5.2 How to write the report of the testing]] [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
==[[Appendix A: Testing Tools |Appendix A: Testing Tools ]]==&lt;br /&gt;
&lt;br /&gt;
* Black Box Testing Tools [To review--&amp;gt; contributor here]&lt;br /&gt;
* Source Code Analyzers [To review--&amp;gt; contributor here]&lt;br /&gt;
* Other Tools [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix B: Suggested Reading | Appendix B: Suggested Reading]]==&lt;br /&gt;
* Whitepapers [To review--&amp;gt; contributor here]&lt;br /&gt;
* Books [To review--&amp;gt; contributor here]&lt;br /&gt;
* Useful Websites [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix C: Fuzz Vectors | Appendix C: Fuzz Vectors]]==&lt;br /&gt;
&lt;br /&gt;
* Fuzz Categories [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix D: Encoded Injection | Appendix D: Encoded Injection]]==&lt;br /&gt;
&lt;br /&gt;
[To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Testing Project]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=135101</id>
		<title>OWASP Testing Guide v4 Table of Contents</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v4_Table_of_Contents&amp;diff=135101"/>
				<updated>2012-08-30T16:22:23Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&lt;br /&gt;
'''This is DRAFT of the table of content of the New Testing Guide v4.'''&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;You can download the stable version [http://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf here] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Back to the OWASP Testing Guide Project:&lt;br /&gt;
http://www.owasp.org/index.php/OWASP_Testing_Project&lt;br /&gt;
&lt;br /&gt;
'''Updated: 28th August 2012'''&lt;br /&gt;
&lt;br /&gt;
The following are the main improvements we have to realize: &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
(1) - Add new testing techniques and OWASP Top10 update: &amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for HTTP Verb tampering&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for HTTP Parameter Pollutions&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for URL Redirection&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Insecure Direct Object References&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Insecure Cryptographic Storage&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Failure to Restrict URL Access&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Insufficient Transport Layer Protection&amp;lt;br&amp;gt;&lt;br /&gt;
- Testing for Unvalidated Redirects and Forwards.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
(2) - Review and improve all the sections in v3,&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
(3) - Create a more readable guide, eliminating some sections that are not&lt;br /&gt;
really useful, Rationalize some sections as Session Management Testing.&lt;br /&gt;
&lt;br /&gt;
(4) Pavol says: - add new opensource testing tools that appeared during last 3 years&lt;br /&gt;
(and are missing in the OWASP Testing Guide v3)&lt;br /&gt;
&lt;br /&gt;
- add few useful and life-scenarios of possible&lt;br /&gt;
vulnerabilities in Bussiness Logic Testing (many testers have no idea what&lt;br /&gt;
vulnerabilities in Business Logic exactly mean)&lt;br /&gt;
&lt;br /&gt;
- &amp;quot;Brute force testing&amp;quot; of &amp;quot;session ID&amp;quot; is missing in &amp;quot;Session Management&lt;br /&gt;
Testing&amp;quot;, describe other tools for Session ID entropy analysis&lt;br /&gt;
(e.g. Stompy)&lt;br /&gt;
&lt;br /&gt;
- in &amp;quot;Data Validation Testing&amp;quot; describe some basic obfuscation methods for&lt;br /&gt;
malicious code injection including the statements how it is possible to&lt;br /&gt;
detect it (web application obfuscation is quite succesfull in bypassing&lt;br /&gt;
many data validation controls)&lt;br /&gt;
&lt;br /&gt;
- split the phase Logout and Browser Cache Management&amp;quot; into two sections&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The following is a DRAFT of the Toc based on the feedback already received.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
'''T A B L E    o f    C O N T E N T S (DRAFT)'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Foreword|Foreword by OWASP Chair]]== [To review--&amp;gt; OWASP Chair]&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Frontispiece |1. Frontispiece]]== [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[Testing Guide Frontispiece|1.1 About the OWASP Testing Guide Project]]''' [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
'''[[About The Open Web Application Security Project|1.2 About The Open Web Application Security Project]]''' [To review--&amp;gt; ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[Testing Guide Introduction|2. Introduction]]==&lt;br /&gt;
&lt;br /&gt;
'''2.1 The OWASP Testing Project'''&lt;br /&gt;
&lt;br /&gt;
'''2.2 Principles of Testing'''&lt;br /&gt;
&lt;br /&gt;
'''2.3 Testing Techniques Explained''' &lt;br /&gt;
&lt;br /&gt;
2.4 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Requirements_Test_Derivation Security requirements test derivation],[https://www.owasp.org/index.php/Testing_Guide_Introduction#Functional_and_Non_Functional_Test_Requirements functional and non functional test requirements], and [https://www.owasp.org/index.php/Testing_Guide_Introduction#Test_Cases_Through_Use_and_Misuse_Cases test cases through use and misuse cases]&lt;br /&gt;
&lt;br /&gt;
2.5 [https://www.owasp.org/index.php/Testing_Guide_Introduction#Security_Test_Data_Analysis_and_Reporting Security test data analysis and reporting: root cause identification and business/role case test data reporting]&lt;br /&gt;
&lt;br /&gt;
==[[The OWASP Testing Framework|3. The OWASP Testing Framework]]==&lt;br /&gt;
&lt;br /&gt;
'''3.1. Overview'''&lt;br /&gt;
&lt;br /&gt;
'''3.2. Phase 1: Before Development Begins '''&lt;br /&gt;
&lt;br /&gt;
'''3.3. Phase 2: During Definition and Design'''&lt;br /&gt;
&lt;br /&gt;
'''3.4. Phase 3: During Development'''&lt;br /&gt;
&lt;br /&gt;
'''3.5. Phase 4: During Deployment'''&lt;br /&gt;
&lt;br /&gt;
'''3.6. Phase 5: Maintenance and Operations'''&lt;br /&gt;
&lt;br /&gt;
'''3.7. A Typical SDLC Testing Workflow '''&lt;br /&gt;
&lt;br /&gt;
==[[Web Application Penetration Testing |4. Web Application Penetration Testing ]]==&lt;br /&gt;
&lt;br /&gt;
[[Testing: Introduction and objectives|'''4.1 Introduction and Objectives''']] [To review--&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing Checklist| 4.1.1 Testing Checklist]] [To review at the end of brainstorming --&amp;gt; Mat]&lt;br /&gt;
&lt;br /&gt;
[[Testing: Information Gathering|'''4.2 Information Gathering ''']] [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
[[Testing for configuration management|'''4.3 Configuration and Deploy Management Testing ''']]&lt;br /&gt;
&lt;br /&gt;
Infrastructure Configuration management weakness&amp;lt;br&amp;gt;&lt;br /&gt;
Application Configuration management weakness&amp;lt;br&amp;gt;&lt;br /&gt;
File extensions handling&amp;lt;br&amp;gt;&lt;br /&gt;
Old, backup and unreferenced files&amp;lt;br&amp;gt;&lt;br /&gt;
Access to Admin interfaces&amp;lt;br&amp;gt;&lt;br /&gt;
Bad HTTP Methods enabled, [new]&amp;lt;br&amp;gt;&lt;br /&gt;
Informative Error Messages&amp;lt;br&amp;gt;&lt;br /&gt;
Database credentials/connection strings available&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for authentication|'''4.4 Authentication Testing ''']] &lt;br /&gt;
&lt;br /&gt;
Credentials transport over an unencrypted channel &amp;lt;br&amp;gt;&lt;br /&gt;
User enumeration (also Guessable user account) &amp;lt;br&amp;gt;&lt;br /&gt;
Default passwords &amp;lt;br&amp;gt;&lt;br /&gt;
Weak lock out mechanism [New!] &amp;lt;br&amp;gt;&lt;br /&gt;
Account lockout DoS [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Bypassing authentication schema&amp;lt;br&amp;gt; &lt;br /&gt;
Directory traversal/file include &amp;lt;br&amp;gt;&lt;br /&gt;
vulnerable remember password &amp;lt;br&amp;gt;&lt;br /&gt;
Logout function not properly implemented &amp;lt;br&amp;gt;&lt;br /&gt;
browser cache weakness [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Weak Password policy [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Weak username policy [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
weak security question answer [New!]&amp;lt;br&amp;gt; &lt;br /&gt;
Failure to Restrict access to authenticated resource [New!]&amp;lt;br&amp;gt; &lt;br /&gt;
Weak password change function [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Session Management|'''4.5 Session Management Testing''']] &lt;br /&gt;
&lt;br /&gt;
Bypassing Session Management Schema &amp;lt;br&amp;gt;&lt;br /&gt;
Weak Session Token &amp;lt;br&amp;gt;&lt;br /&gt;
Cookies are set not ‘HTTP Only’, ‘Secure’,  and no time validity&amp;lt;br&amp;gt; &lt;br /&gt;
Exposed sensitive session variables &amp;lt;br&amp;gt;&lt;br /&gt;
CSRF &amp;lt;br&amp;gt;&lt;br /&gt;
Session passed over http [New!] &amp;lt;br&amp;gt;&lt;br /&gt;
Session token within URL [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Session Fixation &amp;lt;br&amp;gt;&lt;br /&gt;
Session token not removed on server after logout [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Persistent session token [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
Session token not restrcited properly (such as domain or path not set properly) [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Authorization|'''4.6 Authorization Testing''']] &lt;br /&gt;
&lt;br /&gt;
Bypassing authorization schema &amp;lt;br&amp;gt;&lt;br /&gt;
Privilege Escalation &amp;lt;br&amp;gt;&lt;br /&gt;
Insecure Direct Object References &amp;lt;br&amp;gt;&lt;br /&gt;
Failure to Restrict access to authorized resource [New!]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for business logic   (OWASP-BL-001)|'''4.7 Business Logic Testing  (OWASP-BL-001)''']] [To review--&amp;gt; contributor here]&lt;br /&gt;
Business Logic&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Validation|'''4.8 Data Validation Testing''']] &lt;br /&gt;
&lt;br /&gt;
Reflected XSS &amp;lt;br&amp;gt;&lt;br /&gt;
Stored XSS &amp;lt;br&amp;gt;&lt;br /&gt;
HTTP Verb Tampering [Brad Causey]&amp;lt;br&amp;gt; &lt;br /&gt;
HTTP Parameter pollution [Brad Causey]&amp;lt;br&amp;gt;&lt;br /&gt;
Unvalidated Redirects and Forwards [Brad Causey]&amp;lt;br&amp;gt; &lt;br /&gt;
SQL Injection &amp;lt;Brad Causey&amp;gt;&lt;br /&gt;
LDAP Injection &amp;lt;br&amp;gt;&lt;br /&gt;
ORM Injection &amp;lt;br&amp;gt;&lt;br /&gt;
XML Injection &amp;lt;br&amp;gt;&lt;br /&gt;
SSI Injection &amp;lt;br&amp;gt;&lt;br /&gt;
XPath Injection &amp;lt;br&amp;gt;&lt;br /&gt;
SOAP Injection &amp;lt;br&amp;gt;&lt;br /&gt;
IMAP/SMTP Injection &amp;lt;br&amp;gt;&lt;br /&gt;
Code Injection &amp;lt;br&amp;gt;&lt;br /&gt;
OS Commanding &amp;lt;br&amp;gt;&lt;br /&gt;
Buffer overflow &amp;lt;br&amp;gt;&lt;br /&gt;
Incubated vulnerability &amp;lt;br&amp;gt; &lt;br /&gt;
HTTP Splitting/Smuggling &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Testing for Data Encryption (New!)]]&lt;br /&gt;
&lt;br /&gt;
Application did not use encryption &amp;lt;br&amp;gt;&lt;br /&gt;
Weak SSL/TSL Ciphers, Insufficient &amp;lt;br&amp;gt;&lt;br /&gt;
Transport Layer Protection&amp;lt;br&amp;gt;&lt;br /&gt;
Cacheable HTTPS Response&amp;lt;br&amp;gt;&lt;br /&gt;
Cache directives insecure&amp;lt;br&amp;gt;&lt;br /&gt;
Insecure Cryptographic Storage [mainly CR Guide]&amp;lt;br&amp;gt;&lt;br /&gt;
Sensitive information sent via unencrypted&lt;br /&gt;
channels &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[ XML Interpreter? (New!)]]&lt;br /&gt;
&lt;br /&gt;
Weak XML Structure&lt;br /&gt;
XML content-level&lt;br /&gt;
WS HTTP GET parameters/REST&lt;br /&gt;
WS Naughty SOAP attachments&lt;br /&gt;
WS Replay Testing&lt;br /&gt;
&lt;br /&gt;
[[ Client Side Testing (New!) ]]&lt;br /&gt;
&lt;br /&gt;
DOM XSS&amp;lt;br&amp;gt;&lt;br /&gt;
Cross Site Flashing&amp;lt;br&amp;gt;&lt;br /&gt;
ClickHijacking&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
==[[Writing Reports: value the real risk |5. Writing Reports: value the real risk ]]==&lt;br /&gt;
&lt;br /&gt;
[[How to value the real risk |5.1 How to value the real risk]] [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
[[How to write the report of the testing |5.2 How to write the report of the testing]] [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
==[[Appendix A: Testing Tools |Appendix A: Testing Tools ]]==&lt;br /&gt;
&lt;br /&gt;
* Black Box Testing Tools [To review--&amp;gt; contributor here]&lt;br /&gt;
* Source Code Analyzers [To review--&amp;gt; contributor here]&lt;br /&gt;
* Other Tools [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix B: Suggested Reading | Appendix B: Suggested Reading]]==&lt;br /&gt;
* Whitepapers [To review--&amp;gt; contributor here]&lt;br /&gt;
* Books [To review--&amp;gt; contributor here]&lt;br /&gt;
* Useful Websites [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix C: Fuzz Vectors | Appendix C: Fuzz Vectors]]==&lt;br /&gt;
&lt;br /&gt;
* Fuzz Categories [To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==[[OWASP Testing Guide Appendix D: Encoded Injection | Appendix D: Encoded Injection]]==&lt;br /&gt;
&lt;br /&gt;
[To review--&amp;gt; contributor here]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Testing Project]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Projects_and_Tools_Committee_-_Application_7&amp;diff=132947</id>
		<title>Global Projects and Tools Committee - Application 7</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Projects_and_Tools_Committee_-_Application_7&amp;diff=132947"/>
				<updated>2012-07-14T03:38:15Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Nishi Kumar&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | OWASP CBT Project Lead and Past member of Global Industry Committee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot; | Global Projects and Tools Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''1''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; |  Dan Cornell&lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Member, Global Membership Committee, Chapter Leader, San Antonio&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Nishi has been a long-time OWASP contributor since before the 2008 Summit and has worked on projects such as the OWASP CBT project. She would be an excellent contributor to the OWASP Global Projects and Tools Committee.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''2''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Josh Sokol&lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Chair, Global Chapters Committee &amp;amp; Chapter Leader, Austin&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | I've known Nishi for many years now as a contributor in the OWASP Austin Chapter.  She has been a huge assistance with speaker wrangling for LASCON the past couple years and the Global Projects and Tools Committee would be lucky to have her as a contributor.&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''3''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Dinis Cruz &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | O2 Platform Project Leader&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | I know Nishi since the first Summit and she has done great work on multiple OWASP projects, namely the CBT. Let see if she can inject some Design and Energy into the GPC&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''4''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Jim Manico&lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Chair, Connections Committee&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Nishi is the perfect combination of smart, fierce and sensitive to the OWASP non-profit mission. We would be lucky to have her participation on the Projects committee!&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | '''5''' &lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Brad Causey&lt;br /&gt;
| style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Global Projects and Tools Committee&lt;br /&gt;
| style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot; | Having worked closely with Nishi for years in my involvement with OWASP, and appreciating her contributions and dedications to it's mission, I cannot imagine a more suitable candidate for the GPC. I would absolutely welcome and appreciate her input and hard work in this important committee within OWASP. &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_10&amp;diff=109984</id>
		<title>Global Conferences Committee - Application 10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_10&amp;diff=109984"/>
				<updated>2011-05-04T17:21:55Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]] &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; colspan=&amp;quot;2&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Josh Sokol&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | Austin OWASP President, LASCON Co-Chair, Austin OWASP Vice President&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; colspan=&amp;quot;1&amp;quot; | Global Conferences Committee&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width:100%&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; colspan=&amp;quot;8&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | James Wickett&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | VP&amp;amp;nbsp;of Austin OWASP&amp;amp;nbsp;Chapter&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | Josh is a hard worker and has led the OWASP&amp;amp;nbsp;Austin chapter for 2010 and 2011. &amp;amp;nbsp;Josh has been an instrumental part of the chapter even before that time and has served in many capacities to make OWASP&amp;amp;nbsp;successful in Austin--from communication to members to arranging food for events to speaking at meetings. &amp;amp;nbsp;I&amp;amp;nbsp;highly recommend Josh and I&amp;amp;nbsp;know that he would make a good addition to the committee. &amp;amp;nbsp;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | Brad Causey&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | GPC Member&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | I've enjoyed working with Josh on each of my multiple occasions visiting the Austin, TX Chapter. It seems like everything Josh touches, is done exquisitely. OWASP would be well served by adding Josh to it's list of global leaders.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:3%; background:#cccccc&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:20%; background:#cccccc&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width:57%; background:#cccccc&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:PastedGraphic.jpeg&amp;diff=103747</id>
		<title>File:PastedGraphic.jpeg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:PastedGraphic.jpeg&amp;diff=103747"/>
				<updated>2011-02-06T22:51:35Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MASTER_FLOOR_COLOR_SMALL.jpg&amp;diff=103746</id>
		<title>File:MASTER FLOOR COLOR SMALL.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MASTER_FLOOR_COLOR_SMALL.jpg&amp;diff=103746"/>
				<updated>2011-02-06T22:49:04Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MASTER_FLOOR_COLOR_D.jpg&amp;diff=103745</id>
		<title>File:MASTER FLOOR COLOR D.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MASTER_FLOOR_COLOR_D.jpg&amp;diff=103745"/>
				<updated>2011-02-06T22:47:49Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MASTER_FLOOR_COLOR_C.jpg&amp;diff=103744</id>
		<title>File:MASTER FLOOR COLOR C.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MASTER_FLOOR_COLOR_C.jpg&amp;diff=103744"/>
				<updated>2011-02-06T22:47:09Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MASTER_FLOOR_COLOR_B.jpg&amp;diff=103743</id>
		<title>File:MASTER FLOOR COLOR B.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MASTER_FLOOR_COLOR_B.jpg&amp;diff=103743"/>
				<updated>2011-02-06T22:46:04Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MASTER_FLOOR_COLOR_A.jpg&amp;diff=103742</id>
		<title>File:MASTER FLOOR COLOR A.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MASTER_FLOOR_COLOR_A.jpg&amp;diff=103742"/>
				<updated>2011-02-06T22:44:36Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session014&amp;diff=103492</id>
		<title>Summit 2011 Working Sessions/Session014</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session014&amp;diff=103492"/>
				<updated>2011-02-05T15:39:41Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = Seba Deleersnyder&lt;br /&gt;
| summit_session_attendee_email1 = seba@owasp.org&lt;br /&gt;
| summit_session_attendee_username1 = &lt;br /&gt;
| summit_session_attendee_company1= SAIT Zenitel&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed1=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = Nishi Kumar&lt;br /&gt;
| summit_session_attendee_email2 = nishi.kumar@owasp.org  &lt;br /&gt;
| summit_session_attendee_username2 = &lt;br /&gt;
| summit_session_attendee_company2= FIS&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed2=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = &lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_username3 = &lt;br /&gt;
| summit_session_attendee_company3=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed3=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = &lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_username4 = &lt;br /&gt;
| summit_session_attendee_company4=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed4=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_username5 = &lt;br /&gt;
| summit_session_attendee_company5=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed5=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_username6 = &lt;br /&gt;
| summit_session_attendee_company6=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed6=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_username7 = &lt;br /&gt;
| summit_session_attendee_company7=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed7=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_username8 = &lt;br /&gt;
| summit_session_attendee_company8=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed8=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_username9 = &lt;br /&gt;
| summit_session_attendee_company9=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed9=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_username10 = &lt;br /&gt;
| summit_session_attendee_company10=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed10=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_username11 = &lt;br /&gt;
| summit_session_attendee_company11=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed11=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_username12 = &lt;br /&gt;
| summit_session_attendee_company12=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed12=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_username13 = &lt;br /&gt;
| summit_session_attendee_company13=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed13=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_username14 = &lt;br /&gt;
| summit_session_attendee_company14=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed14= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_username15 = &lt;br /&gt;
| summit_session_attendee_company15=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed15=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_username16 = &lt;br /&gt;
| summit_session_attendee_company16=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed16=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_username17 = &lt;br /&gt;
| summit_session_attendee_company17=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed17=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_username18 = &lt;br /&gt;
| summit_session_attendee_company18=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed18=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_username19 = &lt;br /&gt;
| summit_session_attendee_company19=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed19=&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_username20 = &lt;br /&gt;
| summit_session_attendee_company20=&lt;br /&gt;
| summit_session_attendee_notes,_reason_for_participating_and_issues_to_be discussed20=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| summit_track_logo = [[Image:T._global_committees.jpg]]&lt;br /&gt;
| summit_ws_logo = [[Image:WS._global_commitee.jpg‎]]&lt;br /&gt;
| summit_session_name = Projects&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session014&lt;br /&gt;
| mailing_list =&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description=&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = &lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1 = Review changes made in the last 2 years&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = Discuss the high level steps of a project life-cycle&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = Approve the [https://docs.google.com/a/owasp.org/document/d/1liiIpZE9EeVHL7CIGHQsXybtqsVGSJ1i5s9oSWSnWfE/edit?hl=en&amp;amp;ndplr=1&amp;amp;pli=1# OWASP GPC Governance Document]&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = Streamline project initialization process to make it easier for new projects&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 = Implement project governance change approved by the Board to limit use of &amp;quot;OWASP&amp;quot; brand name to projects of certain maturity&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name6 = Establish project promotion strategy to highlight projects at conferences, in newsletter, on website, etc&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = The OWASP 2011 Project Plan - describing the state of OWASP Projects and making recommendations about how the project model should be improved.&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = A white paper suggesting an approach for how OWASP should recognize commercial services that are based on OWASP materials. &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name6 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name7 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name8 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Brad Causey&lt;br /&gt;
| summit_session_leader_email1 = bradcausey@owasp.org&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = Jason Li&lt;br /&gt;
| summit_session_leader_email2 = jason.li@owasp.org&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_username3 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
| operational_leader_username1 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session014&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session014&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Connections_Committee_-_Application_5&amp;diff=102260</id>
		<title>OWASP Connections Committee - Application 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Connections_Committee_-_Application_5&amp;diff=102260"/>
				<updated>2011-01-26T20:59:50Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;2&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Applicant's Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;Greg Genung&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Current and past OWASP Roles''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Austin OWASP Membership Director.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Committee Applying for''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP Global Connections Committee.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''. An incomplete application will not be considered for vote. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; class=&amp;quot;FCK__ShowTableBorders&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;8&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#ffffff&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% white; color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Who Recommends/Name'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Role in OWASP'''&amp;lt;/font&amp;gt; &lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(123, 138, 189); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;#000000&amp;quot;&amp;gt;'''Recommendation Content'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''1''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Josh&amp;amp;nbsp;Sokol &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Austin OWASP&amp;amp;nbsp;President &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Greg has served as our Austin&amp;amp;nbsp;OWASP Membership Director for the past year and has been instrumental in raising our membership levels and awareness of OWASP&amp;amp;nbsp;in the community.&amp;amp;nbsp; Under his leadership we went from under a dozen members in the Austin chapter to almost a hundred.&amp;amp;nbsp; He is always coming up with new ideas and ways to drive people to our chapter and help to evangelize security within our community.&amp;amp;nbsp; It would be very selfish of us to want to keep his amazing ideas just to our chapter so it is with great pleasure that I'd like to recommend Greg's nomination to the OWASP&amp;amp;nbsp;Global Membership Committee.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''2''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | James Wickett&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Austin Chapter Vice President&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | I&amp;amp;nbsp;recommend Greg for the committee. There are a lot of things I could say about Greg but the easiest is to say that I&amp;amp;nbsp;echo Josh 100%.&amp;amp;nbsp; One thing I&amp;amp;nbsp;would add is that Greg was instrumental to the success of LASCON.&amp;amp;nbsp; In addition to working on the board, Greg was the face of the conference as the leader for speaker introductions and really helped keep the conference running smoothly.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''3''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Nishi Kumar&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP Global Education Committee&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | I highly recommend Greg for the committee. He has infinite energy and has great interpersonal skills. He is a true people person and would be an asset for the membership committee. He was instrumental in increasing the membership of OWASP in Austin chapter. I will whole heartedly like to recommend Greg's nomination to the OWASP Global Membership Committee.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''4''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Brad Causey&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP Global Project Committe&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | I met Greg about two years ago on a trip to speak at an Austin chapter meeting. His personality, fantastic attitude, and high energy are just the qualities we need on the connections committee. I'd gladly step behind Greg's leadership and I have full confidence in his ability to be successful, and therefore making OWASP even more successful.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 3%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''5''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 20%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 57%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session042&amp;diff=97262</id>
		<title>Summit 2011 Working Sessions/Session042</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011_Working_Sessions/Session042&amp;diff=97262"/>
				<updated>2010-12-20T16:26:49Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Summit 2011 Working Sessions test tab&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| summit_session_name = Developer's Security Training Package&lt;br /&gt;
| summit_session_url = http://www.owasp.org/index.php/Summit_2011_Working_Sessions/Session042&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| short_working_session_description= Compile a set of documents and slides to assist in the delivery of a security training class for developers&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| related_project_name1 = OWASP Development Guide, OWASP Secure Coding Practices - Quick Reference Guide, OWASP Enterprise Security API (ESAPI) Project, &lt;br /&gt;
| related_project_url_1 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name2 = OWASP Code Review Guide, &lt;br /&gt;
| related_project_url_2 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name3 = OWASP Application Security Verification Standard Project, &lt;br /&gt;
| related_project_url_3 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name4 = OWASP Testing Guide, &lt;br /&gt;
| related_project_url_4 = &lt;br /&gt;
&lt;br /&gt;
| related_project_name5 = OWASP Top Ten Project&lt;br /&gt;
| related_project_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name1= To create an organized package that can be used by companies for the purposes of educating developers on securely coding web applications and web services&lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_objective_name5 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_date_and_time = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| discussion_model = participants and attendees&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_resources = Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| working_session_additional_details = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name1 = Create modules that contain various aspects of Developer education&lt;br /&gt;
|summit_session_deliverable_url_1 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name2 = Template to help choose modules to create a total developer package&lt;br /&gt;
|summit_session_deliverable_url_2 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name3 = &lt;br /&gt;
|summit_session_deliverable_url_3 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name4 = &lt;br /&gt;
|summit_session_deliverable_url_4 = &lt;br /&gt;
&lt;br /&gt;
|summit_session_deliverable_name5 = &lt;br /&gt;
|summit_session_deliverable_url_5 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name1 = Brad Causey&lt;br /&gt;
| summit_session_leader_email1 = bradcausey@owasp.org&lt;br /&gt;
| summit_session_leader_wiki_username1 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name2 = &lt;br /&gt;
| summit_session_leader_email2 = &lt;br /&gt;
| summit_session_leader_wiki_username2 =&lt;br /&gt;
&lt;br /&gt;
| summit_session_leader_name3 = &lt;br /&gt;
| summit_session_leader_email3 = &lt;br /&gt;
| summit_session_leader_wiki_username3 =  &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| operational_leader_name1 =&lt;br /&gt;
| operational_leader_email1 =&lt;br /&gt;
| operational_leader_wiki_username1 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name1 = &lt;br /&gt;
| summit_session_attendee_email1 = &lt;br /&gt;
| summit_session_attendee_wiki_username1 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name2 = &lt;br /&gt;
| summit_session_attendee_email2 = &lt;br /&gt;
| summit_session_attendee_wiki_username2 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name3 = &lt;br /&gt;
| summit_session_attendee_email3 = &lt;br /&gt;
| summit_session_attendee_wiki_username3 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name4 = &lt;br /&gt;
| summit_session_attendee_email4 = &lt;br /&gt;
| summit_session_attendee_wiki_username4 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name5 = &lt;br /&gt;
| summit_session_attendee_email5 = &lt;br /&gt;
| summit_session_attendee_wiki_username5 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name6 = &lt;br /&gt;
| summit_session_attendee_email6 = &lt;br /&gt;
| summit_session_attendee_wiki_username6 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name7 = &lt;br /&gt;
| summit_session_attendee_email7 = &lt;br /&gt;
| summit_session_attendee_wiki_username7 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name8 = &lt;br /&gt;
| summit_session_attendee_email8 = &lt;br /&gt;
| summit_session_attendee_wiki_username8 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name9 = &lt;br /&gt;
| summit_session_attendee_email9 = &lt;br /&gt;
| summit_session_attendee_wiki_username9 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name10 = &lt;br /&gt;
| summit_session_attendee_email10 = &lt;br /&gt;
| summit_session_attendee_wiki_username10 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name11 = &lt;br /&gt;
| summit_session_attendee_email11 = &lt;br /&gt;
| summit_session_attendee_wiki_username11 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name12 = &lt;br /&gt;
| summit_session_attendee_email12 = &lt;br /&gt;
| summit_session_attendee_wiki_username12 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name13 = &lt;br /&gt;
| summit_session_attendee_email13 = &lt;br /&gt;
| summit_session_attendee_wiki_username13 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name14 = &lt;br /&gt;
| summit_session_attendee_email14 = &lt;br /&gt;
| summit_session_attendee_wiki_username14 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name15 = &lt;br /&gt;
| summit_session_attendee_email15 = &lt;br /&gt;
| summit_session_attendee_wiki_username15 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name16 = &lt;br /&gt;
| summit_session_attendee_email16 = &lt;br /&gt;
| summit_session_attendee_wiki_username16 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name17 = &lt;br /&gt;
| summit_session_attendee_email17 = &lt;br /&gt;
| summit_session_attendee_wiki_username17= &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name18 = &lt;br /&gt;
| summit_session_attendee_email18 = &lt;br /&gt;
| summit_session_attendee_wiki_username18 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name19 = &lt;br /&gt;
| summit_session_attendee_email19 = &lt;br /&gt;
| summit_session_attendee_wiki_username19 = &lt;br /&gt;
&lt;br /&gt;
| summit_session_attendee_name20 = &lt;br /&gt;
| summit_session_attendee_email20 = &lt;br /&gt;
| summit_session_attendee_wiki_username20 = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| meeting_notes = &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
&lt;br /&gt;
| session_name_mask = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Session042&lt;br /&gt;
| session_home_page = &amp;lt;!--Please replace DO NOT EDIT this string --&amp;gt; Summit_2011_Working_Sessions/Session042&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Working_Sessions_Developers_Security_Training_Package&amp;diff=96423</id>
		<title>Working Sessions Developers Security Training Package</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Working_Sessions_Developers_Security_Training_Package&amp;diff=96423"/>
				<updated>2010-12-15T00:23:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[http://www.owasp.org/index.php/Summit_2011 '''Global Summit 2011 Home Page''']&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Summit_2011_Schedule '''Global Summit 2011 Schedule''']&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Summit_2011_Working_Sessions '''Global Summit 2011 Working Sessions'''] &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(179, 179, 179); color: white;&amp;quot; colspan=&amp;quot;7&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Working Sessions Operational Rules''' - [[:Working Sessions Methodology|'''Please see here the general frame of rules''']].&amp;lt;/font&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;7&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION IDENTIFICATION'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Work Session Name''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Developer's Security Training Package&amp;lt;/span&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Short Work Session Description''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;6&amp;quot; | Compile a set of documents and slides to assist in the delivery of a security training class for developers&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Related Projects (if any)''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;6&amp;quot; | OWASP Development Guide, OWASP Secure Coding Practices - Quick Reference Guide, OWASP Enterprise Security API (ESAPI) Project, OWASP Code Review Guide, OWASP Application Security Verification Standard Project, OWASP Testing Guide, OWASP Top Ten Project&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Email Contacts &amp;amp;amp; Roles''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''Chair'''&amp;lt;br&amp;gt; [mailto:bradcausey@owasp.org '''Brad Causey'''] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''Secretary'''&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''Mailing list'''&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/Summit_2011#tab=How_Do_I_Join.3F_.2F_Mailing_list '''Subscription Page''']&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;7&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION SPECIFICS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Objectives''' &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 85%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; colspan=&amp;quot;6&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt;&lt;br /&gt;
&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &lt;br /&gt;
To create an organized package that can be used by companies for the purposes of educating developers on securely coding web applications and web services.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | '''Venue/Date&amp;amp;amp;Time/Model''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''Venue'''&amp;lt;br&amp;gt;[http://www.owasp.org/index.php/Summit_2011 OWASP Global Summit Portugal 2011] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
'''Date&amp;amp;amp;Time''' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 25%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''Discussion Model'''&amp;lt;br&amp;gt;&amp;quot;Participants + Attendees&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% white; color: white;&amp;quot; colspan=&amp;quot;7&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;7&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION OPERATIONAL RESOURCES'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Projector, whiteboards, markers, Internet connectivity, power&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% white; color: white;&amp;quot; colspan=&amp;quot;7&amp;quot; | &amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&amp;lt;/font&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;7&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION ADDITIONAL DETAILS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 100%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &lt;br /&gt;
*'''Related resources:''' &lt;br /&gt;
*'''Frameworks to invite:'''&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; colspan=&amp;quot;3&amp;quot; | '''WORKING SESSION OUTCOMES'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(108, 130, 181);&amp;quot; | Statements, Initiatives or Decisions &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 46%; background: none repeat scroll 0% 0% rgb(179, 179, 179);&amp;quot; | '''Proposed by Working Group''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 47%; background: none repeat scroll 0% 0% rgb(179, 179, 179);&amp;quot; | '''Approved by OWASP Board'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 46%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 47%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | After the Board Meeting - fill in here.&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 46%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 47%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | After the Board Meeting - fill in here.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Working Session Participants  ==&lt;br /&gt;
&lt;br /&gt;
(Add you name by editing this table. On your the right, just above the this frame, you have the option to edit) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 100%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; colspan=&amp;quot;7&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | &amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''WORKING SESSION PARTICIPANTS'''&amp;lt;/font&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''Name''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''Company''' &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | '''Notes &amp;amp;amp; reason for participating, issues to be discussed/addressed'''&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | Brad Causey&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | OWASP&amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | To lead the course of the discussion.&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 7%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 15%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; style=&amp;quot;width: 63%; background: none repeat scroll 0% 0% rgb(204, 204, 204);&amp;quot; | &amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
If needed add here more lines. &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Working_Session]] [[Category:Summit_2011]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92065</id>
		<title>Summit 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92065"/>
				<updated>2010-10-28T02:05:16Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Summit Group 4.jpg|border|OWASP Summit 2008 in Portugal]] &lt;br /&gt;
&lt;br /&gt;
Dear OWASP Leaders and appsec community, &lt;br /&gt;
&lt;br /&gt;
The Summit will be held February 8th-11th in (Cascais) Lisbon, Portugal. This will be the place where appsec experts meet, discuss, work, socialize, and set the roadmap for OWASP in coming years.&lt;br /&gt;
&lt;br /&gt;
=== The Summit Activates *You*  ===&lt;br /&gt;
&lt;br /&gt;
Whereas the OWASP AppSec conferences are great places to listen to interesting talks, go for training, and meet with OWASP people, the Global Summit is the place where we all sit down together and take the time to discuss and work out plans, projects and solutions for the appsec future. &lt;br /&gt;
&lt;br /&gt;
Examples of topics: &lt;br /&gt;
&lt;br /&gt;
*How should we support the OWASP projects? &lt;br /&gt;
*How can we work with browser vendors to enhance security (see &amp;quot;Browser Day&amp;quot; tab above)? &lt;br /&gt;
*How should the community reach out to developers and education institutions? &lt;br /&gt;
*How often should we publish the OWASP Top 10? &lt;br /&gt;
*How can OWASP support your chapter?&lt;br /&gt;
&lt;br /&gt;
=== Organizing Committee  ===&lt;br /&gt;
&lt;br /&gt;
A group of very experienced and passionate OWASPers have joined the organizing committee for Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
*Lorna Alamri &lt;br /&gt;
*Brad Causey &lt;br /&gt;
*Justin Clarke &lt;br /&gt;
*Paulo Coimbra &lt;br /&gt;
*Dinis Cruz &lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Dave Wichers &lt;br /&gt;
*John Wilander &lt;br /&gt;
*Jason Li &lt;br /&gt;
*Tara Causey &lt;br /&gt;
*Sarah Baso&lt;br /&gt;
&lt;br /&gt;
=== Who's Invited?  ===&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit, but we also welcome leading experts from industry and academia. Together we can create a more secure web. Check the &amp;quot;How Do I Join?&amp;quot; tab above for more info. &lt;br /&gt;
&lt;br /&gt;
==== Operational guidelines  ====&lt;br /&gt;
&lt;br /&gt;
Following the first meeting of the Summit 2011 Organizational team, here are the current proposed operational guidelines: &lt;br /&gt;
&lt;br /&gt;
#the summit is an annual event &lt;br /&gt;
#outside OWASP conference &lt;br /&gt;
#the summit should take place in January not later then begin of February &lt;br /&gt;
#the summit takes 3 to 4 days &lt;br /&gt;
#budget aim is US$ 150'000 US$ where 50'000 from OWASP and US$100'000 from sponsors &lt;br /&gt;
#attendees targets are: &lt;br /&gt;
##OWASP Funded: &lt;br /&gt;
###Board &lt;br /&gt;
###Committee Members &lt;br /&gt;
##Chapter / sponsor Funded: &lt;br /&gt;
###Chapter Leaders &lt;br /&gt;
##Project Leaders &lt;br /&gt;
#venue / location criteria (no decision on the venue) &lt;br /&gt;
##1 key organizer in close contact with the venue &lt;br /&gt;
##hosting 30 to 100 people &lt;br /&gt;
##US$2'000 a head (flight/accommodation/food/beers) &lt;br /&gt;
##conference facilities &lt;br /&gt;
###multiple meeting rooms &lt;br /&gt;
###one big meeting room e.g. auditorium &lt;br /&gt;
###hotel with the conference facilities or conference venue within walking distance &lt;br /&gt;
###apartments if possible (to share apartments/rooms and save money) &lt;br /&gt;
###4 to 5 star hotel &lt;br /&gt;
###local food supplier for apartment crashing &lt;br /&gt;
###has to be negotiated with the hotel &lt;br /&gt;
###max 50 km's form international airport &lt;br /&gt;
###sufficient Internet access!&lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP'''&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria: &lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board &lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee. &lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. If you do not meet these criteria, and still feel that you should be sponsored, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. &lt;br /&gt;
&lt;br /&gt;
'''Success factors (what indicates the summit as success)''' &lt;br /&gt;
&lt;br /&gt;
#break even &lt;br /&gt;
#the summits are the place to go to discus about and working on Web Application Security &lt;br /&gt;
#review of the past year &lt;br /&gt;
#working sessions on committees, projects and industry sectors (e.g. browsers and frameworks) &lt;br /&gt;
##universities / education sessions &lt;br /&gt;
##committee member election &lt;br /&gt;
##board election &lt;br /&gt;
##strategic OWASP issues &lt;br /&gt;
##road map and action plans for the next 12 month&lt;br /&gt;
&lt;br /&gt;
Other local Summit(s): &lt;br /&gt;
&lt;br /&gt;
*The conferences are free to organize small, conference bound summit &lt;br /&gt;
*this are not sponsored by OWASP of OWASP summit budget&lt;br /&gt;
&lt;br /&gt;
==== Browser Day!  ====&lt;br /&gt;
&lt;br /&gt;
One of the great challenges of application security is browser security. &lt;br /&gt;
&lt;br /&gt;
Therefore we will spend '''a full day working together with the leading browser vendors''' to penetrate current problems, new ideas, and how security fits in alongside other requirements from developers and endusers. &lt;br /&gt;
&lt;br /&gt;
Do not miss this chance to define what's important in browser security in the coming years. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the Browser Day. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== XSS Eradication  ====&lt;br /&gt;
&lt;br /&gt;
We will have a '''half day working session on Cross Site Scripting''' - specifically how OWASP can make 2011 the year of XSS... going away. How we help bring this about through contributing our knowledge to cornerstone projects, how we can raise the awareness through advocacy, and what we can do to ensure that OWASP and other freely available resources and made available to the wider community, and that they are aware of them. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the XSS session. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Outreach to frameworks/other constituent parties /Justin Clarke &lt;br /&gt;
*OWASP XSS Awareness resources and partner freely available resources /Justin Clarke &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== OWASP Projects  ====&lt;br /&gt;
&lt;br /&gt;
We will have a session on how OWASP should support, grow, and manage projects. This includes: &lt;br /&gt;
&lt;br /&gt;
*Assessment criteria &lt;br /&gt;
*Orphaned projects &lt;br /&gt;
*Funding &lt;br /&gt;
*Marketing &lt;br /&gt;
*Commercial services&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you have most probably seen some of the above topics discussed on the leaders list. Now is the time to boil down to consensus. &lt;br /&gt;
&lt;br /&gt;
==== OWASP Around the World  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is a fast growing global community. How should we support and manage this growth? During this session we'll look into issues of: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Internationalization Internationalization] &lt;br /&gt;
*The [http://www.owasp.org/index.php/OWASP_Jobs global job board] &lt;br /&gt;
*New OWASP chapters in parts of the world where we have not spread much yet&lt;br /&gt;
&lt;br /&gt;
==== More Topics  ====&lt;br /&gt;
&lt;br /&gt;
You know how OWASP works – it's all up to you. Please '''edit this tab and enter topics we should cover''' during the Global Summit 2011! If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Discussion on Douglas Crockford's bold statement that we should stop HTML5 development, fix XSS, and then start over. Is he right? How is OWASP active in the HTML5 development? Check [http://blip.tv/file/3755495 this webcast], jump to 20:50 to hear the XSS part. /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== How Do I Join? / Mailing list  ====&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit. &lt;br /&gt;
&lt;br /&gt;
The first thing to do is to join the [https://lists.owasp.org/mailman/listinfo/owasp-summit-2011 Summit 2011 mailing list]. &lt;br /&gt;
&lt;br /&gt;
On the mailing list you'll get first hand information on how to register, exact dates, updates to the agenda, funding for your trip etc. &lt;br /&gt;
&lt;br /&gt;
If you are a leading appsec expert from industry or academia but not yet an OWASP leader you can just contact John.Wilander at owasp.org and we'll try to get you in. &lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
It goes without saying – the summit is all about meeting people. So there will be a constant mixture of workshops, dinners, beers and wine. We like to think of the summit as a very social event in itself. &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Hotel Quinta da Marinha Resort &lt;br /&gt;
&lt;br /&gt;
[[Image:2011venue.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Between city and nature, between the beach and the mountain, Hotel Quinta da Marinha Resort - located in the excellent area of Cascais / Sintra, a mere 25 km from Lisbon - is the perfect setting to feel like all your wishes always come true. Discover one of the finest Resorts in Portugal. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Total Rooms: 11 &lt;br /&gt;
*“All In One” with 474 m2 &lt;br /&gt;
*Capacity for 450 persons &lt;br /&gt;
*Moveable walls in 4 rooms (“All in One”) &lt;br /&gt;
*Wireless Internet access in all rooms and public areas &lt;br /&gt;
*Available Av systems, top of the line, for rent &lt;br /&gt;
*9 rooms with natural light &lt;br /&gt;
*Air conditioning&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Inside-venue2011.jpg]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.quintadamarinha.com Website] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We will welcome a few sponsors of this very special event, typically organization that participate in the summit. If you are interested in supporting the global summit, please contact Lorna.Alamri at owasp.org. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria:''' &lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board &lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee. &lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact Brad Causey or Jason Li. If you do not meet these criteria, and still feel that you should be sponsored, please contact Brad Causey or Jason Li. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92064</id>
		<title>Summit 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92064"/>
				<updated>2010-10-28T02:03:00Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Summit Group 4.jpg|border|OWASP Summit 2008 in Portugal]] &lt;br /&gt;
&lt;br /&gt;
Dear OWASP Leaders and appsec community, &lt;br /&gt;
&lt;br /&gt;
January/February 2011 it's time for the Global OWASP Summit. The place where appsec experts meet, discuss, work, socialize, and set the roadmap for OWASP. &lt;br /&gt;
&lt;br /&gt;
=== The Summit Activates *You*  ===&lt;br /&gt;
&lt;br /&gt;
Whereas the OWASP AppSec conferences are great places to listen to interesting talks, go for training, and meet with OWASP people, the Global Summit is the place where we all sit down together and take the time to discuss and work out plans, projects and solutions for the appsec future. &lt;br /&gt;
&lt;br /&gt;
Examples of topics: &lt;br /&gt;
&lt;br /&gt;
*How should we support the OWASP projects? &lt;br /&gt;
*How can we work with browser vendors to enhance security (see &amp;quot;Browser Day&amp;quot; tab above)? &lt;br /&gt;
*How should the community reach out to developers and education institutions? &lt;br /&gt;
*How often should we publish the OWASP Top 10? &lt;br /&gt;
*How can OWASP support your chapter?&lt;br /&gt;
&lt;br /&gt;
=== Organizing Committee  ===&lt;br /&gt;
&lt;br /&gt;
A group of very experienced and passionate OWASPers have joined the organizing committee for Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
*Lorna Alamri &lt;br /&gt;
*Brad Causey &lt;br /&gt;
*Justin Clarke &lt;br /&gt;
*Paulo Coimbra &lt;br /&gt;
*Dinis Cruz &lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Dave Wichers &lt;br /&gt;
*John Wilander &lt;br /&gt;
*Jason Li &lt;br /&gt;
*Tara Causey &lt;br /&gt;
*Sarah Baso&lt;br /&gt;
&lt;br /&gt;
=== Who's Invited?  ===&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit, but we also welcome leading experts from industry and academia. Together we can create a more secure web. Check the &amp;quot;How Do I Join?&amp;quot; tab above for more info. &lt;br /&gt;
&lt;br /&gt;
==== Operational guidelines  ====&lt;br /&gt;
&lt;br /&gt;
Following the first meeting of the Summit 2011 Organizational team, here are the current proposed operational guidelines: &lt;br /&gt;
&lt;br /&gt;
#the summit is an annual event &lt;br /&gt;
#outside OWASP conference &lt;br /&gt;
#the summit should take place in January not later then begin of February &lt;br /&gt;
#the summit takes 3 to 4 days &lt;br /&gt;
#budget aim is US$ 150'000 US$ where 50'000 from OWASP and US$100'000 from sponsors &lt;br /&gt;
#attendees targets are: &lt;br /&gt;
##OWASP Funded: &lt;br /&gt;
###Board &lt;br /&gt;
###Committee Members &lt;br /&gt;
##Chapter / sponsor Funded: &lt;br /&gt;
###Chapter Leaders &lt;br /&gt;
##Project Leaders &lt;br /&gt;
#venue / location criteria (no decision on the venue) &lt;br /&gt;
##1 key organizer in close contact with the venue &lt;br /&gt;
##hosting 30 to 100 people &lt;br /&gt;
##US$2'000 a head (flight/accommodation/food/beers) &lt;br /&gt;
##conference facilities &lt;br /&gt;
###multiple meeting rooms &lt;br /&gt;
###one big meeting room e.g. auditorium &lt;br /&gt;
###hotel with the conference facilities or conference venue within walking distance &lt;br /&gt;
###apartments if possible (to share apartments/rooms and save money) &lt;br /&gt;
###4 to 5 star hotel &lt;br /&gt;
###local food supplier for apartment crashing &lt;br /&gt;
###has to be negotiated with the hotel &lt;br /&gt;
###max 50 km's form international airport &lt;br /&gt;
###sufficient Internet access!&lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP'''&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria: &lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board &lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee. &lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. If you do not meet these criteria, and still feel that you should be sponsored, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. &lt;br /&gt;
&lt;br /&gt;
'''Success factors (what indicates the summit as success)''' &lt;br /&gt;
&lt;br /&gt;
#break even &lt;br /&gt;
#the summits are the place to go to discus about and working on Web Application Security &lt;br /&gt;
#review of the past year &lt;br /&gt;
#working sessions on committees, projects and industry sectors (e.g. browsers and frameworks) &lt;br /&gt;
##universities / education sessions &lt;br /&gt;
##committee member election &lt;br /&gt;
##board election &lt;br /&gt;
##strategic OWASP issues &lt;br /&gt;
##road map and action plans for the next 12 month&lt;br /&gt;
&lt;br /&gt;
Other local Summit(s): &lt;br /&gt;
&lt;br /&gt;
*The conferences are free to organize small, conference bound summit &lt;br /&gt;
*this are not sponsored by OWASP of OWASP summit budget&lt;br /&gt;
&lt;br /&gt;
==== Browser Day!  ====&lt;br /&gt;
&lt;br /&gt;
One of the great challenges of application security is browser security. &lt;br /&gt;
&lt;br /&gt;
Therefore we will spend '''a full day working together with the leading browser vendors''' to penetrate current problems, new ideas, and how security fits in alongside other requirements from developers and endusers. &lt;br /&gt;
&lt;br /&gt;
Do not miss this chance to define what's important in browser security in the coming years. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the Browser Day. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== XSS Eradication  ====&lt;br /&gt;
&lt;br /&gt;
We will have a '''half day working session on Cross Site Scripting''' - specifically how OWASP can make 2011 the year of XSS... going away. How we help bring this about through contributing our knowledge to cornerstone projects, how we can raise the awareness through advocacy, and what we can do to ensure that OWASP and other freely available resources and made available to the wider community, and that they are aware of them. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the XSS session. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Outreach to frameworks/other constituent parties /Justin Clarke &lt;br /&gt;
*OWASP XSS Awareness resources and partner freely available resources /Justin Clarke &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== OWASP Projects  ====&lt;br /&gt;
&lt;br /&gt;
We will have a session on how OWASP should support, grow, and manage projects. This includes: &lt;br /&gt;
&lt;br /&gt;
*Assessment criteria &lt;br /&gt;
*Orphaned projects &lt;br /&gt;
*Funding &lt;br /&gt;
*Marketing &lt;br /&gt;
*Commercial services&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you have most probably seen some of the above topics discussed on the leaders list. Now is the time to boil down to consensus. &lt;br /&gt;
&lt;br /&gt;
==== OWASP Around the World  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is a fast growing global community. How should we support and manage this growth? During this session we'll look into issues of: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Internationalization Internationalization] &lt;br /&gt;
*The [http://www.owasp.org/index.php/OWASP_Jobs global job board] &lt;br /&gt;
*New OWASP chapters in parts of the world where we have not spread much yet&lt;br /&gt;
&lt;br /&gt;
==== More Topics  ====&lt;br /&gt;
&lt;br /&gt;
You know how OWASP works – it's all up to you. Please '''edit this tab and enter topics we should cover''' during the Global Summit 2011! If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Discussion on Douglas Crockford's bold statement that we should stop HTML5 development, fix XSS, and then start over. Is he right? How is OWASP active in the HTML5 development? Check [http://blip.tv/file/3755495 this webcast], jump to 20:50 to hear the XSS part. /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== How Do I Join? / Mailing list  ====&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit. &lt;br /&gt;
&lt;br /&gt;
The first thing to do is to join the [https://lists.owasp.org/mailman/listinfo/owasp-summit-2011 Summit 2011 mailing list]. &lt;br /&gt;
&lt;br /&gt;
On the mailing list you'll get first hand information on how to register, exact dates, updates to the agenda, funding for your trip etc. &lt;br /&gt;
&lt;br /&gt;
If you are a leading appsec expert from industry or academia but not yet an OWASP leader you can just contact John.Wilander at owasp.org and we'll try to get you in. &lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
It goes without saying – the summit is all about meeting people. So there will be a constant mixture of workshops, dinners, beers and wine. We like to think of the summit as a very social event in itself. &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Hotel Quinta da Marinha Resort &lt;br /&gt;
&lt;br /&gt;
[[Image:2011venue.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Between city and nature, between the beach and the mountain, Hotel Quinta da Marinha Resort - located in the excellent area of Cascais / Sintra, a mere 25 km from Lisbon - is the perfect setting to feel like all your wishes always come true. Discover one of the finest Resorts in Portugal. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Total Rooms: 11 &lt;br /&gt;
*“All In One” with 474 m2 &lt;br /&gt;
*Capacity for 450 persons &lt;br /&gt;
*Moveable walls in 4 rooms (“All in One”) &lt;br /&gt;
*Wireless Internet access in all rooms and public areas &lt;br /&gt;
*Available Av systems, top of the line, for rent &lt;br /&gt;
*9 rooms with natural light &lt;br /&gt;
*Air conditioning&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Inside-venue2011.jpg]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.quintadamarinha.com Website]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We will welcome a few sponsors of this very special event, typically organization that participate in the summit. If you are interested in supporting the global summit, please contact Lorna.Alamri at owasp.org. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria:''' &lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board &lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee. &lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact Brad Causey or Jason Li. If you do not meet these criteria, and still feel that you should be sponsored, please contact Brad Causey or Jason Li. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92063</id>
		<title>Summit 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92063"/>
				<updated>2010-10-28T02:01:44Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Summit Group 4.jpg|border|OWASP Summit 2008 in Portugal]] &lt;br /&gt;
&lt;br /&gt;
Dear OWASP Leaders and appsec community, &lt;br /&gt;
&lt;br /&gt;
January/February 2011 it's time for the Global OWASP Summit. The place where appsec experts meet, discuss, work, socialize, and set the roadmap for OWASP. &lt;br /&gt;
&lt;br /&gt;
=== The Summit Activates *You*  ===&lt;br /&gt;
&lt;br /&gt;
Whereas the OWASP AppSec conferences are great places to listen to interesting talks, go for training, and meet with OWASP people, the Global Summit is the place where we all sit down together and take the time to discuss and work out plans, projects and solutions for the appsec future. &lt;br /&gt;
&lt;br /&gt;
Examples of topics: &lt;br /&gt;
&lt;br /&gt;
*How should we support the OWASP projects? &lt;br /&gt;
*How can we work with browser vendors to enhance security (see &amp;quot;Browser Day&amp;quot; tab above)? &lt;br /&gt;
*How should the community reach out to developers and education institutions? &lt;br /&gt;
*How often should we publish the OWASP Top 10? &lt;br /&gt;
*How can OWASP support your chapter?&lt;br /&gt;
&lt;br /&gt;
=== Organizing Committee  ===&lt;br /&gt;
&lt;br /&gt;
A group of very experienced and passionate OWASPers have joined the organizing committee for Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
*Lorna Alamri &lt;br /&gt;
*Brad Causey &lt;br /&gt;
*Justin Clarke &lt;br /&gt;
*Paulo Coimbra &lt;br /&gt;
*Dinis Cruz &lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Dave Wichers &lt;br /&gt;
*John Wilander &lt;br /&gt;
*Jason Li &lt;br /&gt;
*Tara Causey &lt;br /&gt;
*Sarah Baso&lt;br /&gt;
&lt;br /&gt;
=== Who's Invited?  ===&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit, but we also welcome leading experts from industry and academia. Together we can create a more secure web. Check the &amp;quot;How Do I Join?&amp;quot; tab above for more info. &lt;br /&gt;
&lt;br /&gt;
==== Operational guidelines  ====&lt;br /&gt;
&lt;br /&gt;
Following the first meeting of the Summit 2011 Organizational team, here are the current proposed operational guidelines: &lt;br /&gt;
&lt;br /&gt;
#the summit is an annual event &lt;br /&gt;
#outside OWASP conference &lt;br /&gt;
#the summit should take place in January not later then begin of February &lt;br /&gt;
#the summit takes 3 to 4 days &lt;br /&gt;
#budget aim is US$ 150'000 US$ where 50'000 from OWASP and US$100'000 from sponsors &lt;br /&gt;
#attendees targets are: &lt;br /&gt;
##OWASP Funded: &lt;br /&gt;
###Board &lt;br /&gt;
###Committee Members &lt;br /&gt;
##Chapter / sponsor Funded: &lt;br /&gt;
###Chapter Leaders &lt;br /&gt;
##Project Leaders &lt;br /&gt;
#venue / location criteria (no decision on the venue) &lt;br /&gt;
##1 key organizer in close contact with the venue &lt;br /&gt;
##hosting 30 to 100 people &lt;br /&gt;
##US$2'000 a head (flight/accommodation/food/beers) &lt;br /&gt;
##conference facilities &lt;br /&gt;
###multiple meeting rooms &lt;br /&gt;
###one big meeting room e.g. auditorium &lt;br /&gt;
###hotel with the conference facilities or conference venue within walking distance &lt;br /&gt;
###apartments if possible (to share apartments/rooms and save money) &lt;br /&gt;
###4 to 5 star hotel &lt;br /&gt;
###local food supplier for apartment crashing &lt;br /&gt;
###has to be negotiated with the hotel &lt;br /&gt;
###max 50 km's form international airport &lt;br /&gt;
###sufficient Internet access!&lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP'''&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria: &lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board &lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee. &lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. If you do not meet these criteria, and still feel that you should be sponsored, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. &lt;br /&gt;
&lt;br /&gt;
'''Success factors (what indicates the summit as success)''' &lt;br /&gt;
&lt;br /&gt;
#break even &lt;br /&gt;
#the summits are the place to go to discus about and working on Web Application Security &lt;br /&gt;
#review of the past year &lt;br /&gt;
#working sessions on committees, projects and industry sectors (e.g. browsers and frameworks) &lt;br /&gt;
##universities / education sessions &lt;br /&gt;
##committee member election &lt;br /&gt;
##board election &lt;br /&gt;
##strategic OWASP issues &lt;br /&gt;
##road map and action plans for the next 12 month&lt;br /&gt;
&lt;br /&gt;
Other local Summit(s): &lt;br /&gt;
&lt;br /&gt;
*The conferences are free to organize small, conference bound summit &lt;br /&gt;
*this are not sponsored by OWASP of OWASP summit budget&lt;br /&gt;
&lt;br /&gt;
==== Browser Day!  ====&lt;br /&gt;
&lt;br /&gt;
One of the great challenges of application security is browser security. &lt;br /&gt;
&lt;br /&gt;
Therefore we will spend '''a full day working together with the leading browser vendors''' to penetrate current problems, new ideas, and how security fits in alongside other requirements from developers and endusers. &lt;br /&gt;
&lt;br /&gt;
Do not miss this chance to define what's important in browser security in the coming years. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the Browser Day. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== XSS Eradication  ====&lt;br /&gt;
&lt;br /&gt;
We will have a '''half day working session on Cross Site Scripting''' - specifically how OWASP can make 2011 the year of XSS... going away. How we help bring this about through contributing our knowledge to cornerstone projects, how we can raise the awareness through advocacy, and what we can do to ensure that OWASP and other freely available resources and made available to the wider community, and that they are aware of them. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the XSS session. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Outreach to frameworks/other constituent parties /Justin Clarke &lt;br /&gt;
*OWASP XSS Awareness resources and partner freely available resources /Justin Clarke &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== OWASP Projects  ====&lt;br /&gt;
&lt;br /&gt;
We will have a session on how OWASP should support, grow, and manage projects. This includes: &lt;br /&gt;
&lt;br /&gt;
*Assessment criteria &lt;br /&gt;
*Orphaned projects &lt;br /&gt;
*Funding &lt;br /&gt;
*Marketing &lt;br /&gt;
*Commercial services&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you have most probably seen some of the above topics discussed on the leaders list. Now is the time to boil down to consensus. &lt;br /&gt;
&lt;br /&gt;
==== OWASP Around the World  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is a fast growing global community. How should we support and manage this growth? During this session we'll look into issues of: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Internationalization Internationalization] &lt;br /&gt;
*The [http://www.owasp.org/index.php/OWASP_Jobs global job board] &lt;br /&gt;
*New OWASP chapters in parts of the world where we have not spread much yet&lt;br /&gt;
&lt;br /&gt;
==== More Topics  ====&lt;br /&gt;
&lt;br /&gt;
You know how OWASP works – it's all up to you. Please '''edit this tab and enter topics we should cover''' during the Global Summit 2011! If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Discussion on Douglas Crockford's bold statement that we should stop HTML5 development, fix XSS, and then start over. Is he right? How is OWASP active in the HTML5 development? Check [http://blip.tv/file/3755495 this webcast], jump to 20:50 to hear the XSS part. /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== How Do I Join? / Mailing list  ====&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit. &lt;br /&gt;
&lt;br /&gt;
The first thing to do is to join the [https://lists.owasp.org/mailman/listinfo/owasp-summit-2011 Summit 2011 mailing list]. &lt;br /&gt;
&lt;br /&gt;
On the mailing list you'll get first hand information on how to register, exact dates, updates to the agenda, funding for your trip etc. &lt;br /&gt;
&lt;br /&gt;
If you are a leading appsec expert from industry or academia but not yet an OWASP leader you can just contact John.Wilander at owasp.org and we'll try to get you in. &lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
It goes without saying – the summit is all about meeting people. So there will be a constant mixture of workshops, dinners, beers and wine. We like to think of the summit as a very social event in itself. &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Hotel Quinta da Marinha Resort &lt;br /&gt;
&lt;br /&gt;
[[Image:2011venue.jpg]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Between city and nature, between the beach and the mountain, Hotel Quinta da Marinha Resort - located in the excellent area of Cascais / Sintra, a mere 25 km from Lisbon - is the perfect setting to feel like all your wishes always come true. Discover one of the finest Resorts in Portugal. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*Total Rooms: 11 &lt;br /&gt;
*“All In One” with 474 m2 &lt;br /&gt;
*Capacity for 450 persons &lt;br /&gt;
*Moveable walls in 4 rooms (“All in One”) &lt;br /&gt;
*Wireless Internet access in all rooms and public areas &lt;br /&gt;
*Available Av systems, top of the line, for rent &lt;br /&gt;
*9 rooms with natural light &lt;br /&gt;
*Air conditioning&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Image:Inside-venue2011.jpg]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We will welcome a few sponsors of this very special event, typically organization that participate in the summit. If you are interested in supporting the global summit, please contact Lorna.Alamri at owasp.org. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria:''' &lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board &lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee. &lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact Brad Causey or Jason Li. If you do not meet these criteria, and still feel that you should be sponsored, please contact Brad Causey or Jason Li. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Inside-venue2011.jpg&amp;diff=92062</id>
		<title>File:Inside-venue2011.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Inside-venue2011.jpg&amp;diff=92062"/>
				<updated>2010-10-28T02:01:11Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92061</id>
		<title>Summit 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92061"/>
				<updated>2010-10-28T02:00:25Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Summit Group 4.jpg|border|OWASP Summit 2008 in Portugal]] &lt;br /&gt;
&lt;br /&gt;
Dear OWASP Leaders and appsec community, &lt;br /&gt;
&lt;br /&gt;
January/February 2011 it's time for the Global OWASP Summit. The place where appsec experts meet, discuss, work, socialize, and set the roadmap for OWASP. &lt;br /&gt;
&lt;br /&gt;
=== The Summit Activates *You*  ===&lt;br /&gt;
&lt;br /&gt;
Whereas the OWASP AppSec conferences are great places to listen to interesting talks, go for training, and meet with OWASP people, the Global Summit is the place where we all sit down together and take the time to discuss and work out plans, projects and solutions for the appsec future. &lt;br /&gt;
&lt;br /&gt;
Examples of topics: &lt;br /&gt;
&lt;br /&gt;
*How should we support the OWASP projects? &lt;br /&gt;
*How can we work with browser vendors to enhance security (see &amp;quot;Browser Day&amp;quot; tab above)? &lt;br /&gt;
*How should the community reach out to developers and education institutions? &lt;br /&gt;
*How often should we publish the OWASP Top 10? &lt;br /&gt;
*How can OWASP support your chapter?&lt;br /&gt;
&lt;br /&gt;
=== Organizing Committee  ===&lt;br /&gt;
&lt;br /&gt;
A group of very experienced and passionate OWASPers have joined the organizing committee for Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
*Lorna Alamri &lt;br /&gt;
*Brad Causey &lt;br /&gt;
*Justin Clarke &lt;br /&gt;
*Paulo Coimbra &lt;br /&gt;
*Dinis Cruz &lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Dave Wichers &lt;br /&gt;
*John Wilander &lt;br /&gt;
*Jason Li &lt;br /&gt;
*Tara Causey &lt;br /&gt;
*Sarah Baso&lt;br /&gt;
&lt;br /&gt;
=== Who's Invited?  ===&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit, but we also welcome leading experts from industry and academia. Together we can create a more secure web. Check the &amp;quot;How Do I Join?&amp;quot; tab above for more info. &lt;br /&gt;
&lt;br /&gt;
==== Operational guidelines  ====&lt;br /&gt;
&lt;br /&gt;
Following the first meeting of the Summit 2011 Organizational team, here are the current proposed operational guidelines: &lt;br /&gt;
&lt;br /&gt;
#the summit is an annual event &lt;br /&gt;
#outside OWASP conference &lt;br /&gt;
#the summit should take place in January not later then begin of February &lt;br /&gt;
#the summit takes 3 to 4 days &lt;br /&gt;
#budget aim is US$ 150'000 US$ where 50'000 from OWASP and US$100'000 from sponsors &lt;br /&gt;
#attendees targets are: &lt;br /&gt;
##OWASP Funded: &lt;br /&gt;
###Board &lt;br /&gt;
###Committee Members &lt;br /&gt;
##Chapter / sponsor Funded: &lt;br /&gt;
###Chapter Leaders &lt;br /&gt;
##Project Leaders &lt;br /&gt;
#venue / location criteria (no decision on the venue) &lt;br /&gt;
##1 key organizer in close contact with the venue &lt;br /&gt;
##hosting 30 to 100 people &lt;br /&gt;
##US$2'000 a head (flight/accommodation/food/beers) &lt;br /&gt;
##conference facilities &lt;br /&gt;
###multiple meeting rooms &lt;br /&gt;
###one big meeting room e.g. auditorium &lt;br /&gt;
###hotel with the conference facilities or conference venue within walking distance &lt;br /&gt;
###apartments if possible (to share apartments/rooms and save money) &lt;br /&gt;
###4 to 5 star hotel &lt;br /&gt;
###local food supplier for apartment crashing &lt;br /&gt;
###has to be negotiated with the hotel &lt;br /&gt;
###max 50 km's form international airport &lt;br /&gt;
###sufficient Internet access!&lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP'''&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria: &lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board &lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee. &lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. If you do not meet these criteria, and still feel that you should be sponsored, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. &lt;br /&gt;
&lt;br /&gt;
'''Success factors (what indicates the summit as success)''' &lt;br /&gt;
&lt;br /&gt;
#break even &lt;br /&gt;
#the summits are the place to go to discus about and working on Web Application Security &lt;br /&gt;
#review of the past year &lt;br /&gt;
#working sessions on committees, projects and industry sectors (e.g. browsers and frameworks) &lt;br /&gt;
##universities / education sessions &lt;br /&gt;
##committee member election &lt;br /&gt;
##board election &lt;br /&gt;
##strategic OWASP issues &lt;br /&gt;
##road map and action plans for the next 12 month&lt;br /&gt;
&lt;br /&gt;
Other local Summit(s): &lt;br /&gt;
&lt;br /&gt;
*The conferences are free to organize small, conference bound summit &lt;br /&gt;
*this are not sponsored by OWASP of OWASP summit budget&lt;br /&gt;
&lt;br /&gt;
==== Browser Day!  ====&lt;br /&gt;
&lt;br /&gt;
One of the great challenges of application security is browser security. &lt;br /&gt;
&lt;br /&gt;
Therefore we will spend '''a full day working together with the leading browser vendors''' to penetrate current problems, new ideas, and how security fits in alongside other requirements from developers and endusers. &lt;br /&gt;
&lt;br /&gt;
Do not miss this chance to define what's important in browser security in the coming years. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the Browser Day. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== XSS Eradication  ====&lt;br /&gt;
&lt;br /&gt;
We will have a '''half day working session on Cross Site Scripting''' - specifically how OWASP can make 2011 the year of XSS... going away. How we help bring this about through contributing our knowledge to cornerstone projects, how we can raise the awareness through advocacy, and what we can do to ensure that OWASP and other freely available resources and made available to the wider community, and that they are aware of them. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the XSS session. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Outreach to frameworks/other constituent parties /Justin Clarke &lt;br /&gt;
*OWASP XSS Awareness resources and partner freely available resources /Justin Clarke &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== OWASP Projects  ====&lt;br /&gt;
&lt;br /&gt;
We will have a session on how OWASP should support, grow, and manage projects. This includes: &lt;br /&gt;
&lt;br /&gt;
*Assessment criteria &lt;br /&gt;
*Orphaned projects &lt;br /&gt;
*Funding &lt;br /&gt;
*Marketing &lt;br /&gt;
*Commercial services&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you have most probably seen some of the above topics discussed on the leaders list. Now is the time to boil down to consensus. &lt;br /&gt;
&lt;br /&gt;
==== OWASP Around the World  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is a fast growing global community. How should we support and manage this growth? During this session we'll look into issues of: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Internationalization Internationalization] &lt;br /&gt;
*The [http://www.owasp.org/index.php/OWASP_Jobs global job board] &lt;br /&gt;
*New OWASP chapters in parts of the world where we have not spread much yet&lt;br /&gt;
&lt;br /&gt;
==== More Topics  ====&lt;br /&gt;
&lt;br /&gt;
You know how OWASP works – it's all up to you. Please '''edit this tab and enter topics we should cover''' during the Global Summit 2011! If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Discussion on Douglas Crockford's bold statement that we should stop HTML5 development, fix XSS, and then start over. Is he right? How is OWASP active in the HTML5 development? Check [http://blip.tv/file/3755495 this webcast], jump to 20:50 to hear the XSS part. /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== How Do I Join? / Mailing list  ====&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit. &lt;br /&gt;
&lt;br /&gt;
The first thing to do is to join the [https://lists.owasp.org/mailman/listinfo/owasp-summit-2011 Summit 2011 mailing list]. &lt;br /&gt;
&lt;br /&gt;
On the mailing list you'll get first hand information on how to register, exact dates, updates to the agenda, funding for your trip etc. &lt;br /&gt;
&lt;br /&gt;
If you are a leading appsec expert from industry or academia but not yet an OWASP leader you can just contact John.Wilander at owasp.org and we'll try to get you in. &lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
It goes without saying – the summit is all about meeting people. So there will be a constant mixture of workshops, dinners, beers and wine. We like to think of the summit as a very social event in itself. &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
Hotel Quinta da Marinha Resort&lt;br /&gt;
&lt;br /&gt;
[[Image:2011venue.jpg]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Between city and nature, between the beach and the mountain, Hotel Quinta da Marinha Resort - located in the excellent area of Cascais / Sintra, a mere 25 km from Lisbon - is the perfect setting to feel like all your wishes always come true. Discover one of the finest Resorts in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
*Total Rooms: 11&lt;br /&gt;
*“All In One” with 474 m2&lt;br /&gt;
*Capacity for 450 persons&lt;br /&gt;
*Moveable walls in 4 rooms (“All in One”)&lt;br /&gt;
*Wireless Internet access in all rooms and public areas&lt;br /&gt;
*Available Av systems, top of the line, for rent&lt;br /&gt;
*9 rooms with natural light&lt;br /&gt;
*Air conditioning&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We will welcome a few sponsors of this very special event, typically organization that participate in the summit. If you are interested in supporting the global summit, please contact Lorna.Alamri at owasp.org. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria:''' &lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board &lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee. &lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact Brad Causey or Jason Li. If you do not meet these criteria, and still feel that you should be sponsored, please contact Brad Causey or Jason Li. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92060</id>
		<title>Summit 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92060"/>
				<updated>2010-10-28T01:56:23Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Summit Group 4.jpg|border|OWASP Summit 2008 in Portugal]] &lt;br /&gt;
&lt;br /&gt;
Dear OWASP Leaders and appsec community, &lt;br /&gt;
&lt;br /&gt;
January/February 2011 it's time for the Global OWASP Summit. The place where appsec experts meet, discuss, work, socialize, and set the roadmap for OWASP. &lt;br /&gt;
&lt;br /&gt;
=== The Summit Activates *You*  ===&lt;br /&gt;
&lt;br /&gt;
Whereas the OWASP AppSec conferences are great places to listen to interesting talks, go for training, and meet with OWASP people, the Global Summit is the place where we all sit down together and take the time to discuss and work out plans, projects and solutions for the appsec future. &lt;br /&gt;
&lt;br /&gt;
Examples of topics: &lt;br /&gt;
&lt;br /&gt;
*How should we support the OWASP projects? &lt;br /&gt;
*How can we work with browser vendors to enhance security (see &amp;quot;Browser Day&amp;quot; tab above)? &lt;br /&gt;
*How should the community reach out to developers and education institutions? &lt;br /&gt;
*How often should we publish the OWASP Top 10? &lt;br /&gt;
*How can OWASP support your chapter?&lt;br /&gt;
&lt;br /&gt;
=== Organizing Committee  ===&lt;br /&gt;
&lt;br /&gt;
A group of very experienced and passionate OWASPers have joined the organizing committee for Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
*Lorna Alamri &lt;br /&gt;
*Brad Causey &lt;br /&gt;
*Justin Clarke &lt;br /&gt;
*Paulo Coimbra &lt;br /&gt;
*Dinis Cruz &lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Dave Wichers &lt;br /&gt;
*John Wilander &lt;br /&gt;
*Jason Li &lt;br /&gt;
*Tara Causey &lt;br /&gt;
*Sarah Baso&lt;br /&gt;
&lt;br /&gt;
=== Who's Invited?  ===&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit, but we also welcome leading experts from industry and academia. Together we can create a more secure web. Check the &amp;quot;How Do I Join?&amp;quot; tab above for more info. &lt;br /&gt;
&lt;br /&gt;
==== Operational guidelines  ====&lt;br /&gt;
&lt;br /&gt;
Following the first meeting of the Summit 2011 Organizational team, here are the current proposed operational guidelines: &lt;br /&gt;
&lt;br /&gt;
#the summit is an annual event &lt;br /&gt;
#outside OWASP conference &lt;br /&gt;
#the summit should take place in January not later then begin of February &lt;br /&gt;
#the summit takes 3 to 4 days &lt;br /&gt;
#budget aim is US$ 150'000 US$ where 50'000 from OWASP and US$100'000 from sponsors &lt;br /&gt;
#attendees targets are: &lt;br /&gt;
##OWASP Funded: &lt;br /&gt;
###Board &lt;br /&gt;
###Committee Members &lt;br /&gt;
##Chapter / sponsor Funded: &lt;br /&gt;
###Chapter Leaders &lt;br /&gt;
##Project Leaders &lt;br /&gt;
#venue / location criteria (no decision on the venue) &lt;br /&gt;
##1 key organizer in close contact with the venue &lt;br /&gt;
##hosting 30 to 100 people &lt;br /&gt;
##US$2'000 a head (flight/accommodation/food/beers) &lt;br /&gt;
##conference facilities &lt;br /&gt;
###multiple meeting rooms &lt;br /&gt;
###one big meeting room e.g. auditorium &lt;br /&gt;
###hotel with the conference facilities or conference venue within walking distance &lt;br /&gt;
###apartments if possible (to share apartments/rooms and save money) &lt;br /&gt;
###4 to 5 star hotel &lt;br /&gt;
###local food supplier for apartment crashing &lt;br /&gt;
###has to be negotiated with the hotel &lt;br /&gt;
###max 50 km's form international airport &lt;br /&gt;
###sufficient Internet access!&lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP'''&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria: &lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board &lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee. &lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. If you do not meet these criteria, and still feel that you should be sponsored, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. &lt;br /&gt;
&lt;br /&gt;
'''Success factors (what indicates the summit as success)''' &lt;br /&gt;
&lt;br /&gt;
#break even &lt;br /&gt;
#the summits are the place to go to discus about and working on Web Application Security &lt;br /&gt;
#review of the past year &lt;br /&gt;
#working sessions on committees, projects and industry sectors (e.g. browsers and frameworks) &lt;br /&gt;
##universities / education sessions &lt;br /&gt;
##committee member election &lt;br /&gt;
##board election &lt;br /&gt;
##strategic OWASP issues &lt;br /&gt;
##road map and action plans for the next 12 month&lt;br /&gt;
&lt;br /&gt;
Other local Summit(s): &lt;br /&gt;
&lt;br /&gt;
*The conferences are free to organize small, conference bound summit &lt;br /&gt;
*this are not sponsored by OWASP of OWASP summit budget&lt;br /&gt;
&lt;br /&gt;
==== Browser Day!  ====&lt;br /&gt;
&lt;br /&gt;
One of the great challenges of application security is browser security. &lt;br /&gt;
&lt;br /&gt;
Therefore we will spend '''a full day working together with the leading browser vendors''' to penetrate current problems, new ideas, and how security fits in alongside other requirements from developers and endusers. &lt;br /&gt;
&lt;br /&gt;
Do not miss this chance to define what's important in browser security in the coming years. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the Browser Day. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== XSS Eradication  ====&lt;br /&gt;
&lt;br /&gt;
We will have a '''half day working session on Cross Site Scripting''' - specifically how OWASP can make 2011 the year of XSS... going away. How we help bring this about through contributing our knowledge to cornerstone projects, how we can raise the awareness through advocacy, and what we can do to ensure that OWASP and other freely available resources and made available to the wider community, and that they are aware of them. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the XSS session. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Outreach to frameworks/other constituent parties /Justin Clarke &lt;br /&gt;
*OWASP XSS Awareness resources and partner freely available resources /Justin Clarke &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== OWASP Projects  ====&lt;br /&gt;
&lt;br /&gt;
We will have a session on how OWASP should support, grow, and manage projects. This includes: &lt;br /&gt;
&lt;br /&gt;
*Assessment criteria &lt;br /&gt;
*Orphaned projects &lt;br /&gt;
*Funding &lt;br /&gt;
*Marketing &lt;br /&gt;
*Commercial services&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you have most probably seen some of the above topics discussed on the leaders list. Now is the time to boil down to consensus. &lt;br /&gt;
&lt;br /&gt;
==== OWASP Around the World  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is a fast growing global community. How should we support and manage this growth? During this session we'll look into issues of: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Internationalization Internationalization] &lt;br /&gt;
*The [http://www.owasp.org/index.php/OWASP_Jobs global job board] &lt;br /&gt;
*New OWASP chapters in parts of the world where we have not spread much yet&lt;br /&gt;
&lt;br /&gt;
==== More Topics  ====&lt;br /&gt;
&lt;br /&gt;
You know how OWASP works – it's all up to you. Please '''edit this tab and enter topics we should cover''' during the Global Summit 2011! If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Discussion on Douglas Crockford's bold statement that we should stop HTML5 development, fix XSS, and then start over. Is he right? How is OWASP active in the HTML5 development? Check [http://blip.tv/file/3755495 this webcast], jump to 20:50 to hear the XSS part. /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== How Do I Join? / Mailing list  ====&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit. &lt;br /&gt;
&lt;br /&gt;
The first thing to do is to join the [https://lists.owasp.org/mailman/listinfo/owasp-summit-2011 Summit 2011 mailing list]. &lt;br /&gt;
&lt;br /&gt;
On the mailing list you'll get first hand information on how to register, exact dates, updates to the agenda, funding for your trip etc. &lt;br /&gt;
&lt;br /&gt;
If you are a leading appsec expert from industry or academia but not yet an OWASP leader you can just contact John.Wilander at owasp.org and we'll try to get you in. &lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
It goes without saying – the summit is all about meeting people. So there will be a constant mixture of workshops, dinners, beers and wine. We like to think of the summit as a very social event in itself. &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:2011venue.jpg]]&lt;br /&gt;
&lt;br /&gt;
We are currently checking out three locations discussing prices and space for all our activities. Check the &amp;quot;How Do I Join?&amp;quot; tab on how to get the latest info in your inbox. &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We will welcome a few sponsors of this very special event, typically organization that participate in the summit. If you are interested in supporting the global summit, please contact Lorna.Alamri at owasp.org. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria:''' &lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board &lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee. &lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact Brad Causey or Jason Li. If you do not meet these criteria, and still feel that you should be sponsored, please contact Brad Causey or Jason Li. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:2011venue.jpg&amp;diff=92059</id>
		<title>File:2011venue.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:2011venue.jpg&amp;diff=92059"/>
				<updated>2010-10-28T01:55:00Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92058</id>
		<title>Summit 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92058"/>
				<updated>2010-10-28T01:46:43Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Summit Group 4.jpg|border|OWASP Summit 2008 in Portugal]] &lt;br /&gt;
&lt;br /&gt;
Dear OWASP Leaders and appsec community, &lt;br /&gt;
&lt;br /&gt;
January/February 2011 it's time for the Global OWASP Summit. The place where appsec experts meet, discuss, work, socialize, and set the roadmap for OWASP. &lt;br /&gt;
&lt;br /&gt;
=== The Summit Activates *You*  ===&lt;br /&gt;
&lt;br /&gt;
Whereas the OWASP AppSec conferences are great places to listen to interesting talks, go for training, and meet with OWASP people, the Global Summit is the place where we all sit down together and take the time to discuss and work out plans, projects and solutions for the appsec future. &lt;br /&gt;
&lt;br /&gt;
Examples of topics: &lt;br /&gt;
&lt;br /&gt;
*How should we support the OWASP projects? &lt;br /&gt;
*How can we work with browser vendors to enhance security (see &amp;quot;Browser Day&amp;quot; tab above)? &lt;br /&gt;
*How should the community reach out to developers and education institutions? &lt;br /&gt;
*How often should we publish the OWASP Top 10? &lt;br /&gt;
*How can OWASP support your chapter?&lt;br /&gt;
&lt;br /&gt;
=== Organizing Committee  ===&lt;br /&gt;
&lt;br /&gt;
A group of very experienced and passionate OWASPers have joined the organizing committee for Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
*Lorna Alamri &lt;br /&gt;
*Brad Causey &lt;br /&gt;
*Justin Clarke &lt;br /&gt;
*Paulo Coimbra &lt;br /&gt;
*Dinis Cruz &lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Dave Wichers &lt;br /&gt;
*John Wilander &lt;br /&gt;
*Jason Li &lt;br /&gt;
*Tara Causey &lt;br /&gt;
*Sarah Baso&lt;br /&gt;
&lt;br /&gt;
=== Who's Invited?  ===&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit, but we also welcome leading experts from industry and academia. Together we can create a more secure web. Check the &amp;quot;How Do I Join?&amp;quot; tab above for more info. &lt;br /&gt;
&lt;br /&gt;
==== Operational guidelines  ====&lt;br /&gt;
&lt;br /&gt;
Following the first meeting of the Summit 2011 Organizational team, here are the current proposed operational guidelines: &lt;br /&gt;
&lt;br /&gt;
#the summit is an annual event &lt;br /&gt;
#outside OWASP conference &lt;br /&gt;
#the summit should take place in January not later then begin of February &lt;br /&gt;
#the summit takes 3 to 4 days &lt;br /&gt;
#budget aim is US$ 150'000 US$ where 50'000 from OWASP and US$100'000 from sponsors &lt;br /&gt;
#attendees targets are: &lt;br /&gt;
##OWASP Funded: &lt;br /&gt;
###Board &lt;br /&gt;
###Committee Members &lt;br /&gt;
##Chapter / sponsor Funded: &lt;br /&gt;
###Chapter Leaders &lt;br /&gt;
##Project Leaders &lt;br /&gt;
#venue / location criteria (no decision on the venue) &lt;br /&gt;
##1 key organizer in close contact with the venue &lt;br /&gt;
##hosting 30 to 100 people &lt;br /&gt;
##US$2'000 a head (flight/accommodation/food/beers) &lt;br /&gt;
##conference facilities &lt;br /&gt;
###multiple meeting rooms &lt;br /&gt;
###one big meeting room e.g. auditorium &lt;br /&gt;
###hotel with the conference facilities or conference venue within walking distance &lt;br /&gt;
###apartments if possible (to share apartments/rooms and save money) &lt;br /&gt;
###4 to 5 star hotel &lt;br /&gt;
###local food supplier for apartment crashing &lt;br /&gt;
###has to be negotiated with the hotel &lt;br /&gt;
###max 50 km's form international airport &lt;br /&gt;
###sufficient Internet access!&lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP'''&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria: &lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board &lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee. &lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. If you do not meet these criteria, and still feel that you should be sponsored, please contact [[Bradcausey@owasp.org|Brad Causey]] or [[Jasonli@owasp.org|Jason Li]]. &lt;br /&gt;
&lt;br /&gt;
'''Success factors (what indicates the summit as success)''' &lt;br /&gt;
&lt;br /&gt;
#break even &lt;br /&gt;
#the summits are the place to go to discus about and working on Web Application Security &lt;br /&gt;
#review of the past year &lt;br /&gt;
#working sessions on committees, projects and industry sectors (e.g. browsers and frameworks) &lt;br /&gt;
##universities / education sessions &lt;br /&gt;
##committee member election &lt;br /&gt;
##board election &lt;br /&gt;
##strategic OWASP issues &lt;br /&gt;
##road map and action plans for the next 12 month&lt;br /&gt;
&lt;br /&gt;
Other local Summit(s): &lt;br /&gt;
&lt;br /&gt;
*The conferences are free to organize small, conference bound summit &lt;br /&gt;
*this are not sponsored by OWASP of OWASP summit budget&lt;br /&gt;
&lt;br /&gt;
==== Browser Day!  ====&lt;br /&gt;
&lt;br /&gt;
One of the great challenges of application security is browser security. &lt;br /&gt;
&lt;br /&gt;
Therefore we will spend '''a full day working together with the leading browser vendors''' to penetrate current problems, new ideas, and how security fits in alongside other requirements from developers and endusers. &lt;br /&gt;
&lt;br /&gt;
Do not miss this chance to define what's important in browser security in the coming years. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the Browser Day. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== XSS Eradication  ====&lt;br /&gt;
&lt;br /&gt;
We will have a '''half day working session on Cross Site Scripting''' - specifically how OWASP can make 2011 the year of XSS... going away. How we help bring this about through contributing our knowledge to cornerstone projects, how we can raise the awareness through advocacy, and what we can do to ensure that OWASP and other freely available resources and made available to the wider community, and that they are aware of them. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the XSS session. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Outreach to frameworks/other constituent parties /Justin Clarke &lt;br /&gt;
*OWASP XSS Awareness resources and partner freely available resources /Justin Clarke &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== OWASP Projects  ====&lt;br /&gt;
&lt;br /&gt;
We will have a session on how OWASP should support, grow, and manage projects. This includes: &lt;br /&gt;
&lt;br /&gt;
*Assessment criteria &lt;br /&gt;
*Orphaned projects &lt;br /&gt;
*Funding &lt;br /&gt;
*Marketing &lt;br /&gt;
*Commercial services&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you have most probably seen some of the above topics discussed on the leaders list. Now is the time to boil down to consensus. &lt;br /&gt;
&lt;br /&gt;
==== OWASP Around the World  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is a fast growing global community. How should we support and manage this growth? During this session we'll look into issues of: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Internationalization Internationalization] &lt;br /&gt;
*The [http://www.owasp.org/index.php/OWASP_Jobs global job board] &lt;br /&gt;
*New OWASP chapters in parts of the world where we have not spread much yet&lt;br /&gt;
&lt;br /&gt;
==== More Topics  ====&lt;br /&gt;
&lt;br /&gt;
You know how OWASP works – it's all up to you. Please '''edit this tab and enter topics we should cover''' during the Global Summit 2011! If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Discussion on Douglas Crockford's bold statement that we should stop HTML5 development, fix XSS, and then start over. Is he right? How is OWASP active in the HTML5 development? Check [http://blip.tv/file/3755495 this webcast], jump to 20:50 to hear the XSS part. /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== How Do I Join? / Mailing list  ====&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit. &lt;br /&gt;
&lt;br /&gt;
The first thing to do is to join the [https://lists.owasp.org/mailman/listinfo/owasp-summit-2011 Summit 2011 mailing list]. &lt;br /&gt;
&lt;br /&gt;
On the mailing list you'll get first hand information on how to register, exact dates, updates to the agenda, funding for your trip etc. &lt;br /&gt;
&lt;br /&gt;
If you are a leading appsec expert from industry or academia but not yet an OWASP leader you can just contact John.Wilander at owasp.org and we'll try to get you in. &lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
It goes without saying – the summit is all about meeting people. So there will be a constant mixture of workshops, dinners, beers and wine. We like to think of the summit as a very social event in itself. &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
We are currently checking out three locations discussing prices and space for all our activities. Check the &amp;quot;How Do I Join?&amp;quot; tab on how to get the latest info in your inbox. &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We will welcome a few sponsors of this very special event, typically organization that participate in the summit. If you are interested in supporting the global summit, please contact Lorna.Alamri at owasp.org. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria:&lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board&lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee.&lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact Brad Causey or Jason Li. If you do not meet these criteria, and still feel that you should be sponsored, please contact Brad Causey or Jason Li.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92057</id>
		<title>Summit 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92057"/>
				<updated>2010-10-28T01:45:08Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Summit Group 4.jpg|border|OWASP Summit 2008 in Portugal]] &lt;br /&gt;
&lt;br /&gt;
Dear OWASP Leaders and appsec community, &lt;br /&gt;
&lt;br /&gt;
January/February 2011 it's time for the Global OWASP Summit. The place where appsec experts meet, discuss, work, socialize, and set the roadmap for OWASP. &lt;br /&gt;
&lt;br /&gt;
=== The Summit Activates *You*  ===&lt;br /&gt;
&lt;br /&gt;
Whereas the OWASP AppSec conferences are great places to listen to interesting talks, go for training, and meet with OWASP people, the Global Summit is the place where we all sit down together and take the time to discuss and work out plans, projects and solutions for the appsec future. &lt;br /&gt;
&lt;br /&gt;
Examples of topics: &lt;br /&gt;
&lt;br /&gt;
*How should we support the OWASP projects? &lt;br /&gt;
*How can we work with browser vendors to enhance security (see &amp;quot;Browser Day&amp;quot; tab above)? &lt;br /&gt;
*How should the community reach out to developers and education institutions? &lt;br /&gt;
*How often should we publish the OWASP Top 10? &lt;br /&gt;
*How can OWASP support your chapter?&lt;br /&gt;
&lt;br /&gt;
=== Organizing Committee  ===&lt;br /&gt;
&lt;br /&gt;
A group of very experienced and passionate OWASPers have joined the organizing committee for Global Summit 2011. &lt;br /&gt;
&lt;br /&gt;
*Lorna Alamri &lt;br /&gt;
*Brad Causey &lt;br /&gt;
*Justin Clarke &lt;br /&gt;
*Paulo Coimbra &lt;br /&gt;
*Dinis Cruz &lt;br /&gt;
*Martin Knobloch &lt;br /&gt;
*Dave Wichers &lt;br /&gt;
*John Wilander &lt;br /&gt;
*Jason Li &lt;br /&gt;
*Tara Causey &lt;br /&gt;
*Sarah Baso&lt;br /&gt;
&lt;br /&gt;
=== Who's Invited?  ===&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit, but we also welcome leading experts from industry and academia. Together we can create a more secure web. Check the &amp;quot;How Do I Join?&amp;quot; tab above for more info. &lt;br /&gt;
&lt;br /&gt;
==== Operational guidelines ====&lt;br /&gt;
&lt;br /&gt;
Following the first meeting of the Summit 2011 Organizational team, here are the current proposed operational guidelines: &lt;br /&gt;
&lt;br /&gt;
#the summit is an annual event &lt;br /&gt;
#outside OWASP conference &lt;br /&gt;
#the summit should take place in January not later then begin of February &lt;br /&gt;
#the summit takes 3 to 4 days &lt;br /&gt;
#budget aim is US$ 150'000 US$ where 50'000 from OWASP and US$100'000 from sponsors &lt;br /&gt;
#attendees targets are: &lt;br /&gt;
##OWASP Funded: &lt;br /&gt;
###Board &lt;br /&gt;
###Committee Members &lt;br /&gt;
##Chapter / sponsor Funded: &lt;br /&gt;
###Chapter Leaders &lt;br /&gt;
##Project Leaders &lt;br /&gt;
#venue / location criteria (no decision on the venue) &lt;br /&gt;
##1 key organizer in close contact with the venue &lt;br /&gt;
##hosting 30 to 100 people &lt;br /&gt;
##US$2'000 a head (flight/accommodation/food/beers) &lt;br /&gt;
##conference facilities &lt;br /&gt;
###multiple meeting rooms &lt;br /&gt;
###one big meeting room e.g. auditorium &lt;br /&gt;
###hotel with the conference facilities or conference venue within walking distance &lt;br /&gt;
###apartments if possible (to share apartments/rooms and save money) &lt;br /&gt;
###4 to 5 star hotel &lt;br /&gt;
###local food supplier for apartment crashing &lt;br /&gt;
###has to be negotiated with the hotel &lt;br /&gt;
###max 50 km's form international airport &lt;br /&gt;
###sufficient Internet access!&lt;br /&gt;
&lt;br /&gt;
'''Attendees that qualify to be sponsored by OWASP'''&amp;lt;br&amp;gt;Some leaders that are active within OWASP may qualify to have all or partial transportation and lodging paid for by OWASP.&amp;lt;br&amp;gt;To be considered for qualification, you must meet one or more of the following criteria:&lt;br /&gt;
&lt;br /&gt;
#Member of the OWASP Board&lt;br /&gt;
#Member of a global committee that has been active in the last 6 months. This will be verified by the leader(s) of the committee.&lt;br /&gt;
#Key personnel that are integral to the operation of the summit&lt;br /&gt;
&lt;br /&gt;
If you feel you might qualify, please contact [[bradcausey@owasp.org|Brad Causey]] or [[jasonli@owasp.org|Jason Li]]. If you do not meet these criteria, and still feel that you should be sponsored, please contact [[bradcausey@owasp.org|Brad Causey]] or [[jasonli@owasp.org|Jason Li]].&lt;br /&gt;
&lt;br /&gt;
'''Success factors (what indicates the summit as success)''' &lt;br /&gt;
&lt;br /&gt;
#break even &lt;br /&gt;
#the summits are the place to go to discus about and working on Web Application Security &lt;br /&gt;
#review of the past year &lt;br /&gt;
#working sessions on committees, projects and industry sectors (e.g. browsers and frameworks) &lt;br /&gt;
##universities / education sessions &lt;br /&gt;
##committee member election &lt;br /&gt;
##board election &lt;br /&gt;
##strategic OWASP issues &lt;br /&gt;
##road map and action plans for the next 12 month&lt;br /&gt;
&lt;br /&gt;
Other local Summit(s): &lt;br /&gt;
&lt;br /&gt;
*The conferences are free to organize small, conference bound summit &lt;br /&gt;
*this are not sponsored by OWASP of OWASP summit budget&lt;br /&gt;
&lt;br /&gt;
==== Browser Day!  ====&lt;br /&gt;
&lt;br /&gt;
One of the great challenges of application security is browser security. &lt;br /&gt;
&lt;br /&gt;
Therefore we will spend '''a full day working together with the leading browser vendors''' to penetrate current problems, new ideas, and how security fits in alongside other requirements from developers and endusers. &lt;br /&gt;
&lt;br /&gt;
Do not miss this chance to define what's important in browser security in the coming years. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the Browser Day. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== XSS Eradication  ====&lt;br /&gt;
&lt;br /&gt;
We will have a '''half day working session on Cross Site Scripting''' - specifically how OWASP can make 2011 the year of XSS... going away. How we help bring this about through contributing our knowledge to cornerstone projects, how we can raise the awareness through advocacy, and what we can do to ensure that OWASP and other freely available resources and made available to the wider community, and that they are aware of them. &lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the XSS session. If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Outreach to frameworks/other constituent parties /Justin Clarke &lt;br /&gt;
*OWASP XSS Awareness resources and partner freely available resources /Justin Clarke &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== OWASP Projects  ====&lt;br /&gt;
&lt;br /&gt;
We will have a session on how OWASP should support, grow, and manage projects. This includes: &lt;br /&gt;
&lt;br /&gt;
*Assessment criteria &lt;br /&gt;
*Orphaned projects &lt;br /&gt;
*Funding &lt;br /&gt;
*Marketing &lt;br /&gt;
*Commercial services&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you have most probably seen some of the above topics discussed on the leaders list. Now is the time to boil down to consensus. &lt;br /&gt;
&lt;br /&gt;
==== OWASP Around the World  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is a fast growing global community. How should we support and manage this growth? During this session we'll look into issues of: &lt;br /&gt;
&lt;br /&gt;
*[http://www.owasp.org/index.php/OWASP_Internationalization Internationalization] &lt;br /&gt;
*The [http://www.owasp.org/index.php/OWASP_Jobs global job board] &lt;br /&gt;
*New OWASP chapters in parts of the world where we have not spread much yet&lt;br /&gt;
&lt;br /&gt;
==== More Topics  ====&lt;br /&gt;
&lt;br /&gt;
You know how OWASP works – it's all up to you. Please '''edit this tab and enter topics we should cover''' during the Global Summit 2011! If you want you can add your name after each suggestion and we can work out the details with you. &lt;br /&gt;
&lt;br /&gt;
*Discussion on Douglas Crockford's bold statement that we should stop HTML5 development, fix XSS, and then start over. Is he right? How is OWASP active in the HTML5 development? Check [http://blip.tv/file/3755495 this webcast], jump to 20:50 to hear the XSS part. /John Wilander &lt;br /&gt;
*[Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== How Do I Join? / Mailing list  ====&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit. &lt;br /&gt;
&lt;br /&gt;
The first thing to do is to join the [https://lists.owasp.org/mailman/listinfo/owasp-summit-2011 Summit 2011 mailing list]. &lt;br /&gt;
&lt;br /&gt;
On the mailing list you'll get first hand information on how to register, exact dates, updates to the agenda, funding for your trip etc. &lt;br /&gt;
&lt;br /&gt;
If you are a leading appsec expert from industry or academia but not yet an OWASP leader you can just contact John.Wilander at owasp.org and we'll try to get you in. &lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
It goes without saying – the summit is all about meeting people. So there will be a constant mixture of workshops, dinners, beers and wine. We like to think of the summit as a very social event in itself. &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
We are currently checking out three locations discussing prices and space for all our activities. Check the &amp;quot;How Do I Join?&amp;quot; tab on how to get the latest info in your inbox. &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We will welcome a few sponsors of this very special event, typically organization that participate in the summit. If you are interested in supporting the global summit, please contact Lorna.Alamri at owasp.org. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92056</id>
		<title>Summit 2011</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Summit_2011&amp;diff=92056"/>
				<updated>2010-10-28T01:33:34Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Organizing Committee */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:Summit Group 4.jpg|border|OWASP Summit 2008 in Portugal]]&lt;br /&gt;
&lt;br /&gt;
Dear OWASP Leaders and appsec community,&lt;br /&gt;
&lt;br /&gt;
January/February 2011 it's time for the Global OWASP Summit. The place where appsec experts meet, discuss, work, socialize, and set the roadmap for OWASP.&lt;br /&gt;
&lt;br /&gt;
=== The Summit Activates *You* ===&lt;br /&gt;
&lt;br /&gt;
Whereas the OWASP AppSec conferences are great places to listen to interesting talks, go for training, and meet with OWASP people, the Global Summit is the place where we all sit down together and take the time to discuss and work out plans, projects and solutions for the appsec future.&lt;br /&gt;
&lt;br /&gt;
Examples of topics:&lt;br /&gt;
* How should we support the OWASP projects?&lt;br /&gt;
* How can we work with browser vendors to enhance security (see &amp;quot;Browser Day&amp;quot; tab above)?&lt;br /&gt;
* How should the community reach out to developers and education institutions?&lt;br /&gt;
* How often should we publish the OWASP Top 10?&lt;br /&gt;
* How can OWASP support your chapter?&lt;br /&gt;
&lt;br /&gt;
=== Organizing Committee  ===&lt;br /&gt;
&lt;br /&gt;
A group of very experienced and passionate OWASPers have joined the organizing committee for Global Summit 2011.&lt;br /&gt;
&lt;br /&gt;
* Lorna Alamri&lt;br /&gt;
* Brad Causey&lt;br /&gt;
* Justin Clarke&lt;br /&gt;
* Paulo Coimbra&lt;br /&gt;
* Dinis Cruz&lt;br /&gt;
* Martin Knobloch&lt;br /&gt;
* Dave Wichers&lt;br /&gt;
* John Wilander&lt;br /&gt;
* Jason Li&lt;br /&gt;
* Tara Causey&lt;br /&gt;
* Sarah Baso&lt;br /&gt;
&lt;br /&gt;
=== Who's Invited?  ===&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit, but we also welcome leading experts from industry and academia. Together we can create a more secure web. Check the &amp;quot;How Do I Join?&amp;quot; tab above for more info.&lt;br /&gt;
&lt;br /&gt;
====Operational guidelines====&lt;br /&gt;
&lt;br /&gt;
Following the first meeting of the Summit 2011 Organizational team, here are the current proposed operational guidelines:&lt;br /&gt;
&lt;br /&gt;
# the summit is an annual event&lt;br /&gt;
# outside OWASP conference&lt;br /&gt;
# the summit should take place in January not later then begin of February&lt;br /&gt;
# the summit takes 3 to 4 days&lt;br /&gt;
# budget aim is US$ 150'000 US$ where 50'000 from OWASP and US$100'000 from sponsors&lt;br /&gt;
# attendees targets are:&lt;br /&gt;
## OWASP Funded:&lt;br /&gt;
###  Board&lt;br /&gt;
### Committee Members&lt;br /&gt;
## Chapter / sponsor Funded:&lt;br /&gt;
### Chapter Leaders&lt;br /&gt;
## Project Leaders&lt;br /&gt;
# venue / location criteria (no decision on the venue)&lt;br /&gt;
## 1 key organizer in close contact with the venue&lt;br /&gt;
##  hosting 30 to 100 people &lt;br /&gt;
##  US$2'000 a head (flight/accommodation/food/beers)&lt;br /&gt;
##  conference facilities&lt;br /&gt;
###  multiple meeting rooms&lt;br /&gt;
### one big meeting room e.g. auditorium&lt;br /&gt;
### hotel with the conference facilities or conference venue within walking distance&lt;br /&gt;
### apartments if possible (to share apartments/rooms and save money)&lt;br /&gt;
### 4 to 5 star hotel&lt;br /&gt;
### local food supplier for apartment crashing&lt;br /&gt;
### has to be negotiated with the hotel&lt;br /&gt;
### max 50 km's form international airport&lt;br /&gt;
### sufficient Internet access!&lt;br /&gt;
  &lt;br /&gt;
'''Success factors (what indicates the summit as success)'''&lt;br /&gt;
# break even&lt;br /&gt;
# the summits are the place to go to discus about and working on Web Application Security&lt;br /&gt;
# review of the past year&lt;br /&gt;
# working sessions on committees, projects and industry sectors (e.g. browsers and frameworks)&lt;br /&gt;
## universities / education sessions&lt;br /&gt;
## committee member election&lt;br /&gt;
## board election&lt;br /&gt;
## strategic OWASP issues&lt;br /&gt;
## road map and action plans for the next 12 month&lt;br /&gt;
&lt;br /&gt;
Other local Summit(s):&lt;br /&gt;
* The conferences are free to organize small, conference bound summit&lt;br /&gt;
* this are not sponsored by OWASP of OWASP summit budget &lt;br /&gt;
&lt;br /&gt;
==== Browser Day!  ====&lt;br /&gt;
&lt;br /&gt;
One of the great challenges of application security is browser security.&lt;br /&gt;
&lt;br /&gt;
Therefore we will spend '''a full day working together with the leading browser vendors''' to penetrate current problems, new ideas, and how security fits in alongside other requirements from developers and endusers.&lt;br /&gt;
&lt;br /&gt;
Do not miss this chance to define what's important in browser security in the coming years.&lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the Browser Day. If you want you can add your name after each suggestion and we can work out the details with you.&lt;br /&gt;
&lt;br /&gt;
* How should browsers signal invalid SSL certs to the enduser? Are we helping security right now? /John Wilander&lt;br /&gt;
* [Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== XSS Eradication ====&lt;br /&gt;
&lt;br /&gt;
We will have a '''half day working session on Cross Site Scripting''' - specifically how OWASP can make 2011 the year of XSS... going away. How we help bring this about through contributing our knowledge to cornerstone projects, how we can raise the awareness through advocacy, and what we can do to ensure that OWASP and other freely available resources and made available to the wider community, and that they are aware of them.&lt;br /&gt;
&lt;br /&gt;
=== Agenda  ===&lt;br /&gt;
&lt;br /&gt;
Please '''edit this tab and enter topics we should cover''' during the XSS session. If you want you can add your name after each suggestion and we can work out the details with you.&lt;br /&gt;
&lt;br /&gt;
* Outreach to frameworks/other constituent parties /Justin Clarke&lt;br /&gt;
* OWASP XSS Awareness resources and partner freely available resources /Justin Clarke&lt;br /&gt;
* [Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== OWASP Projects ====&lt;br /&gt;
&lt;br /&gt;
We will have a session on how OWASP should support, grow, and manage projects. This includes:&lt;br /&gt;
* Assessment criteria&lt;br /&gt;
* Orphaned projects&lt;br /&gt;
* Funding&lt;br /&gt;
* Marketing&lt;br /&gt;
* Commercial services&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you have most probably seen some of the above topics discussed on the leaders list. Now is the time to boil down to consensus.&lt;br /&gt;
&lt;br /&gt;
==== OWASP Around the World  ====&lt;br /&gt;
&lt;br /&gt;
OWASP is a fast growing global community. How should we support and manage this growth? During this session we'll look into issues of:&lt;br /&gt;
* [http://www.owasp.org/index.php/OWASP_Internationalization Internationalization]&lt;br /&gt;
* The [http://www.owasp.org/index.php/OWASP_Jobs global job board]&lt;br /&gt;
* New OWASP chapters in parts of the world where we have not spread much yet&lt;br /&gt;
&lt;br /&gt;
==== More Topics ====&lt;br /&gt;
&lt;br /&gt;
You know how OWASP works – it's all up to you. Please '''edit this tab and enter topics we should cover''' during the Global Summit 2011! If you want you can add your name after each suggestion and we can work out the details with you.&lt;br /&gt;
&lt;br /&gt;
* Discussion on Douglas Crockford's bold statement that we should stop HTML5 development, fix XSS, and then start over. Is he right? How is OWASP active in the HTML5 development? Check [http://blip.tv/file/3755495 this webcast], jump to 20:50 to hear the XSS part. /John Wilander&lt;br /&gt;
* [Your topic here]&lt;br /&gt;
&lt;br /&gt;
==== How Do I Join? / Mailing list ====&lt;br /&gt;
&lt;br /&gt;
As an OWASP leader you are automatically invited to the summit.&lt;br /&gt;
&lt;br /&gt;
The first thing to do is to join the [https://lists.owasp.org/mailman/listinfo/owasp-summit-2011 Summit 2011 mailing list].&lt;br /&gt;
&lt;br /&gt;
On the mailing list you'll get first hand information on how to register, exact dates, updates to the agenda, funding for your trip etc.&lt;br /&gt;
&lt;br /&gt;
If you are a leading appsec expert from industry or academia but not yet an OWASP leader you can just contact John.Wilander at owasp.org and we'll try to get you in.&lt;br /&gt;
&lt;br /&gt;
==== Social Events  ====&lt;br /&gt;
&lt;br /&gt;
It goes without saying – the summit is all about meeting people. So there will be a constant mixture of workshops, dinners, beers and wine. We like to think of the summit as a very social event in itself.&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
We are currently checking out three locations discussing prices and space for all our activities. Check the &amp;quot;How Do I Join?&amp;quot; tab on how to get the latest info in your inbox.&lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
We will welcome a few sponsors of this very special event, typically organization that participate in the summit. If you are interested in supporting the global summit, please contact Lorna.Alamri at owasp.org.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Alabama&amp;diff=89208</id>
		<title>Alabama</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Alabama&amp;diff=89208"/>
				<updated>2010-09-13T18:21:26Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Alabama|extra=The chapter President is [mailto:bradcausey@gmail.com Brad Causey] and the VP is [mailto:daniel.clemens@packetninjas.net Daniel Clemens]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Alabama|emailarchives=http://lists.owasp.org/pipermail/owasp-Alabama}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;paypal&amp;gt;Alabama&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location''' We are currently meeting at: &lt;br /&gt;
&lt;br /&gt;
15 20th Street South in Birmingham in the 'Birmingham Room' every third Thursday of the month. We typically meet from 8-12 with the main presentation from 9-11 Breakfast will typically be provided, when I can afford to buy it. =) &lt;br /&gt;
&lt;br /&gt;
http://maps.google.com/maps?hl=en&amp;amp;amp;q=15%2020th%20Street%20South%2C%20Birmingham%2C%20AL &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings. &lt;br /&gt;
&lt;br /&gt;
Recent Presentations:&lt;br /&gt;
&lt;br /&gt;
Fuzzing with JBroFuzz by Matt Tesauro  [[Image:Alabama Chapter-HTTP Fuzzing.pdf]]&lt;br /&gt;
&lt;br /&gt;
Overview of Skipfish by Brad Causey [[Image:Alabama_Chapter-skipfish.pdf]]&lt;br /&gt;
==== Alabama OWASP Chapter Leaders  ====&lt;br /&gt;
Brad Causey&lt;br /&gt;
Daniel Clemens&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide/Releases/SCP_v1/Assessment&amp;diff=88891</id>
		<title>Projects/OWASP Secure Coding Practices - Quick Reference Guide/Releases/SCP v1/Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide/Releases/SCP_v1/Assessment&amp;diff=88891"/>
				<updated>2010-09-09T01:16:22Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Second Reviewer */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:OWASP Secure Coding Practices - Quick Reference Guide|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the [[:OWASP Secure Coding Practices - Quick Reference Guide|OWASP Secure Coding Practices - Quick Reference Guide]] - [[Projects/OWASP Secure Coding Practices - Quick Reference Guide/Releases/SCP v1|Version 1.0]] Release ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
&lt;br /&gt;
'''''[[user:Keith Turpin|Keith Turpin]]'s Pre-Assessment Check-list:'''''&lt;br /&gt;
&lt;br /&gt;
==Project Leader review==&lt;br /&gt;
&lt;br /&gt;
{{ Template:Pre-Assessment Questions - Documents&lt;br /&gt;
&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= answer 1&lt;br /&gt;
&lt;br /&gt;
| 2. Is your document licensed under a free and open license? (see Project Licensing section of the [http://www.owasp.org/index.php/Guidelines_for_OWASP_Projects Guidelines for OWASP Projects]) Please point out the link(s).&lt;br /&gt;
= answer 2&lt;br /&gt;
&lt;br /&gt;
| 3. Is the document available as a PDF (Portable Document Format) and an editable (.Doc) format on the project site? Please point out the link(s).&lt;br /&gt;
= answer 3&lt;br /&gt;
&lt;br /&gt;
| 4. Are all articles that constitute the project release properly tagged within project category and available from main project Wiki page? Please point out the link(s).&lt;br /&gt;
= answer 4&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? Please point out the link(s).&lt;br /&gt;
= answer 5&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= answer 6&lt;br /&gt;
&lt;br /&gt;
| 7. Are all document contents (articles) present and listed on the OWASP project wiki page? Please point out the link(s).&lt;br /&gt;
= answer 7&lt;br /&gt;
&lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? Please point out the link(s).&lt;br /&gt;
= answer 8&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an “About This Document” section in the document listing:&lt;br /&gt;
= answer 9&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository?&lt;br /&gt;
= answer 10&lt;br /&gt;
&lt;br /&gt;
| 11. Are the Alpha and Beta pre-assessment items complete?&lt;br /&gt;
= answer 11&lt;br /&gt;
&lt;br /&gt;
| 12. Have any limitations been documented? Please point out the link(s).&lt;br /&gt;
= answer 12&lt;br /&gt;
&lt;br /&gt;
| 13. Does the document consider [http://www.owasp.org/index.php/OWASP_Writing_Style OWASP Writing Style] and [http://www.owasp.org/index.php/OWASP_Template_Document OWASP Template for Docs]? Please point out the link(s)&lt;br /&gt;
= answer 13&lt;br /&gt;
&lt;br /&gt;
| 14. Is there a one sheet overview document about the project release? Please point out the link(s).&lt;br /&gt;
= answer 14&lt;br /&gt;
&lt;br /&gt;
| 15. Is the document in a format which can be converted to an OWASP book?  (books are currently via Lulu.com) Please point out the link(s).&lt;br /&gt;
= answer 15&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
&lt;br /&gt;
'''''[[user:Ludovic Petit|Ludovic Petit]]'s Review:'''''&lt;br /&gt;
&lt;br /&gt;
== First Reviewer ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ :Template:Assessment Questions - Documents&lt;br /&gt;
&lt;br /&gt;
| 1. Does the document consider the [http://www.owasp.org/index.php/OWASP_Writing_Style OWASP Writing Style]?&lt;br /&gt;
= answer 1&lt;br /&gt;
Yes, but text has to be justified for a more relevant presentation.&lt;br /&gt;
&lt;br /&gt;
May I also suggest the following? &lt;br /&gt;
I fully understand – and I agree with - the aim of a Quick Reference Guide, however in my view, 2 options could be studied:&lt;br /&gt;
&lt;br /&gt;
The 1st one is to let pages 1, 2 and 3 as this.&lt;br /&gt;
&lt;br /&gt;
The 2nd one could be:&lt;br /&gt;
Just have the logo, Title and Copyright on page 1&lt;br /&gt;
Table of Contents on page 2&lt;br /&gt;
And Introduction on page 3&lt;br /&gt;
&lt;br /&gt;
this because at a first look, having the Table of Contents on page 2 after the Intro do not ‘seem’ to be coherent (due to the fact that generally, we have the habit to have a Table of Contents before an Intro of a subject).&lt;br /&gt;
&lt;br /&gt;
It’s just a suggestion anyway.&lt;br /&gt;
&lt;br /&gt;
| 2. Do contents from wiki articles match download-able documents? (PDF and .doc versions)&lt;br /&gt;
= answer 2&lt;br /&gt;
Yes&lt;br /&gt;
&lt;br /&gt;
| 3. Does the document have an “About This Document” section which allows the end user to get an overview of the state of the document?&lt;br /&gt;
= answer 3&lt;br /&gt;
Yes&lt;br /&gt;
&lt;br /&gt;
| 4. How completely does the release address the goal of the project? Is the overall document complete in structure and organization? Are any missing or incomplete sections critical enough to keep the document at an Alpha quality level?&lt;br /&gt;
= answer 4&lt;br /&gt;
The document fulfils the aim of being a Quick Reference Guide, but my personal feeling is that something is missing however:&lt;br /&gt;
&lt;br /&gt;
What about the awareness level of the developer supposed to take all these inputs into account?&lt;br /&gt;
&lt;br /&gt;
Indeed, as it is said in the Introduction, this document is presented in a checklist format; and because it has to be handled as a checklist, the 1st check to take into account is to ensure about the willingness of the developer to engage in such a process of checking his own awareness level.&lt;br /&gt;
&lt;br /&gt;
So, to be short, I don’t know what exactly and how to say something about that, but I just wished to raise this to your attention because that could be appreciated afterwards by people reading the Guide.&lt;br /&gt;
 &lt;br /&gt;
It’s up to you.&lt;br /&gt;
&lt;br /&gt;
| 5. Have all the Beta Reviewer Action Items been completed? These will need to be completed if they have not already occurred during a previous assessment.&lt;br /&gt;
= answer 5&lt;br /&gt;
I guess so&lt;br /&gt;
&lt;br /&gt;
| 6. Have any limitations been documented? Please point out the link(s).&lt;br /&gt;
= answer 6&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| 7. Does the document substantially address the application security issues it was created to solve?&lt;br /&gt;
= answer 7&lt;br /&gt;
Yes indeed, short, precise and easy to read.&lt;br /&gt;
&lt;br /&gt;
| 8. Does the document respect OWASP Writing Style and OWASP Template for Docs?&lt;br /&gt;
= answer 8&lt;br /&gt;
I guess yes about the OWASP Writing Style, but to ensure about Template&lt;br /&gt;
&lt;br /&gt;
| 9. Have you noted any limitations of the document that are not already documented by the project release lead?&lt;br /&gt;
= answer 9&lt;br /&gt;
Not yet&lt;br /&gt;
&lt;br /&gt;
| 10. Would you consider using this document in your day to day work assuming your professional work includes a reason to use this document? Would you recommend this document to others in the profession? Why or why not?&lt;br /&gt;
= answer 10&lt;br /&gt;
Yes, absolutely, given that I’ll also recommend this Guide to any outsourced services staff, dev staff, specially for platforms of Services&lt;br /&gt;
 &lt;br /&gt;
| 11. What, if anything, is missing which would make this a more useful document? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= answer 11&lt;br /&gt;
I would say the same as answer 4:&lt;br /&gt;
&lt;br /&gt;
The document fulfils the aim of being a Quick Reference Guide, but my personal feeling is that something is missing however:&lt;br /&gt;
&lt;br /&gt;
What about the awareness level of the developer supposed to take all these inputs into account?&lt;br /&gt;
&lt;br /&gt;
Indeed, as it is said in the Introduction, this document is presented in a checklist format; and because it has to be handled as a checklist, the 1st check to take into account is to ensure about the willingness of the developer to engage in such a process of checking his own awareness level.&lt;br /&gt;
&lt;br /&gt;
So, to be short, I don’t know what exactly and how to say something about that, but I just wished to raise this to your attention because that could be appreciated afterwards by people reading the Guide.&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
&lt;br /&gt;
'''''[[user:Bradcausey|Brad Causey]]'s Review:'''''&lt;br /&gt;
&lt;br /&gt;
== Second Reviewer ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;small&amp;gt;It is recommended that an OWASP board member or Global Projects Committee member be the second reviewer on Quality releases. The board has the initial option to review the project, followed by the Global Projects Committee.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ :Template:Assessment Questions - Documents&lt;br /&gt;
&lt;br /&gt;
| 1. Does the document consider the [http://www.owasp.org/index.php/OWASP_Writing_Style OWASP Writing Style]?&lt;br /&gt;
= Affirmative&lt;br /&gt;
&lt;br /&gt;
| 2. Do contents from wiki articles match download-able documents? (PDF and .doc versions)&lt;br /&gt;
= Affirmative&lt;br /&gt;
&lt;br /&gt;
| 3. Does the document have an “About This Document” section which allows the end user to get an overview of the state of the document?&lt;br /&gt;
= Affirmative&lt;br /&gt;
&lt;br /&gt;
| 4. How completely does the release address the goal of the project? Is the overall document complete in structure and organization? Are any missing or incomplete sections critical enough to keep the document at an Alpha quality level?&lt;br /&gt;
= Completely. The project leader has done a great job addressing the target audience with relevant information to the subject of the project.&lt;br /&gt;
&lt;br /&gt;
| 5. Have all the Beta Reviewer Action Items been completed? These will need to be completed if they have not already occurred during a previous assessment.&lt;br /&gt;
= Affirmative&lt;br /&gt;
&lt;br /&gt;
| 6. Have any limitations been documented? Please point out the link(s).&lt;br /&gt;
= None that I'm aware of are necessary other than what is included within the document itself.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the document substantially address the application security issues it was created to solve?&lt;br /&gt;
= Affirmative - and very well&lt;br /&gt;
&lt;br /&gt;
| 8. Does the document respect OWASP Writing Style and OWASP Template for Docs?&lt;br /&gt;
= Affirmative&lt;br /&gt;
&lt;br /&gt;
| 9. Have you noted any limitations of the document that are not already documented by the project release lead?&lt;br /&gt;
= None&lt;br /&gt;
&lt;br /&gt;
| 10. Would you consider using this document in your day to day work assuming your professional work includes a reason to use this document? Would you recommend this document to others in the profession? Why or why not?&lt;br /&gt;
= Affirmative&lt;br /&gt;
&lt;br /&gt;
| 11. What, if anything, is missing which would make this a more useful document? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= It would be great to see an integration guide on how to combine this with an existing or new SDLC. This would be slated for a later project/release.&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Alabama&amp;diff=83858</id>
		<title>Alabama</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Alabama&amp;diff=83858"/>
				<updated>2010-05-24T15:13:32Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Alabama|extra=The chapter leader is [mailto:bradcausey@gmail.com Brad Causey]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Alabama|emailarchives=http://lists.owasp.org/pipermail/owasp-Alabama}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;paypal&amp;gt;Alabama&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location''' We are currently meeting at: &lt;br /&gt;
&lt;br /&gt;
15 20th Street South in Birmingham in the 'Birmingham Room' every third Thursday of the month. We typically meet from 8-12 with the main presentation from 9-11 Breakfast will typically be provided, when I can afford to buy it. =) &lt;br /&gt;
&lt;br /&gt;
http://maps.google.com/maps?hl=en&amp;amp;amp;q=15%2020th%20Street%20South%2C%20Birmingham%2C%20AL &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings. &lt;br /&gt;
&lt;br /&gt;
Recent Presentations:&lt;br /&gt;
&lt;br /&gt;
Fuzzing with JBroFuzz by Matt Tesauro  [[Image:Alabama Chapter-HTTP Fuzzing.pdf]]&lt;br /&gt;
&lt;br /&gt;
Overview of Skipfish by Brad Causey [[Image:Alabama_Chapter-skipfish.pdf]]&lt;br /&gt;
==== Alabama OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Alabama&amp;diff=83857</id>
		<title>Alabama</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Alabama&amp;diff=83857"/>
				<updated>2010-05-24T15:13:16Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Alabama|extra=The chapter leader is [mailto:bradcausey@gmail.com Brad Causey]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Alabama|emailarchives=http://lists.owasp.org/pipermail/owasp-Alabama}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;paypal&amp;gt;Alabama&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location''' We are currently meeting at: &lt;br /&gt;
&lt;br /&gt;
15 20th Street South in Birmingham in the 'Birmingham Room' every third Thursday of the month. We typically meet from 8-12 with the main presentation from 9-11 Breakfast will typically be provided, when I can afford to buy it. =) &lt;br /&gt;
&lt;br /&gt;
http://maps.google.com/maps?hl=en&amp;amp;amp;q=15%2020th%20Street%20South%2C%20Birmingham%2C%20AL &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings. &lt;br /&gt;
&lt;br /&gt;
Recent Presentations:&lt;br /&gt;
Fuzzing with JBroFuzz by Matt Tesauro  [[Image:Alabama Chapter-HTTP Fuzzing.pdf]]&lt;br /&gt;
&lt;br /&gt;
Overview of Skipfish by Brad Causey [[Image:Alabama_Chapter-skipfish.pdf]]&lt;br /&gt;
==== Alabama OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Alabama&amp;diff=83856</id>
		<title>Alabama</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Alabama&amp;diff=83856"/>
				<updated>2010-05-24T15:12:55Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Alabama|extra=The chapter leader is [mailto:bradcausey@gmail.com Brad Causey]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Alabama|emailarchives=http://lists.owasp.org/pipermail/owasp-Alabama}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;paypal&amp;gt;Alabama&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location''' We are currently meeting at: &lt;br /&gt;
&lt;br /&gt;
15 20th Street South in Birmingham in the 'Birmingham Room' every third Thursday of the month. We typically meet from 8-12 with the main presentation from 9-11 Breakfast will typically be provided, when I can afford to buy it. =) &lt;br /&gt;
&lt;br /&gt;
http://maps.google.com/maps?hl=en&amp;amp;amp;q=15%2020th%20Street%20South%2C%20Birmingham%2C%20AL &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings. &lt;br /&gt;
&lt;br /&gt;
Recent Presentations:&lt;br /&gt;
Fuzzing with JBroFuzz by Matt Tesauro  [[Image:Alabama Chapter-HTTP Fuzzing.pdf]] &lt;br /&gt;
Overview of Skipfish by Brad Causey [[Image:Alabama_Chapter-skipfish.pdf]]&lt;br /&gt;
==== Alabama OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Alabama_Chapter-skipfish.pdf&amp;diff=83855</id>
		<title>File:Alabama Chapter-skipfish.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Alabama_Chapter-skipfish.pdf&amp;diff=83855"/>
				<updated>2010-05-24T15:11:24Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: An overview of the new Skipfish tool
-Brad Causey&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An overview of the new Skipfish tool&lt;br /&gt;
-Brad Causey&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Bradcausey&amp;diff=83854</id>
		<title>User:Bradcausey</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Bradcausey&amp;diff=83854"/>
				<updated>2010-05-24T15:08:19Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Brad Causey is a Web Application Security, Forensics, and Phishing specialist working in the financial sector. He frequently contributes to various open source projects, and participates in training and lectures at various educational facilities.&lt;br /&gt;
&lt;br /&gt;
Brad Causey is also an OWASP GPC member, the President of the OWASP AL Chapter, and the President of the AL IISFA Chapter.&lt;br /&gt;
&lt;br /&gt;
* Brad Causey's [mailto:bradcausey@owasp.org Email Contact] and [[:Special:Contributions/Bradcausey|Wiki Contributions]].&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Alabama&amp;diff=78819</id>
		<title>Alabama</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Alabama&amp;diff=78819"/>
				<updated>2010-02-22T20:25:06Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Alabama|extra=The chapter leader is [mailto:bradcausey@gmail.com Brad Causey]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Alabama|emailarchives=http://lists.owasp.org/pipermail/owasp-Alabama}} &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;paypal&amp;gt;Alabama&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
'''Meeting Location''' We are currently meeting at: &lt;br /&gt;
&lt;br /&gt;
15 20th Street South in Birmingham in the 'Birmingham Room' every third Thursday of the month. We typically meet from 8-12 with the main presentation from 9-11 Breakfast will typically be provided, when I can afford to buy it. =) &lt;br /&gt;
&lt;br /&gt;
http://maps.google.com/maps?hl=en&amp;amp;amp;q=15%2020th%20Street%20South%2C%20Birmingham%2C%20AL &lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings. &lt;br /&gt;
&lt;br /&gt;
Recent Presentations:&lt;br /&gt;
Fuzzing with JBroFuzz by Matt Tesauro  [[Image:Alabama Chapter-HTTP Fuzzing.pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Alabama OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Chapter]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Alabama&amp;diff=78818</id>
		<title>Alabama</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Alabama&amp;diff=78818"/>
				<updated>2010-02-22T20:23:15Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Alabama|extra=The chapter leader is [mailto:bradcausey@gmail.com Brad Causey]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Alabama|emailarchives=http://lists.owasp.org/pipermail/owasp-Alabama}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;paypal&amp;gt;Alabama&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
We are currently meeting at:&lt;br /&gt;
&lt;br /&gt;
15 20th Street South in Birmingham in the 'Birmingham Room' every third Thursday of the month.&lt;br /&gt;
We typically meet from 8-12 with the main presentation from 9-11&lt;br /&gt;
Breakfast will typically be provided, when I can afford to buy it. =)&lt;br /&gt;
&lt;br /&gt;
http://maps.google.com/maps?hl=en&amp;amp;q=15%2020th%20Street%20South%2C%20Birmingham%2C%20AL&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[File: Alabama_Chapter-HTTP_Fuzzing.pdf]]&lt;br /&gt;
&lt;br /&gt;
==== Alabama OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Alabama_Chapter-HTTP_Fuzzing.pdf&amp;diff=78817</id>
		<title>File:Alabama Chapter-HTTP Fuzzing.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Alabama_Chapter-HTTP_Fuzzing.pdf&amp;diff=78817"/>
				<updated>2010-02-22T20:22:36Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Alabama&amp;diff=78816</id>
		<title>Alabama</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Alabama&amp;diff=78816"/>
				<updated>2010-02-22T20:20:12Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Alabama|extra=The chapter leader is [mailto:bradcausey@gmail.com Brad Causey]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Alabama|emailarchives=http://lists.owasp.org/pipermail/owasp-Alabama}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
 &amp;lt;paypal&amp;gt;Alabama&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
'''Meeting Location'''&lt;br /&gt;
We are currently meeting at:&lt;br /&gt;
&lt;br /&gt;
15 20th Street South in Birmingham in the 'Birmingham Room' every third Thursday of the month.&lt;br /&gt;
We typically meet from 8-12 with the main presentation from 9-11&lt;br /&gt;
Breakfast will typically be provided, when I can afford to buy it. =)&lt;br /&gt;
&lt;br /&gt;
http://maps.google.com/maps?hl=en&amp;amp;q=15%2020th%20Street%20South%2C%20Birmingham%2C%20AL&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
Most Recent presentation, by Matt Tesauro.&lt;br /&gt;
&lt;br /&gt;
==== Alabama OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76251</id>
		<title>OWASP Common Numbering Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76251"/>
				<updated>2010-01-14T18:26:15Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
Here is the generally agreed-upon new numbering scheme. Additional explanatory text coming soon. Questions/Comments? Email [mailto:mike.boberski@owasp.org Mike] or [mailto:brad.causey@owasp.org Brad]. . &lt;br /&gt;
&lt;br /&gt;
 OWASP-0600&lt;br /&gt;
 OWASP-0600-DEPRECATED &lt;br /&gt;
 OWASP-0604&lt;br /&gt;
 OWASP-0604-DEPRECATED&lt;br /&gt;
 OWASP-0604-DG&lt;br /&gt;
 OWASP-0604-DG-01&lt;br /&gt;
 OWASP-0604-TG&lt;br /&gt;
 OWASP-0604-TG-DV-005&lt;br /&gt;
 OWASP-0604-TG-DV-005-DEPRECATED&lt;br /&gt;
&lt;br /&gt;
 0123456789012345678901234567890123456789&lt;br /&gt;
           1         2         3&lt;br /&gt;
&lt;br /&gt;
*0-4 OWASP &lt;br /&gt;
*6-7 Detailed requirement identifier (major) &lt;br /&gt;
*8-9 Detailed requirement identifier (minor) &lt;br /&gt;
*11-12 Document code (DG=Development Guide, TG=Testing Guide, CG=Code Review Guide, AR, ED, RM, OR, others reserved) &lt;br /&gt;
*14-40 (Optional: DEPRECATED, or # for iterations, or legacy identifiers)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Primary OWASP CWVN Table (DRAFT)  ==&lt;br /&gt;
This table outlines the OWASP Common Web Vulnerability Numbering(CWVN)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''CWVN Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Description'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-0100'''&lt;br /&gt;
| '''Information Gathering'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0102&lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0103&lt;br /&gt;
| Identify application entry points &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0104&lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0105&lt;br /&gt;
| Application Discovery &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0106&lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0200'''&lt;br /&gt;
|'''Configuration Management Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0202&lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0204&lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0205&lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0206&lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0207 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0208 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0300''' &lt;br /&gt;
|'''Authentication Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0301&lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0302&lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0303&lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0304&lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0305&lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0306&lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0307&lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0308&lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0309 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0310&lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0400''' &lt;br /&gt;
|'''Session Management'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0401&lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0402&lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0403&lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0404&lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0500'''&lt;br /&gt;
|'''Authorization Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0502 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0503 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0600'''&lt;br /&gt;
|'''Business logic testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
| Testing for business logic &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0700'''&lt;br /&gt;
|'''Data Validation Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0702&lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0703&lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0704 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0705&lt;br /&gt;
| SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0706&lt;br /&gt;
| LDAP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0707&lt;br /&gt;
| ORM Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0708&lt;br /&gt;
| XML Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0709&lt;br /&gt;
| SSI Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0710&lt;br /&gt;
| XPath Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0711&lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0712&lt;br /&gt;
| Code Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0713&lt;br /&gt;
| OS Commanding &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0714&lt;br /&gt;
| Buffer overflow &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0715&lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0716&lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
| Unvalidated Redirects and Forwards &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0800'''&lt;br /&gt;
|'''Denial of Service Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0802&lt;br /&gt;
| Locking User Accounts &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0803&lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0804&lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0805&lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0806&lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0807&lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0808&lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0900'''&lt;br /&gt;
|'''Web Services Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0902&lt;br /&gt;
| Testing WSDL &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0903&lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0904&lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0905&lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0906 &lt;br /&gt;
| Malicious SOAP attachments &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0907&lt;br /&gt;
| Replay Testing &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-1000'''&lt;br /&gt;
|'''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-1001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-1002  &lt;br /&gt;
| AJAX Testing&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Legacy Testing Guide IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Test Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Information Gathering'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-001 &lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-002 &lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
| OWASP-0102&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-003 &lt;br /&gt;
| Identify application entry points &lt;br /&gt;
| OWASP-0103&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-004 &lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
| OWASP-0104&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-005 &lt;br /&gt;
| Application Discovery &lt;br /&gt;
| OWASP-0105&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-006 &lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
| OWASP-0106&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Configuration Management Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-001 &lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-002 &lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
| OWASP-0202&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-003 &lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
| OWASP-0203&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-004 &lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
| OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-005 &lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
| OWASP-0205&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-006 &lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
| OWASP-0206&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-007 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
| OWASP-0207&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-008 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
| OWASP-0208&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authentication Testing''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-001 &lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
| OWASP-0301&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-002 &lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
| OWASP-0302&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-003 &lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
| OWASP-0303&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-004 &lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
| OWASP-0304&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-005 &lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
| OWASP-0305&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-006 &lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
| OWASP-0306&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-007 &lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
| OWASP-0307&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-008 &lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
| OWASP-0308&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-009 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
| OWASP-0309&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-010 &lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
| OWASP-0310&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Session Management''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-001 &lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
| OWASP-0401&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-002 &lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
| OWASP-0402&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-003 &lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
| OWASP-0403&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-004 &lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
| OWASP-0404&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-005 &lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authorization Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AZ-001 &lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-002 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-003 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
| OWASP-0503&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Business logic testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-BL-001 &lt;br /&gt;
| Testing for business logic &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Data Validation Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DV-001 &lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-002 &lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
| OWASP-0702&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-003 &lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
| OWASP-0703&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-004 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
| OWASP-0704&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-005 &lt;br /&gt;
| SQL Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-006 &lt;br /&gt;
| LDAP Injection &lt;br /&gt;
| OWASP-0706&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-007 &lt;br /&gt;
| ORM Injection &lt;br /&gt;
| OWASP-0707&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-008 &lt;br /&gt;
| XML Injection &lt;br /&gt;
| OWASP-0708&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-009 &lt;br /&gt;
| SSI Injection &lt;br /&gt;
| OWASP-0709&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-010 &lt;br /&gt;
| XPath Injection &lt;br /&gt;
| OWASP-0710&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-011 &lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
| OWASP-0711&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-012 &lt;br /&gt;
| Code Injection &lt;br /&gt;
| OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-013 &lt;br /&gt;
| OS Commanding &lt;br /&gt;
| OWASP-0713&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-014 &lt;br /&gt;
| Buffer overflow &lt;br /&gt;
| OWASP-0714&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-015 &lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
| OWASP-0715&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-016 &lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
| OWASP-0716&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Denial of Service Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DS-001 &lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-002 &lt;br /&gt;
| Locking Customer Accounts &lt;br /&gt;
| OWASP-0802&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-003 &lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
| OWASP-0803&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-004 &lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
| OWASP-0804&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-005 &lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
| OWASP-0805&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-006 &lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
| OWASP-0806&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-007 &lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
| OWASP-0807&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-008 &lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
| OWASP-0808&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Services Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-WS-001 &lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-002 &lt;br /&gt;
| Testing WSDL &lt;br /&gt;
| OWASP-0902&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-003 &lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
| OWASP-0903&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-004 &lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
| OWASP-0904&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-005 &lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
| OWASP-0905&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-006 &lt;br /&gt;
| Naughty SOAP attachments &lt;br /&gt;
| OWASP-0906&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-007 &lt;br /&gt;
| Replay Testing &lt;br /&gt;
| OWASP-0907&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AJ-001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
| OWASP-1001&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AJ-002 &lt;br /&gt;
| AJAX Testing &lt;br /&gt;
| OWASP-1002&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Top 10 2010 IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| A1 &lt;br /&gt;
| Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
OWASP-0706&lt;br /&gt;
&lt;br /&gt;
OWASP-0707&lt;br /&gt;
&lt;br /&gt;
OWASP-0708&lt;br /&gt;
&lt;br /&gt;
OWASP-0709&lt;br /&gt;
&lt;br /&gt;
OWASP-0710&lt;br /&gt;
&lt;br /&gt;
OWASP-0711&lt;br /&gt;
&lt;br /&gt;
OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| A2 &lt;br /&gt;
| Cross Site Scripting &lt;br /&gt;
| OWASP-0701 &lt;br /&gt;
OWASP-0702&lt;br /&gt;
&lt;br /&gt;
OWASP-0703&lt;br /&gt;
&lt;br /&gt;
OWASP-0704 &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A3 &lt;br /&gt;
| Broken Authentication and Session Management&lt;br /&gt;
| OWASP-0300&lt;br /&gt;
&lt;br /&gt;
OWASP-0400&lt;br /&gt;
|-&lt;br /&gt;
| A4 &lt;br /&gt;
| Insecure Direct Object References &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| A5 &lt;br /&gt;
| Cross Site Request Forgery&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| A6&lt;br /&gt;
| Security Misconfiguration&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
&lt;br /&gt;
OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| A7&lt;br /&gt;
| Failure to Restrict URL Access&lt;br /&gt;
| OWASP-0500&lt;br /&gt;
|-&lt;br /&gt;
| A8&lt;br /&gt;
| Unvalidated Redirects and Forwards&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
|-&lt;br /&gt;
| A9&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
|-&lt;br /&gt;
| A10&lt;br /&gt;
| Insufficient Transport Layer Protection&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*adding the (release) year into the numbering scheme can be problematic, because the document has a life cycle that goes over years .... &lt;br /&gt;
*One should rather try to accommodate a versioning scheme that is human readable in the reference number as well (e.g. V02, or RevA, or...)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*don't try to encode any information into the ID that is likely to change or be subject to debate. In the olden days of CVE, we used to have &amp;quot;CAN-1999-0067&amp;quot; which would change into &amp;quot;CVE-1999-0067&amp;quot; once the item was considered stable and sufficiently verified. That made the ID hard to use. Right now, OWASP-DV-001 encodes the term &amp;quot;data validation&amp;quot; in the DV acronym, but what happens if in a couple of years, some new and better term occurs, or the focus changes from validation to something else? (As an example, it's only recently that the &amp;quot;data validation&amp;quot; term itself has become popular.)&lt;br /&gt;
&lt;br /&gt;
*carefully consider the range of values that your ID space supports, and if possible, allow it to expand. CVE has a &amp;quot;CVE-10K&amp;quot; problem because we never expected that we would ever come close to tracking 10,000 vulnerabilities a year. Red Hat had to change their advisory numbering scheme a couple years ago. etc.&lt;br /&gt;
&lt;br /&gt;
*don't change the fundamental meaning of the ID once you've assigned it. This causes confusion, and more importantly, it immediately invalidates almost everyone's mappings to that ID - including people who you don't even know are using that ID.&lt;br /&gt;
&lt;br /&gt;
*closely monitor the mappings that get made. Typos and misunderstandings are rarely caught. People may make assumptions about what &amp;quot;the item&amp;quot; really is, based only on a quick scan of a short name or title. Since you're dealing with diverse sources, there are likely to be many-to-many relationships in dealing with mappings.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for handling duplicates. They're gonna happen.&lt;br /&gt;
&lt;br /&gt;
*the more you distribute the process of creating and assigning IDs between multiple people, the more inconsistencies and duplicates you will wind up with. This may be unavoidable, since the job is usually bigger than one person.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for deprecating IDs, i.e., &amp;quot;retiring&amp;quot; them and discouraging their use by others. This will probably happen for reasons other than duplicates. There should be some final record, somewhere, of what happened to the deprecated item - i.e., it shouldn't just disappear off the face of the earth.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Much of the discussion surrounding the establishment of &amp;quot;Common OWASP Numbering&amp;quot; can be found on the various [https://lists.owasp.org/mailman/listinfo OWASP mailing lists]. (For your convenience here is a direct link to the [https://lists.owasp.org/pipermail/owasp-testing/ OWASP Testing Guide Mailing List Archive].) &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Verification_Standard_Project]] [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76250</id>
		<title>OWASP Common Numbering Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76250"/>
				<updated>2010-01-14T18:25:52Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Mapping to Top 10 2010 IDs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
Here is the generally agreed-upon new numbering scheme. Additional explanatory text coming soon. Questions/Comments? Email [mailto:mike.boberski@owasp.org Mike] or [mailto:brad.causey@owasp.org Brad]. . &lt;br /&gt;
&lt;br /&gt;
 OWASP-06&lt;br /&gt;
 OWASP-06-DEPRECATED &lt;br /&gt;
 OWASP-0604&lt;br /&gt;
 OWASP-0604-DEPRECATED&lt;br /&gt;
 OWASP-0604-DG&lt;br /&gt;
 OWASP-0604-DG-01&lt;br /&gt;
 OWASP-0604-TG&lt;br /&gt;
 OWASP-0604-TG-DV-005&lt;br /&gt;
 OWASP-0604-TG-DV-005-DEPRECATED&lt;br /&gt;
&lt;br /&gt;
 0123456789012345678901234567890123456789&lt;br /&gt;
           1         2         3&lt;br /&gt;
&lt;br /&gt;
*0-4 OWASP &lt;br /&gt;
*6-7 Detailed requirement identifier (major) &lt;br /&gt;
*8-9 Detailed requirement identifier (minor) &lt;br /&gt;
*11-12 Document code (DG=Development Guide, TG=Testing Guide, CG=Code Review Guide, AR, ED, RM, OR, others reserved) &lt;br /&gt;
*14-40 (Optional: DEPRECATED, or # for iterations, or legacy identifiers)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Primary OWASP CWVN Table (DRAFT)  ==&lt;br /&gt;
This table outlines the OWASP Common Web Vulnerability Numbering(CWVN)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''CWVN Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Description'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-0100'''&lt;br /&gt;
| '''Information Gathering'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0102&lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0103&lt;br /&gt;
| Identify application entry points &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0104&lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0105&lt;br /&gt;
| Application Discovery &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0106&lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0200'''&lt;br /&gt;
|'''Configuration Management Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0202&lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0204&lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0205&lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0206&lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0207 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0208 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0300''' &lt;br /&gt;
|'''Authentication Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0301&lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0302&lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0303&lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0304&lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0305&lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0306&lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0307&lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0308&lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0309 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0310&lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0400''' &lt;br /&gt;
|'''Session Management'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0401&lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0402&lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0403&lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0404&lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0500'''&lt;br /&gt;
|'''Authorization Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0502 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0503 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0600'''&lt;br /&gt;
|'''Business logic testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
| Testing for business logic &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0700'''&lt;br /&gt;
|'''Data Validation Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0702&lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0703&lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0704 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0705&lt;br /&gt;
| SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0706&lt;br /&gt;
| LDAP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0707&lt;br /&gt;
| ORM Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0708&lt;br /&gt;
| XML Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0709&lt;br /&gt;
| SSI Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0710&lt;br /&gt;
| XPath Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0711&lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0712&lt;br /&gt;
| Code Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0713&lt;br /&gt;
| OS Commanding &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0714&lt;br /&gt;
| Buffer overflow &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0715&lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0716&lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
| Unvalidated Redirects and Forwards &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0800'''&lt;br /&gt;
|'''Denial of Service Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0802&lt;br /&gt;
| Locking User Accounts &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0803&lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0804&lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0805&lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0806&lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0807&lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0808&lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0900'''&lt;br /&gt;
|'''Web Services Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0902&lt;br /&gt;
| Testing WSDL &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0903&lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0904&lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0905&lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0906 &lt;br /&gt;
| Malicious SOAP attachments &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0907&lt;br /&gt;
| Replay Testing &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-1000'''&lt;br /&gt;
|'''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-1001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-1002  &lt;br /&gt;
| AJAX Testing&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Legacy Testing Guide IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Test Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Information Gathering'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-001 &lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-002 &lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
| OWASP-0102&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-003 &lt;br /&gt;
| Identify application entry points &lt;br /&gt;
| OWASP-0103&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-004 &lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
| OWASP-0104&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-005 &lt;br /&gt;
| Application Discovery &lt;br /&gt;
| OWASP-0105&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-006 &lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
| OWASP-0106&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Configuration Management Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-001 &lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-002 &lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
| OWASP-0202&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-003 &lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
| OWASP-0203&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-004 &lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
| OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-005 &lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
| OWASP-0205&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-006 &lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
| OWASP-0206&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-007 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
| OWASP-0207&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-008 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
| OWASP-0208&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authentication Testing''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-001 &lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
| OWASP-0301&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-002 &lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
| OWASP-0302&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-003 &lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
| OWASP-0303&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-004 &lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
| OWASP-0304&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-005 &lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
| OWASP-0305&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-006 &lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
| OWASP-0306&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-007 &lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
| OWASP-0307&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-008 &lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
| OWASP-0308&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-009 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
| OWASP-0309&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-010 &lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
| OWASP-0310&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Session Management''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-001 &lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
| OWASP-0401&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-002 &lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
| OWASP-0402&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-003 &lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
| OWASP-0403&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-004 &lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
| OWASP-0404&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-005 &lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authorization Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AZ-001 &lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-002 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-003 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
| OWASP-0503&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Business logic testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-BL-001 &lt;br /&gt;
| Testing for business logic &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Data Validation Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DV-001 &lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-002 &lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
| OWASP-0702&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-003 &lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
| OWASP-0703&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-004 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
| OWASP-0704&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-005 &lt;br /&gt;
| SQL Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-006 &lt;br /&gt;
| LDAP Injection &lt;br /&gt;
| OWASP-0706&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-007 &lt;br /&gt;
| ORM Injection &lt;br /&gt;
| OWASP-0707&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-008 &lt;br /&gt;
| XML Injection &lt;br /&gt;
| OWASP-0708&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-009 &lt;br /&gt;
| SSI Injection &lt;br /&gt;
| OWASP-0709&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-010 &lt;br /&gt;
| XPath Injection &lt;br /&gt;
| OWASP-0710&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-011 &lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
| OWASP-0711&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-012 &lt;br /&gt;
| Code Injection &lt;br /&gt;
| OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-013 &lt;br /&gt;
| OS Commanding &lt;br /&gt;
| OWASP-0713&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-014 &lt;br /&gt;
| Buffer overflow &lt;br /&gt;
| OWASP-0714&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-015 &lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
| OWASP-0715&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-016 &lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
| OWASP-0716&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Denial of Service Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DS-001 &lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-002 &lt;br /&gt;
| Locking Customer Accounts &lt;br /&gt;
| OWASP-0802&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-003 &lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
| OWASP-0803&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-004 &lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
| OWASP-0804&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-005 &lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
| OWASP-0805&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-006 &lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
| OWASP-0806&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-007 &lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
| OWASP-0807&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-008 &lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
| OWASP-0808&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Services Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-WS-001 &lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-002 &lt;br /&gt;
| Testing WSDL &lt;br /&gt;
| OWASP-0902&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-003 &lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
| OWASP-0903&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-004 &lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
| OWASP-0904&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-005 &lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
| OWASP-0905&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-006 &lt;br /&gt;
| Naughty SOAP attachments &lt;br /&gt;
| OWASP-0906&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-007 &lt;br /&gt;
| Replay Testing &lt;br /&gt;
| OWASP-0907&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AJ-001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
| OWASP-1001&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AJ-002 &lt;br /&gt;
| AJAX Testing &lt;br /&gt;
| OWASP-1002&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Top 10 2010 IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| A1 &lt;br /&gt;
| Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
OWASP-0706&lt;br /&gt;
&lt;br /&gt;
OWASP-0707&lt;br /&gt;
&lt;br /&gt;
OWASP-0708&lt;br /&gt;
&lt;br /&gt;
OWASP-0709&lt;br /&gt;
&lt;br /&gt;
OWASP-0710&lt;br /&gt;
&lt;br /&gt;
OWASP-0711&lt;br /&gt;
&lt;br /&gt;
OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| A2 &lt;br /&gt;
| Cross Site Scripting &lt;br /&gt;
| OWASP-0701 &lt;br /&gt;
OWASP-0702&lt;br /&gt;
&lt;br /&gt;
OWASP-0703&lt;br /&gt;
&lt;br /&gt;
OWASP-0704 &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A3 &lt;br /&gt;
| Broken Authentication and Session Management&lt;br /&gt;
| OWASP-0300&lt;br /&gt;
&lt;br /&gt;
OWASP-0400&lt;br /&gt;
|-&lt;br /&gt;
| A4 &lt;br /&gt;
| Insecure Direct Object References &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| A5 &lt;br /&gt;
| Cross Site Request Forgery&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| A6&lt;br /&gt;
| Security Misconfiguration&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
&lt;br /&gt;
OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| A7&lt;br /&gt;
| Failure to Restrict URL Access&lt;br /&gt;
| OWASP-0500&lt;br /&gt;
|-&lt;br /&gt;
| A8&lt;br /&gt;
| Unvalidated Redirects and Forwards&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
|-&lt;br /&gt;
| A9&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
|-&lt;br /&gt;
| A10&lt;br /&gt;
| Insufficient Transport Layer Protection&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*adding the (release) year into the numbering scheme can be problematic, because the document has a life cycle that goes over years .... &lt;br /&gt;
*One should rather try to accommodate a versioning scheme that is human readable in the reference number as well (e.g. V02, or RevA, or...)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*don't try to encode any information into the ID that is likely to change or be subject to debate. In the olden days of CVE, we used to have &amp;quot;CAN-1999-0067&amp;quot; which would change into &amp;quot;CVE-1999-0067&amp;quot; once the item was considered stable and sufficiently verified. That made the ID hard to use. Right now, OWASP-DV-001 encodes the term &amp;quot;data validation&amp;quot; in the DV acronym, but what happens if in a couple of years, some new and better term occurs, or the focus changes from validation to something else? (As an example, it's only recently that the &amp;quot;data validation&amp;quot; term itself has become popular.)&lt;br /&gt;
&lt;br /&gt;
*carefully consider the range of values that your ID space supports, and if possible, allow it to expand. CVE has a &amp;quot;CVE-10K&amp;quot; problem because we never expected that we would ever come close to tracking 10,000 vulnerabilities a year. Red Hat had to change their advisory numbering scheme a couple years ago. etc.&lt;br /&gt;
&lt;br /&gt;
*don't change the fundamental meaning of the ID once you've assigned it. This causes confusion, and more importantly, it immediately invalidates almost everyone's mappings to that ID - including people who you don't even know are using that ID.&lt;br /&gt;
&lt;br /&gt;
*closely monitor the mappings that get made. Typos and misunderstandings are rarely caught. People may make assumptions about what &amp;quot;the item&amp;quot; really is, based only on a quick scan of a short name or title. Since you're dealing with diverse sources, there are likely to be many-to-many relationships in dealing with mappings.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for handling duplicates. They're gonna happen.&lt;br /&gt;
&lt;br /&gt;
*the more you distribute the process of creating and assigning IDs between multiple people, the more inconsistencies and duplicates you will wind up with. This may be unavoidable, since the job is usually bigger than one person.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for deprecating IDs, i.e., &amp;quot;retiring&amp;quot; them and discouraging their use by others. This will probably happen for reasons other than duplicates. There should be some final record, somewhere, of what happened to the deprecated item - i.e., it shouldn't just disappear off the face of the earth.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Much of the discussion surrounding the establishment of &amp;quot;Common OWASP Numbering&amp;quot; can be found on the various [https://lists.owasp.org/mailman/listinfo OWASP mailing lists]. (For your convenience here is a direct link to the [https://lists.owasp.org/pipermail/owasp-testing/ OWASP Testing Guide Mailing List Archive].) &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Verification_Standard_Project]] [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76249</id>
		<title>OWASP Common Numbering Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76249"/>
				<updated>2010-01-14T18:25:25Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Mapping to Legacy Testing Guide IDs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
Here is the generally agreed-upon new numbering scheme. Additional explanatory text coming soon. Questions/Comments? Email [mailto:mike.boberski@owasp.org Mike] or [mailto:brad.causey@owasp.org Brad]. . &lt;br /&gt;
&lt;br /&gt;
 OWASP-06&lt;br /&gt;
 OWASP-06-DEPRECATED &lt;br /&gt;
 OWASP-0604&lt;br /&gt;
 OWASP-0604-DEPRECATED&lt;br /&gt;
 OWASP-0604-DG&lt;br /&gt;
 OWASP-0604-DG-01&lt;br /&gt;
 OWASP-0604-TG&lt;br /&gt;
 OWASP-0604-TG-DV-005&lt;br /&gt;
 OWASP-0604-TG-DV-005-DEPRECATED&lt;br /&gt;
&lt;br /&gt;
 0123456789012345678901234567890123456789&lt;br /&gt;
           1         2         3&lt;br /&gt;
&lt;br /&gt;
*0-4 OWASP &lt;br /&gt;
*6-7 Detailed requirement identifier (major) &lt;br /&gt;
*8-9 Detailed requirement identifier (minor) &lt;br /&gt;
*11-12 Document code (DG=Development Guide, TG=Testing Guide, CG=Code Review Guide, AR, ED, RM, OR, others reserved) &lt;br /&gt;
*14-40 (Optional: DEPRECATED, or # for iterations, or legacy identifiers)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Primary OWASP CWVN Table (DRAFT)  ==&lt;br /&gt;
This table outlines the OWASP Common Web Vulnerability Numbering(CWVN)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''CWVN Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Description'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-0100'''&lt;br /&gt;
| '''Information Gathering'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0102&lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0103&lt;br /&gt;
| Identify application entry points &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0104&lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0105&lt;br /&gt;
| Application Discovery &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0106&lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0200'''&lt;br /&gt;
|'''Configuration Management Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0202&lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0204&lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0205&lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0206&lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0207 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0208 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0300''' &lt;br /&gt;
|'''Authentication Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0301&lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0302&lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0303&lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0304&lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0305&lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0306&lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0307&lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0308&lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0309 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0310&lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0400''' &lt;br /&gt;
|'''Session Management'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0401&lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0402&lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0403&lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0404&lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0500'''&lt;br /&gt;
|'''Authorization Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0502 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0503 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0600'''&lt;br /&gt;
|'''Business logic testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
| Testing for business logic &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0700'''&lt;br /&gt;
|'''Data Validation Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0702&lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0703&lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0704 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0705&lt;br /&gt;
| SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0706&lt;br /&gt;
| LDAP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0707&lt;br /&gt;
| ORM Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0708&lt;br /&gt;
| XML Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0709&lt;br /&gt;
| SSI Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0710&lt;br /&gt;
| XPath Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0711&lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0712&lt;br /&gt;
| Code Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0713&lt;br /&gt;
| OS Commanding &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0714&lt;br /&gt;
| Buffer overflow &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0715&lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0716&lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
| Unvalidated Redirects and Forwards &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0800'''&lt;br /&gt;
|'''Denial of Service Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0802&lt;br /&gt;
| Locking User Accounts &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0803&lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0804&lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0805&lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0806&lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0807&lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0808&lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0900'''&lt;br /&gt;
|'''Web Services Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0902&lt;br /&gt;
| Testing WSDL &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0903&lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0904&lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0905&lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0906 &lt;br /&gt;
| Malicious SOAP attachments &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0907&lt;br /&gt;
| Replay Testing &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-1000'''&lt;br /&gt;
|'''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-1001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-1002  &lt;br /&gt;
| AJAX Testing&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Legacy Testing Guide IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Test Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Information Gathering'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-001 &lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-002 &lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
| OWASP-0102&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-003 &lt;br /&gt;
| Identify application entry points &lt;br /&gt;
| OWASP-0103&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-004 &lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
| OWASP-0104&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-005 &lt;br /&gt;
| Application Discovery &lt;br /&gt;
| OWASP-0105&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-006 &lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
| OWASP-0106&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Configuration Management Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-001 &lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-002 &lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
| OWASP-0202&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-003 &lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
| OWASP-0203&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-004 &lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
| OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-005 &lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
| OWASP-0205&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-006 &lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
| OWASP-0206&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-007 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
| OWASP-0207&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-008 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
| OWASP-0208&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authentication Testing''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-001 &lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
| OWASP-0301&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-002 &lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
| OWASP-0302&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-003 &lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
| OWASP-0303&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-004 &lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
| OWASP-0304&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-005 &lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
| OWASP-0305&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-006 &lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
| OWASP-0306&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-007 &lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
| OWASP-0307&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-008 &lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
| OWASP-0308&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-009 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
| OWASP-0309&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-010 &lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
| OWASP-0310&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Session Management''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-001 &lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
| OWASP-0401&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-002 &lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
| OWASP-0402&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-003 &lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
| OWASP-0403&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-004 &lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
| OWASP-0404&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-005 &lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authorization Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AZ-001 &lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-002 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-003 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
| OWASP-0503&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Business logic testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-BL-001 &lt;br /&gt;
| Testing for business logic &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Data Validation Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DV-001 &lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-002 &lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
| OWASP-0702&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-003 &lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
| OWASP-0703&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-004 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
| OWASP-0704&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-005 &lt;br /&gt;
| SQL Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-006 &lt;br /&gt;
| LDAP Injection &lt;br /&gt;
| OWASP-0706&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-007 &lt;br /&gt;
| ORM Injection &lt;br /&gt;
| OWASP-0707&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-008 &lt;br /&gt;
| XML Injection &lt;br /&gt;
| OWASP-0708&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-009 &lt;br /&gt;
| SSI Injection &lt;br /&gt;
| OWASP-0709&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-010 &lt;br /&gt;
| XPath Injection &lt;br /&gt;
| OWASP-0710&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-011 &lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
| OWASP-0711&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-012 &lt;br /&gt;
| Code Injection &lt;br /&gt;
| OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-013 &lt;br /&gt;
| OS Commanding &lt;br /&gt;
| OWASP-0713&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-014 &lt;br /&gt;
| Buffer overflow &lt;br /&gt;
| OWASP-0714&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-015 &lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
| OWASP-0715&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-016 &lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
| OWASP-0716&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Denial of Service Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DS-001 &lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-002 &lt;br /&gt;
| Locking Customer Accounts &lt;br /&gt;
| OWASP-0802&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-003 &lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
| OWASP-0803&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-004 &lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
| OWASP-0804&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-005 &lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
| OWASP-0805&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-006 &lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
| OWASP-0806&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-007 &lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
| OWASP-0807&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-008 &lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
| OWASP-0808&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Services Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-WS-001 &lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-002 &lt;br /&gt;
| Testing WSDL &lt;br /&gt;
| OWASP-0902&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-003 &lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
| OWASP-0903&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-004 &lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
| OWASP-0904&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-005 &lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
| OWASP-0905&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-006 &lt;br /&gt;
| Naughty SOAP attachments &lt;br /&gt;
| OWASP-0906&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-007 &lt;br /&gt;
| Replay Testing &lt;br /&gt;
| OWASP-0907&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AJ-001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
| OWASP-1001&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AJ-002 &lt;br /&gt;
| AJAX Testing &lt;br /&gt;
| OWASP-1002&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Top 10 2010 IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| A1 &lt;br /&gt;
| Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
OWASP-0706&lt;br /&gt;
&lt;br /&gt;
OWASP-0707&lt;br /&gt;
&lt;br /&gt;
OWASP-0708&lt;br /&gt;
&lt;br /&gt;
OWASP-0709&lt;br /&gt;
&lt;br /&gt;
OWASP-0710&lt;br /&gt;
&lt;br /&gt;
OWASP-0711&lt;br /&gt;
&lt;br /&gt;
OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| A2 &lt;br /&gt;
| Cross Site Scripting &lt;br /&gt;
| OWASP-0701 &lt;br /&gt;
OWASP-0702&lt;br /&gt;
&lt;br /&gt;
OWASP-0703&lt;br /&gt;
&lt;br /&gt;
OWASP-0704 &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A3 &lt;br /&gt;
| Broken Authentication and Session Management&lt;br /&gt;
| OWASP-03&lt;br /&gt;
&lt;br /&gt;
OWASP-04&lt;br /&gt;
|-&lt;br /&gt;
| A4 &lt;br /&gt;
| Insecure Direct Object References &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| A5 &lt;br /&gt;
| Cross Site Request Forgery&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| A6&lt;br /&gt;
| Security Misconfiguration&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
&lt;br /&gt;
OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| A7&lt;br /&gt;
| Failure to Restrict URL Access&lt;br /&gt;
| OWASP-05&lt;br /&gt;
|-&lt;br /&gt;
| A8&lt;br /&gt;
| Unvalidated Redirects and Forwards&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
|-&lt;br /&gt;
| A9&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
|-&lt;br /&gt;
| A10&lt;br /&gt;
| Insufficient Transport Layer Protection&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*adding the (release) year into the numbering scheme can be problematic, because the document has a life cycle that goes over years .... &lt;br /&gt;
*One should rather try to accommodate a versioning scheme that is human readable in the reference number as well (e.g. V02, or RevA, or...)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*don't try to encode any information into the ID that is likely to change or be subject to debate. In the olden days of CVE, we used to have &amp;quot;CAN-1999-0067&amp;quot; which would change into &amp;quot;CVE-1999-0067&amp;quot; once the item was considered stable and sufficiently verified. That made the ID hard to use. Right now, OWASP-DV-001 encodes the term &amp;quot;data validation&amp;quot; in the DV acronym, but what happens if in a couple of years, some new and better term occurs, or the focus changes from validation to something else? (As an example, it's only recently that the &amp;quot;data validation&amp;quot; term itself has become popular.)&lt;br /&gt;
&lt;br /&gt;
*carefully consider the range of values that your ID space supports, and if possible, allow it to expand. CVE has a &amp;quot;CVE-10K&amp;quot; problem because we never expected that we would ever come close to tracking 10,000 vulnerabilities a year. Red Hat had to change their advisory numbering scheme a couple years ago. etc.&lt;br /&gt;
&lt;br /&gt;
*don't change the fundamental meaning of the ID once you've assigned it. This causes confusion, and more importantly, it immediately invalidates almost everyone's mappings to that ID - including people who you don't even know are using that ID.&lt;br /&gt;
&lt;br /&gt;
*closely monitor the mappings that get made. Typos and misunderstandings are rarely caught. People may make assumptions about what &amp;quot;the item&amp;quot; really is, based only on a quick scan of a short name or title. Since you're dealing with diverse sources, there are likely to be many-to-many relationships in dealing with mappings.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for handling duplicates. They're gonna happen.&lt;br /&gt;
&lt;br /&gt;
*the more you distribute the process of creating and assigning IDs between multiple people, the more inconsistencies and duplicates you will wind up with. This may be unavoidable, since the job is usually bigger than one person.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for deprecating IDs, i.e., &amp;quot;retiring&amp;quot; them and discouraging their use by others. This will probably happen for reasons other than duplicates. There should be some final record, somewhere, of what happened to the deprecated item - i.e., it shouldn't just disappear off the face of the earth.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Much of the discussion surrounding the establishment of &amp;quot;Common OWASP Numbering&amp;quot; can be found on the various [https://lists.owasp.org/mailman/listinfo OWASP mailing lists]. (For your convenience here is a direct link to the [https://lists.owasp.org/pipermail/owasp-testing/ OWASP Testing Guide Mailing List Archive].) &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Verification_Standard_Project]] [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76248</id>
		<title>OWASP Common Numbering Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76248"/>
				<updated>2010-01-14T18:02:52Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Primary OWASP CWVN Table (DRAFT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
Here is the generally agreed-upon new numbering scheme. Additional explanatory text coming soon. Questions/Comments? Email [mailto:mike.boberski@owasp.org Mike] or [mailto:brad.causey@owasp.org Brad]. . &lt;br /&gt;
&lt;br /&gt;
 OWASP-06&lt;br /&gt;
 OWASP-06-DEPRECATED &lt;br /&gt;
 OWASP-0604&lt;br /&gt;
 OWASP-0604-DEPRECATED&lt;br /&gt;
 OWASP-0604-DG&lt;br /&gt;
 OWASP-0604-DG-01&lt;br /&gt;
 OWASP-0604-TG&lt;br /&gt;
 OWASP-0604-TG-DV-005&lt;br /&gt;
 OWASP-0604-TG-DV-005-DEPRECATED&lt;br /&gt;
&lt;br /&gt;
 0123456789012345678901234567890123456789&lt;br /&gt;
           1         2         3&lt;br /&gt;
&lt;br /&gt;
*0-4 OWASP &lt;br /&gt;
*6-7 Detailed requirement identifier (major) &lt;br /&gt;
*8-9 Detailed requirement identifier (minor) &lt;br /&gt;
*11-12 Document code (DG=Development Guide, TG=Testing Guide, CG=Code Review Guide, AR, ED, RM, OR, others reserved) &lt;br /&gt;
*14-40 (Optional: DEPRECATED, or # for iterations, or legacy identifiers)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Primary OWASP CWVN Table (DRAFT)  ==&lt;br /&gt;
This table outlines the OWASP Common Web Vulnerability Numbering(CWVN)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''CWVN Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Description'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-0100'''&lt;br /&gt;
| '''Information Gathering'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0102&lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0103&lt;br /&gt;
| Identify application entry points &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0104&lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0105&lt;br /&gt;
| Application Discovery &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0106&lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0200'''&lt;br /&gt;
|'''Configuration Management Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0202&lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0204&lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0205&lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0206&lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0207 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0208 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0300''' &lt;br /&gt;
|'''Authentication Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0301&lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0302&lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0303&lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0304&lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0305&lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0306&lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0307&lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0308&lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0309 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0310&lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0400''' &lt;br /&gt;
|'''Session Management'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0401&lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0402&lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0403&lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0404&lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0500'''&lt;br /&gt;
|'''Authorization Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0502 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0503 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0600'''&lt;br /&gt;
|'''Business logic testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
| Testing for business logic &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0700'''&lt;br /&gt;
|'''Data Validation Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0702&lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0703&lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0704 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0705&lt;br /&gt;
| SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0706&lt;br /&gt;
| LDAP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0707&lt;br /&gt;
| ORM Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0708&lt;br /&gt;
| XML Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0709&lt;br /&gt;
| SSI Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0710&lt;br /&gt;
| XPath Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0711&lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0712&lt;br /&gt;
| Code Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0713&lt;br /&gt;
| OS Commanding &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0714&lt;br /&gt;
| Buffer overflow &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0715&lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0716&lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
| Unvalidated Redirects and Forwards &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0800'''&lt;br /&gt;
|'''Denial of Service Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0802&lt;br /&gt;
| Locking User Accounts &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0803&lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0804&lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0805&lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0806&lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0807&lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0808&lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-0900'''&lt;br /&gt;
|'''Web Services Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0902&lt;br /&gt;
| Testing WSDL &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0903&lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0904&lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0905&lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0906 &lt;br /&gt;
| Malicious SOAP attachments &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0907&lt;br /&gt;
| Replay Testing &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-1000'''&lt;br /&gt;
|'''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-1001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-1002  &lt;br /&gt;
| AJAX Testing&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Legacy Testing Guide IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Test Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Information Gathering - OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-001 &lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-002 &lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
| OWASP-0102&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-003 &lt;br /&gt;
| Identify application entry points &lt;br /&gt;
| OWASP-0103&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-004 &lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
| OWASP-0104&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-005 &lt;br /&gt;
| Application Discovery &lt;br /&gt;
| OWASP-0105&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-006 &lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
| OWASP-0106&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Configuration Management Testing - OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-001 &lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-002 &lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
| OWASP-0202&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-003 &lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
| OWASP-0203&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-004 &lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
| OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-005 &lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
| OWASP-0205&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-006 &lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
| OWASP-0206&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-007 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
| OWASP-0207&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-008 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
| OWASP-0208&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authentication Testing - OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-001 &lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
| OWASP-0301&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-002 &lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
| OWASP-0302&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-003 &lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
| OWASP-0303&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-004 &lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
| OWASP-0304&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-005 &lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
| OWASP-0305&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-006 &lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
| OWASP-0306&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-007 &lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
| OWASP-0307&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-008 &lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
| OWASP-0308&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-009 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
| OWASP-0309&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-010 &lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
| OWASP-0310&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Session Management - OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-001 &lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
| OWASP-0401&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-002 &lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
| OWASP-0402&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-003 &lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
| OWASP-0403&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-004 &lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
| OWASP-0404&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-005 &lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authorization Testing - OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AZ-001 &lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-002 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-003 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
| OWASP-0503&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Business logic testing - OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-BL-001 &lt;br /&gt;
| Testing for business logic &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Data Validation Testing - OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DV-001 &lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-002 &lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
| OWASP-0702&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-003 &lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
| OWASP-0703&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-004 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
| OWASP-0704&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-005 &lt;br /&gt;
| SQL Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-006 &lt;br /&gt;
| LDAP Injection &lt;br /&gt;
| OWASP-0706&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-007 &lt;br /&gt;
| ORM Injection &lt;br /&gt;
| OWASP-0707&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-008 &lt;br /&gt;
| XML Injection &lt;br /&gt;
| OWASP-0708&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-009 &lt;br /&gt;
| SSI Injection &lt;br /&gt;
| OWASP-0709&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-010 &lt;br /&gt;
| XPath Injection &lt;br /&gt;
| OWASP-0710&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-011 &lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
| OWASP-0711&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-012 &lt;br /&gt;
| Code Injection &lt;br /&gt;
| OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-013 &lt;br /&gt;
| OS Commanding &lt;br /&gt;
| OWASP-0713&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-014 &lt;br /&gt;
| Buffer overflow &lt;br /&gt;
| OWASP-0714&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-015 &lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
| OWASP-0715&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-016 &lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
| OWASP-0716&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Denial of Service Testing - OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DS-001 &lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-002 &lt;br /&gt;
| Locking Customer Accounts &lt;br /&gt;
| OWASP-0802&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-003 &lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
| OWASP-0803&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-004 &lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
| OWASP-0804&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-005 &lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
| OWASP-0805&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-006 &lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
| OWASP-0806&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-007 &lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
| OWASP-0807&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-008 &lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
| OWASP-0808&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Services Testing - OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-WS-001 &lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-002 &lt;br /&gt;
| Testing WSDL &lt;br /&gt;
| OWASP-0902&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-003 &lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
| OWASP-0903&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-004 &lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
| OWASP-0904&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-005 &lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
| OWASP-0905&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-006 &lt;br /&gt;
| Naughty SOAP attachments &lt;br /&gt;
| OWASP-0906&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-007 &lt;br /&gt;
| Replay Testing &lt;br /&gt;
| OWASP-0907&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''AJAX Testing - OWASP-10'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AJ-001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
| OWASP-1001&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AJ-002 &lt;br /&gt;
| AJAX Testing &lt;br /&gt;
| OWASP-1002&lt;br /&gt;
|}&lt;br /&gt;
== Mapping to Top 10 2010 IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| A1 &lt;br /&gt;
| Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
OWASP-0706&lt;br /&gt;
&lt;br /&gt;
OWASP-0707&lt;br /&gt;
&lt;br /&gt;
OWASP-0708&lt;br /&gt;
&lt;br /&gt;
OWASP-0709&lt;br /&gt;
&lt;br /&gt;
OWASP-0710&lt;br /&gt;
&lt;br /&gt;
OWASP-0711&lt;br /&gt;
&lt;br /&gt;
OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| A2 &lt;br /&gt;
| Cross Site Scripting &lt;br /&gt;
| OWASP-0701 &lt;br /&gt;
OWASP-0702&lt;br /&gt;
&lt;br /&gt;
OWASP-0703&lt;br /&gt;
&lt;br /&gt;
OWASP-0704 &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A3 &lt;br /&gt;
| Broken Authentication and Session Management&lt;br /&gt;
| OWASP-03&lt;br /&gt;
&lt;br /&gt;
OWASP-04&lt;br /&gt;
|-&lt;br /&gt;
| A4 &lt;br /&gt;
| Insecure Direct Object References &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| A5 &lt;br /&gt;
| Cross Site Request Forgery&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| A6&lt;br /&gt;
| Security Misconfiguration&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
&lt;br /&gt;
OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| A7&lt;br /&gt;
| Failure to Restrict URL Access&lt;br /&gt;
| OWASP-05&lt;br /&gt;
|-&lt;br /&gt;
| A8&lt;br /&gt;
| Unvalidated Redirects and Forwards&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
|-&lt;br /&gt;
| A9&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
|-&lt;br /&gt;
| A10&lt;br /&gt;
| Insufficient Transport Layer Protection&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*adding the (release) year into the numbering scheme can be problematic, because the document has a life cycle that goes over years .... &lt;br /&gt;
*One should rather try to accommodate a versioning scheme that is human readable in the reference number as well (e.g. V02, or RevA, or...)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*don't try to encode any information into the ID that is likely to change or be subject to debate. In the olden days of CVE, we used to have &amp;quot;CAN-1999-0067&amp;quot; which would change into &amp;quot;CVE-1999-0067&amp;quot; once the item was considered stable and sufficiently verified. That made the ID hard to use. Right now, OWASP-DV-001 encodes the term &amp;quot;data validation&amp;quot; in the DV acronym, but what happens if in a couple of years, some new and better term occurs, or the focus changes from validation to something else? (As an example, it's only recently that the &amp;quot;data validation&amp;quot; term itself has become popular.)&lt;br /&gt;
&lt;br /&gt;
*carefully consider the range of values that your ID space supports, and if possible, allow it to expand. CVE has a &amp;quot;CVE-10K&amp;quot; problem because we never expected that we would ever come close to tracking 10,000 vulnerabilities a year. Red Hat had to change their advisory numbering scheme a couple years ago. etc.&lt;br /&gt;
&lt;br /&gt;
*don't change the fundamental meaning of the ID once you've assigned it. This causes confusion, and more importantly, it immediately invalidates almost everyone's mappings to that ID - including people who you don't even know are using that ID.&lt;br /&gt;
&lt;br /&gt;
*closely monitor the mappings that get made. Typos and misunderstandings are rarely caught. People may make assumptions about what &amp;quot;the item&amp;quot; really is, based only on a quick scan of a short name or title. Since you're dealing with diverse sources, there are likely to be many-to-many relationships in dealing with mappings.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for handling duplicates. They're gonna happen.&lt;br /&gt;
&lt;br /&gt;
*the more you distribute the process of creating and assigning IDs between multiple people, the more inconsistencies and duplicates you will wind up with. This may be unavoidable, since the job is usually bigger than one person.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for deprecating IDs, i.e., &amp;quot;retiring&amp;quot; them and discouraging their use by others. This will probably happen for reasons other than duplicates. There should be some final record, somewhere, of what happened to the deprecated item - i.e., it shouldn't just disappear off the face of the earth.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Much of the discussion surrounding the establishment of &amp;quot;Common OWASP Numbering&amp;quot; can be found on the various [https://lists.owasp.org/mailman/listinfo OWASP mailing lists]. (For your convenience here is a direct link to the [https://lists.owasp.org/pipermail/owasp-testing/ OWASP Testing Guide Mailing List Archive].) &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Verification_Standard_Project]] [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76214</id>
		<title>OWASP Common Numbering Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76214"/>
				<updated>2010-01-14T01:10:40Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Primary OWASP CWVN Table (DRAFT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
Here is the generally agreed-upon new numbering scheme. Additional explanatory text coming soon. Questions/Comments? Email [mailto:mike.boberski@owasp.org Mike] or [mailto:brad.causey@owasp.org Brad]. . &lt;br /&gt;
&lt;br /&gt;
 OWASP-06&lt;br /&gt;
 OWASP-06-DEPRECATED &lt;br /&gt;
 OWASP-0604&lt;br /&gt;
 OWASP-0604-DEPRECATED&lt;br /&gt;
 OWASP-0604-DG&lt;br /&gt;
 OWASP-0604-DG-01&lt;br /&gt;
 OWASP-0604-TG&lt;br /&gt;
 OWASP-0604-TG-DV-005&lt;br /&gt;
 OWASP-0604-TG-DV-005-DEPRECATED&lt;br /&gt;
&lt;br /&gt;
 0123456789012345678901234567890123456789&lt;br /&gt;
           1         2         3&lt;br /&gt;
&lt;br /&gt;
*0-4 OWASP &lt;br /&gt;
*6-7 Detailed requirement identifier (major) &lt;br /&gt;
*8-9 Detailed requirement identifier (minor) &lt;br /&gt;
*11-12 Document code (DG=Development Guide, TG=Testing Guide, CG=Code Review Guide, AR, ED, RM, OR, others reserved) &lt;br /&gt;
*14-40 (Optional: DEPRECATED, or # for iterations, or legacy identifiers)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Primary OWASP CWVN Table (DRAFT)  ==&lt;br /&gt;
This table outlines the OWASP Common Web Vulnerability Numbering(CWVN)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''CWVN Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Description'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-01'''&lt;br /&gt;
| '''Information Gathering'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0102&lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0103&lt;br /&gt;
| Identify application entry points &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0104&lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0105&lt;br /&gt;
| Application Discovery &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0106&lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-02'''&lt;br /&gt;
|'''Configuration Management Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0202&lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0204&lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0205&lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0206&lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0207 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0208 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-03''' &lt;br /&gt;
|'''Authentication Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0301&lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0302&lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0303&lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0304&lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0305&lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0306&lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0307&lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0308&lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0309 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0310&lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-04''' &lt;br /&gt;
|'''Session Management'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0401&lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0402&lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0403&lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0404&lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-05'''&lt;br /&gt;
|'''Authorization Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0502 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0503 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-06'''&lt;br /&gt;
|'''Business logic testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
| Testing for business logic &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-07'''&lt;br /&gt;
|'''Data Validation Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0702&lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0703&lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0704 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0705&lt;br /&gt;
| SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0706&lt;br /&gt;
| LDAP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0707&lt;br /&gt;
| ORM Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0708&lt;br /&gt;
| XML Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0709&lt;br /&gt;
| SSI Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0710&lt;br /&gt;
| XPath Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0711&lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0712&lt;br /&gt;
| Code Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0713&lt;br /&gt;
| OS Commanding &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0714&lt;br /&gt;
| Buffer overflow &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0715&lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0716&lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
| Unvalidated Redirects and Forwards &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-08'''&lt;br /&gt;
|'''Denial of Service Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0802&lt;br /&gt;
| Locking User Accounts &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0803&lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0804&lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0805&lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0806&lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0807&lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0808&lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-09'''&lt;br /&gt;
|'''Web Services Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0902&lt;br /&gt;
| Testing WSDL &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0903&lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0904&lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0905&lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0906 &lt;br /&gt;
| Malicious SOAP attachments &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0907&lt;br /&gt;
| Replay Testing &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-10'''&lt;br /&gt;
|'''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-1001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-1002  &lt;br /&gt;
| AJAX Testing&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Legacy Testing Guide IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Test Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Information Gathering - OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-001 &lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-002 &lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
| OWASP-0102&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-003 &lt;br /&gt;
| Identify application entry points &lt;br /&gt;
| OWASP-0103&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-004 &lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
| OWASP-0104&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-005 &lt;br /&gt;
| Application Discovery &lt;br /&gt;
| OWASP-0105&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-006 &lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
| OWASP-0106&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Configuration Management Testing - OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-001 &lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-002 &lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
| OWASP-0202&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-003 &lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
| OWASP-0203&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-004 &lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
| OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-005 &lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
| OWASP-0205&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-006 &lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
| OWASP-0206&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-007 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
| OWASP-0207&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-008 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
| OWASP-0208&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authentication Testing - OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-001 &lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
| OWASP-0301&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-002 &lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
| OWASP-0302&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-003 &lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
| OWASP-0303&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-004 &lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
| OWASP-0304&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-005 &lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
| OWASP-0305&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-006 &lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
| OWASP-0306&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-007 &lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
| OWASP-0307&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-008 &lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
| OWASP-0308&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-009 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
| OWASP-0309&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-010 &lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
| OWASP-0310&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Session Management - OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-001 &lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
| OWASP-0401&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-002 &lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
| OWASP-0402&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-003 &lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
| OWASP-0403&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-004 &lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
| OWASP-0404&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-005 &lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authorization Testing - OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AZ-001 &lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-002 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-003 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
| OWASP-0503&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Business logic testing - OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-BL-001 &lt;br /&gt;
| Testing for business logic &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Data Validation Testing - OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DV-001 &lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-002 &lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
| OWASP-0702&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-003 &lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
| OWASP-0703&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-004 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
| OWASP-0704&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-005 &lt;br /&gt;
| SQL Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-006 &lt;br /&gt;
| LDAP Injection &lt;br /&gt;
| OWASP-0706&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-007 &lt;br /&gt;
| ORM Injection &lt;br /&gt;
| OWASP-0707&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-008 &lt;br /&gt;
| XML Injection &lt;br /&gt;
| OWASP-0708&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-009 &lt;br /&gt;
| SSI Injection &lt;br /&gt;
| OWASP-0709&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-010 &lt;br /&gt;
| XPath Injection &lt;br /&gt;
| OWASP-0710&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-011 &lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
| OWASP-0711&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-012 &lt;br /&gt;
| Code Injection &lt;br /&gt;
| OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-013 &lt;br /&gt;
| OS Commanding &lt;br /&gt;
| OWASP-0713&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-014 &lt;br /&gt;
| Buffer overflow &lt;br /&gt;
| OWASP-0714&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-015 &lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
| OWASP-0715&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-016 &lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
| OWASP-0716&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Denial of Service Testing - OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DS-001 &lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-002 &lt;br /&gt;
| Locking Customer Accounts &lt;br /&gt;
| OWASP-0802&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-003 &lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
| OWASP-0803&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-004 &lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
| OWASP-0804&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-005 &lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
| OWASP-0805&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-006 &lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
| OWASP-0806&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-007 &lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
| OWASP-0807&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-008 &lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
| OWASP-0808&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Services Testing - OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-WS-001 &lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-002 &lt;br /&gt;
| Testing WSDL &lt;br /&gt;
| OWASP-0902&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-003 &lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
| OWASP-0903&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-004 &lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
| OWASP-0904&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-005 &lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
| OWASP-0905&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-006 &lt;br /&gt;
| Naughty SOAP attachments &lt;br /&gt;
| OWASP-0906&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-007 &lt;br /&gt;
| Replay Testing &lt;br /&gt;
| OWASP-0907&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''AJAX Testing - OWASP-10'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AJ-001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
| OWASP-1001&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AJ-002 &lt;br /&gt;
| AJAX Testing &lt;br /&gt;
| OWASP-1002&lt;br /&gt;
|}&lt;br /&gt;
== Mapping to Top 10 2010 IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| A1 &lt;br /&gt;
| Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
OWASP-0706&lt;br /&gt;
&lt;br /&gt;
OWASP-0707&lt;br /&gt;
&lt;br /&gt;
OWASP-0708&lt;br /&gt;
&lt;br /&gt;
OWASP-0709&lt;br /&gt;
&lt;br /&gt;
OWASP-0710&lt;br /&gt;
&lt;br /&gt;
OWASP-0711&lt;br /&gt;
&lt;br /&gt;
OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| A2 &lt;br /&gt;
| Cross Site Scripting &lt;br /&gt;
| OWASP-0701 &lt;br /&gt;
OWASP-0702&lt;br /&gt;
&lt;br /&gt;
OWASP-0703&lt;br /&gt;
&lt;br /&gt;
OWASP-0704 &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A3 &lt;br /&gt;
| Broken Authentication and Session Management&lt;br /&gt;
| OWASP-03&lt;br /&gt;
&lt;br /&gt;
OWASP-04&lt;br /&gt;
|-&lt;br /&gt;
| A4 &lt;br /&gt;
| Insecure Direct Object References &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| A5 &lt;br /&gt;
| Cross Site Request Forgery&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| A6&lt;br /&gt;
| Security Misconfiguration&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
&lt;br /&gt;
OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| A7&lt;br /&gt;
| Failure to Restrict URL Access&lt;br /&gt;
| OWASP-05&lt;br /&gt;
|-&lt;br /&gt;
| A8&lt;br /&gt;
| Unvalidated Redirects and Forwards&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
|-&lt;br /&gt;
| A9&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
|-&lt;br /&gt;
| A10&lt;br /&gt;
| Insufficient Transport Layer Protection&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*adding the (release) year into the numbering scheme can be problematic, because the document has a life cycle that goes over years .... &lt;br /&gt;
*One should rather try to accommodate a versioning scheme that is human readable in the reference number as well (e.g. V02, or RevA, or...)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*don't try to encode any information into the ID that is likely to change or be subject to debate. In the olden days of CVE, we used to have &amp;quot;CAN-1999-0067&amp;quot; which would change into &amp;quot;CVE-1999-0067&amp;quot; once the item was considered stable and sufficiently verified. That made the ID hard to use. Right now, OWASP-DV-001 encodes the term &amp;quot;data validation&amp;quot; in the DV acronym, but what happens if in a couple of years, some new and better term occurs, or the focus changes from validation to something else? (As an example, it's only recently that the &amp;quot;data validation&amp;quot; term itself has become popular.)&lt;br /&gt;
&lt;br /&gt;
*carefully consider the range of values that your ID space supports, and if possible, allow it to expand. CVE has a &amp;quot;CVE-10K&amp;quot; problem because we never expected that we would ever come close to tracking 10,000 vulnerabilities a year. Red Hat had to change their advisory numbering scheme a couple years ago. etc.&lt;br /&gt;
&lt;br /&gt;
*don't change the fundamental meaning of the ID once you've assigned it. This causes confusion, and more importantly, it immediately invalidates almost everyone's mappings to that ID - including people who you don't even know are using that ID.&lt;br /&gt;
&lt;br /&gt;
*closely monitor the mappings that get made. Typos and misunderstandings are rarely caught. People may make assumptions about what &amp;quot;the item&amp;quot; really is, based only on a quick scan of a short name or title. Since you're dealing with diverse sources, there are likely to be many-to-many relationships in dealing with mappings.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for handling duplicates. They're gonna happen.&lt;br /&gt;
&lt;br /&gt;
*the more you distribute the process of creating and assigning IDs between multiple people, the more inconsistencies and duplicates you will wind up with. This may be unavoidable, since the job is usually bigger than one person.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for deprecating IDs, i.e., &amp;quot;retiring&amp;quot; them and discouraging their use by others. This will probably happen for reasons other than duplicates. There should be some final record, somewhere, of what happened to the deprecated item - i.e., it shouldn't just disappear off the face of the earth.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Much of the discussion surrounding the establishment of &amp;quot;Common OWASP Numbering&amp;quot; can be found on the various [https://lists.owasp.org/mailman/listinfo OWASP mailing lists]. (For your convenience here is a direct link to the [https://lists.owasp.org/pipermail/owasp-testing/ OWASP Testing Guide Mailing List Archive].) &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Verification_Standard_Project]] [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76213</id>
		<title>OWASP Common Numbering Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76213"/>
				<updated>2010-01-14T01:08:46Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Primary OWASP CWVN Table (DRAFT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
Here is the generally agreed-upon new numbering scheme. Additional explanatory text coming soon. Questions/Comments? Email [mailto:mike.boberski@owasp.org Mike] or [mailto:brad.causey@owasp.org Brad]. . &lt;br /&gt;
&lt;br /&gt;
 OWASP-06&lt;br /&gt;
 OWASP-06-DEPRECATED &lt;br /&gt;
 OWASP-0604&lt;br /&gt;
 OWASP-0604-DEPRECATED&lt;br /&gt;
 OWASP-0604-DG&lt;br /&gt;
 OWASP-0604-DG-01&lt;br /&gt;
 OWASP-0604-TG&lt;br /&gt;
 OWASP-0604-TG-DV-005&lt;br /&gt;
 OWASP-0604-TG-DV-005-DEPRECATED&lt;br /&gt;
&lt;br /&gt;
 0123456789012345678901234567890123456789&lt;br /&gt;
           1         2         3&lt;br /&gt;
&lt;br /&gt;
*0-4 OWASP &lt;br /&gt;
*6-7 Detailed requirement identifier (major) &lt;br /&gt;
*8-9 Detailed requirement identifier (minor) &lt;br /&gt;
*11-12 Document code (DG=Development Guide, TG=Testing Guide, CG=Code Review Guide, AR, ED, RM, OR, others reserved) &lt;br /&gt;
*14-40 (Optional: DEPRECATED, or # for iterations, or legacy identifiers)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Primary OWASP CWVN Table (DRAFT)  ==&lt;br /&gt;
This table outlines the OWASP Common Web Vulnerability Numbering(CWVN)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''COVN Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Description'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-01'''&lt;br /&gt;
| '''Information Gathering'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0102&lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0103&lt;br /&gt;
| Identify application entry points &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0104&lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0105&lt;br /&gt;
| Application Discovery &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0106&lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-02'''&lt;br /&gt;
|'''Configuration Management Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0202&lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0204&lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0205&lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0206&lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0207 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0208 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-03''' &lt;br /&gt;
|'''Authentication Testing'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0301&lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0302&lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0303&lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0304&lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0305&lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0306&lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0307&lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0308&lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0309 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0310&lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-04''' &lt;br /&gt;
|'''Session Management'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0401&lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0402&lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0403&lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0404&lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-05'''&lt;br /&gt;
|'''Authorization Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0502 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0503 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-06'''&lt;br /&gt;
|'''Business logic testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
| Testing for business logic &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-07'''&lt;br /&gt;
|'''Data Validation Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0702&lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0703&lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0704 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0705&lt;br /&gt;
| SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0706&lt;br /&gt;
| LDAP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0707&lt;br /&gt;
| ORM Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0708&lt;br /&gt;
| XML Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0709&lt;br /&gt;
| SSI Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0710&lt;br /&gt;
| XPath Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0711&lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0712&lt;br /&gt;
| Code Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0713&lt;br /&gt;
| OS Commanding &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0714&lt;br /&gt;
| Buffer overflow &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0715&lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0716&lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
| Unvalidated Redirects and Forwards &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-08'''&lt;br /&gt;
|'''Denial of Service Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0802&lt;br /&gt;
| Locking User Accounts &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0803&lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0804&lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0805&lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0806&lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0807&lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0808&lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
|-&lt;br /&gt;
|'''OWASP-09'''&lt;br /&gt;
|'''Web Services Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0902&lt;br /&gt;
| Testing WSDL &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0903&lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0904&lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0905&lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0906 &lt;br /&gt;
| Malicious SOAP attachments &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0907&lt;br /&gt;
| Replay Testing &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-10'''&lt;br /&gt;
|'''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-1001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-1002  &lt;br /&gt;
| AJAX Testing&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Legacy Testing Guide IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Test Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Information Gathering - OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-001 &lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-002 &lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
| OWASP-0102&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-003 &lt;br /&gt;
| Identify application entry points &lt;br /&gt;
| OWASP-0103&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-004 &lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
| OWASP-0104&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-005 &lt;br /&gt;
| Application Discovery &lt;br /&gt;
| OWASP-0105&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-006 &lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
| OWASP-0106&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Configuration Management Testing - OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-001 &lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-002 &lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
| OWASP-0202&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-003 &lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
| OWASP-0203&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-004 &lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
| OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-005 &lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
| OWASP-0205&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-006 &lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
| OWASP-0206&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-007 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
| OWASP-0207&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-008 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
| OWASP-0208&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authentication Testing - OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-001 &lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
| OWASP-0301&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-002 &lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
| OWASP-0302&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-003 &lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
| OWASP-0303&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-004 &lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
| OWASP-0304&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-005 &lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
| OWASP-0305&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-006 &lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
| OWASP-0306&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-007 &lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
| OWASP-0307&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-008 &lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
| OWASP-0308&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-009 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
| OWASP-0309&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-010 &lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
| OWASP-0310&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Session Management - OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-001 &lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
| OWASP-0401&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-002 &lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
| OWASP-0402&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-003 &lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
| OWASP-0403&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-004 &lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
| OWASP-0404&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-005 &lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authorization Testing - OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AZ-001 &lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-002 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-003 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
| OWASP-0503&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Business logic testing - OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-BL-001 &lt;br /&gt;
| Testing for business logic &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Data Validation Testing - OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DV-001 &lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-002 &lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
| OWASP-0702&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-003 &lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
| OWASP-0703&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-004 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
| OWASP-0704&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-005 &lt;br /&gt;
| SQL Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-006 &lt;br /&gt;
| LDAP Injection &lt;br /&gt;
| OWASP-0706&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-007 &lt;br /&gt;
| ORM Injection &lt;br /&gt;
| OWASP-0707&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-008 &lt;br /&gt;
| XML Injection &lt;br /&gt;
| OWASP-0708&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-009 &lt;br /&gt;
| SSI Injection &lt;br /&gt;
| OWASP-0709&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-010 &lt;br /&gt;
| XPath Injection &lt;br /&gt;
| OWASP-0710&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-011 &lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
| OWASP-0711&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-012 &lt;br /&gt;
| Code Injection &lt;br /&gt;
| OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-013 &lt;br /&gt;
| OS Commanding &lt;br /&gt;
| OWASP-0713&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-014 &lt;br /&gt;
| Buffer overflow &lt;br /&gt;
| OWASP-0714&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-015 &lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
| OWASP-0715&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-016 &lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
| OWASP-0716&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Denial of Service Testing - OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DS-001 &lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-002 &lt;br /&gt;
| Locking Customer Accounts &lt;br /&gt;
| OWASP-0802&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-003 &lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
| OWASP-0803&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-004 &lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
| OWASP-0804&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-005 &lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
| OWASP-0805&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-006 &lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
| OWASP-0806&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-007 &lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
| OWASP-0807&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-008 &lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
| OWASP-0808&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Services Testing - OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-WS-001 &lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-002 &lt;br /&gt;
| Testing WSDL &lt;br /&gt;
| OWASP-0902&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-003 &lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
| OWASP-0903&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-004 &lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
| OWASP-0904&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-005 &lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
| OWASP-0905&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-006 &lt;br /&gt;
| Naughty SOAP attachments &lt;br /&gt;
| OWASP-0906&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-007 &lt;br /&gt;
| Replay Testing &lt;br /&gt;
| OWASP-0907&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''AJAX Testing - OWASP-10'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AJ-001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
| OWASP-1001&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AJ-002 &lt;br /&gt;
| AJAX Testing &lt;br /&gt;
| OWASP-1002&lt;br /&gt;
|}&lt;br /&gt;
== Mapping to Top 10 2010 IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| A1 &lt;br /&gt;
| Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
OWASP-0706&lt;br /&gt;
&lt;br /&gt;
OWASP-0707&lt;br /&gt;
&lt;br /&gt;
OWASP-0708&lt;br /&gt;
&lt;br /&gt;
OWASP-0709&lt;br /&gt;
&lt;br /&gt;
OWASP-0710&lt;br /&gt;
&lt;br /&gt;
OWASP-0711&lt;br /&gt;
&lt;br /&gt;
OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| A2 &lt;br /&gt;
| Cross Site Scripting &lt;br /&gt;
| OWASP-0701 &lt;br /&gt;
OWASP-0702&lt;br /&gt;
&lt;br /&gt;
OWASP-0703&lt;br /&gt;
&lt;br /&gt;
OWASP-0704 &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A3 &lt;br /&gt;
| Broken Authentication and Session Management&lt;br /&gt;
| OWASP-03&lt;br /&gt;
&lt;br /&gt;
OWASP-04&lt;br /&gt;
|-&lt;br /&gt;
| A4 &lt;br /&gt;
| Insecure Direct Object References &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| A5 &lt;br /&gt;
| Cross Site Request Forgery&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| A6&lt;br /&gt;
| Security Misconfiguration&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
&lt;br /&gt;
OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| A7&lt;br /&gt;
| Failure to Restrict URL Access&lt;br /&gt;
| OWASP-05&lt;br /&gt;
|-&lt;br /&gt;
| A8&lt;br /&gt;
| Unvalidated Redirects and Forwards&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
|-&lt;br /&gt;
| A9&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
|-&lt;br /&gt;
| A10&lt;br /&gt;
| Insufficient Transport Layer Protection&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*adding the (release) year into the numbering scheme can be problematic, because the document has a life cycle that goes over years .... &lt;br /&gt;
*One should rather try to accommodate a versioning scheme that is human readable in the reference number as well (e.g. V02, or RevA, or...)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*don't try to encode any information into the ID that is likely to change or be subject to debate. In the olden days of CVE, we used to have &amp;quot;CAN-1999-0067&amp;quot; which would change into &amp;quot;CVE-1999-0067&amp;quot; once the item was considered stable and sufficiently verified. That made the ID hard to use. Right now, OWASP-DV-001 encodes the term &amp;quot;data validation&amp;quot; in the DV acronym, but what happens if in a couple of years, some new and better term occurs, or the focus changes from validation to something else? (As an example, it's only recently that the &amp;quot;data validation&amp;quot; term itself has become popular.)&lt;br /&gt;
&lt;br /&gt;
*carefully consider the range of values that your ID space supports, and if possible, allow it to expand. CVE has a &amp;quot;CVE-10K&amp;quot; problem because we never expected that we would ever come close to tracking 10,000 vulnerabilities a year. Red Hat had to change their advisory numbering scheme a couple years ago. etc.&lt;br /&gt;
&lt;br /&gt;
*don't change the fundamental meaning of the ID once you've assigned it. This causes confusion, and more importantly, it immediately invalidates almost everyone's mappings to that ID - including people who you don't even know are using that ID.&lt;br /&gt;
&lt;br /&gt;
*closely monitor the mappings that get made. Typos and misunderstandings are rarely caught. People may make assumptions about what &amp;quot;the item&amp;quot; really is, based only on a quick scan of a short name or title. Since you're dealing with diverse sources, there are likely to be many-to-many relationships in dealing with mappings.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for handling duplicates. They're gonna happen.&lt;br /&gt;
&lt;br /&gt;
*the more you distribute the process of creating and assigning IDs between multiple people, the more inconsistencies and duplicates you will wind up with. This may be unavoidable, since the job is usually bigger than one person.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for deprecating IDs, i.e., &amp;quot;retiring&amp;quot; them and discouraging their use by others. This will probably happen for reasons other than duplicates. There should be some final record, somewhere, of what happened to the deprecated item - i.e., it shouldn't just disappear off the face of the earth.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Much of the discussion surrounding the establishment of &amp;quot;Common OWASP Numbering&amp;quot; can be found on the various [https://lists.owasp.org/mailman/listinfo OWASP mailing lists]. (For your convenience here is a direct link to the [https://lists.owasp.org/pipermail/owasp-testing/ OWASP Testing Guide Mailing List Archive].) &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Verification_Standard_Project]] [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76212</id>
		<title>OWASP Common Numbering Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76212"/>
				<updated>2010-01-14T00:56:38Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Introduction */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
Here is the generally agreed-upon new numbering scheme. Additional explanatory text coming soon. Questions/Comments? Email [mailto:mike.boberski@owasp.org Mike] or [mailto:brad.causey@owasp.org Brad]. . &lt;br /&gt;
&lt;br /&gt;
 OWASP-06&lt;br /&gt;
 OWASP-06-DEPRECATED &lt;br /&gt;
 OWASP-0604&lt;br /&gt;
 OWASP-0604-DEPRECATED&lt;br /&gt;
 OWASP-0604-DG&lt;br /&gt;
 OWASP-0604-DG-01&lt;br /&gt;
 OWASP-0604-TG&lt;br /&gt;
 OWASP-0604-TG-DV-005&lt;br /&gt;
 OWASP-0604-TG-DV-005-DEPRECATED&lt;br /&gt;
&lt;br /&gt;
 0123456789012345678901234567890123456789&lt;br /&gt;
           1         2         3&lt;br /&gt;
&lt;br /&gt;
*0-4 OWASP &lt;br /&gt;
*6-7 Detailed requirement identifier (major) &lt;br /&gt;
*8-9 Detailed requirement identifier (minor) &lt;br /&gt;
*11-12 Document code (DG=Development Guide, TG=Testing Guide, CG=Code Review Guide, AR, ED, RM, OR, others reserved) &lt;br /&gt;
*14-40 (Optional: DEPRECATED, or # for iterations, or legacy identifiers)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Primary OWASP CWVN Table (DRAFT)  ==&lt;br /&gt;
This table outlines the OWASP Common Web Vulnerability Numbering(CWVN)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''COVN Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Description'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| '''Information Gathering'''&lt;br /&gt;
| '''OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0102&lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0103&lt;br /&gt;
| Identify application entry points &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0104&lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0105&lt;br /&gt;
| Application Discovery &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0106&lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
|-&lt;br /&gt;
|'''Configuration Management Testing'''&lt;br /&gt;
|'''OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0202&lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0204&lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0205&lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0206&lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0207 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0208 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
|-&lt;br /&gt;
|'''Authentication Testing'''&lt;br /&gt;
|'''OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0301&lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0302&lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0303&lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0304&lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0305&lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0306&lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0307&lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0308&lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0309 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0310&lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
|-&lt;br /&gt;
|'''Session Management'''&lt;br /&gt;
|'''OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0401&lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0402&lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0403&lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0404&lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
|-&lt;br /&gt;
|'''Authorization Testing'''&lt;br /&gt;
|'''OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0502 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0503 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
|-&lt;br /&gt;
|'''Business logic testing'''&lt;br /&gt;
|'''OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
| Testing for business logic &lt;br /&gt;
|-&lt;br /&gt;
|'''Data Validation Testing'''&lt;br /&gt;
|'''OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0702&lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0703&lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0704 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0705&lt;br /&gt;
| SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0706&lt;br /&gt;
| LDAP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0707&lt;br /&gt;
| ORM Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0708&lt;br /&gt;
| XML Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0709&lt;br /&gt;
| SSI Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0710&lt;br /&gt;
| XPath Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0711&lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0712&lt;br /&gt;
| Code Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0713&lt;br /&gt;
| OS Commanding &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0714&lt;br /&gt;
| Buffer overflow &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0715&lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0716&lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
| Unvalidated Redirects and Forwards &lt;br /&gt;
|-&lt;br /&gt;
|'''Denial of Service Testing'''&lt;br /&gt;
|'''OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0802&lt;br /&gt;
| Locking User Accounts &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0803&lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0804&lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0805&lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0806&lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0807&lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0808&lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
|-&lt;br /&gt;
|'''Web Services Testing'''&lt;br /&gt;
|'''OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0902&lt;br /&gt;
| Testing WSDL &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0903&lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0904&lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0905&lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0906 &lt;br /&gt;
| Malicious SOAP attachments &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0907&lt;br /&gt;
| Replay Testing &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-10'''&lt;br /&gt;
|'''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-1001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-1002  &lt;br /&gt;
| AJAX Testing&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Legacy Testing Guide IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Test Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Information Gathering - OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-001 &lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-002 &lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
| OWASP-0102&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-003 &lt;br /&gt;
| Identify application entry points &lt;br /&gt;
| OWASP-0103&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-004 &lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
| OWASP-0104&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-005 &lt;br /&gt;
| Application Discovery &lt;br /&gt;
| OWASP-0105&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-006 &lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
| OWASP-0106&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Configuration Management Testing - OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-001 &lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-002 &lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
| OWASP-0202&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-003 &lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
| OWASP-0203&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-004 &lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
| OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-005 &lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
| OWASP-0205&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-006 &lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
| OWASP-0206&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-007 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
| OWASP-0207&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-008 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
| OWASP-0208&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authentication Testing - OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-001 &lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
| OWASP-0301&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-002 &lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
| OWASP-0302&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-003 &lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
| OWASP-0303&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-004 &lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
| OWASP-0304&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-005 &lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
| OWASP-0305&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-006 &lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
| OWASP-0306&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-007 &lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
| OWASP-0307&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-008 &lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
| OWASP-0308&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-009 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
| OWASP-0309&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-010 &lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
| OWASP-0310&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Session Management - OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-001 &lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
| OWASP-0401&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-002 &lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
| OWASP-0402&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-003 &lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
| OWASP-0403&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-004 &lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
| OWASP-0404&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-005 &lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authorization Testing - OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AZ-001 &lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-002 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-003 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
| OWASP-0503&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Business logic testing - OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-BL-001 &lt;br /&gt;
| Testing for business logic &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Data Validation Testing - OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DV-001 &lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-002 &lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
| OWASP-0702&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-003 &lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
| OWASP-0703&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-004 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
| OWASP-0704&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-005 &lt;br /&gt;
| SQL Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-006 &lt;br /&gt;
| LDAP Injection &lt;br /&gt;
| OWASP-0706&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-007 &lt;br /&gt;
| ORM Injection &lt;br /&gt;
| OWASP-0707&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-008 &lt;br /&gt;
| XML Injection &lt;br /&gt;
| OWASP-0708&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-009 &lt;br /&gt;
| SSI Injection &lt;br /&gt;
| OWASP-0709&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-010 &lt;br /&gt;
| XPath Injection &lt;br /&gt;
| OWASP-0710&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-011 &lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
| OWASP-0711&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-012 &lt;br /&gt;
| Code Injection &lt;br /&gt;
| OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-013 &lt;br /&gt;
| OS Commanding &lt;br /&gt;
| OWASP-0713&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-014 &lt;br /&gt;
| Buffer overflow &lt;br /&gt;
| OWASP-0714&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-015 &lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
| OWASP-0715&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-016 &lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
| OWASP-0716&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Denial of Service Testing - OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DS-001 &lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-002 &lt;br /&gt;
| Locking Customer Accounts &lt;br /&gt;
| OWASP-0802&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-003 &lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
| OWASP-0803&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-004 &lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
| OWASP-0804&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-005 &lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
| OWASP-0805&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-006 &lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
| OWASP-0806&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-007 &lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
| OWASP-0807&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-008 &lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
| OWASP-0808&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Services Testing - OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-WS-001 &lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-002 &lt;br /&gt;
| Testing WSDL &lt;br /&gt;
| OWASP-0902&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-003 &lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
| OWASP-0903&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-004 &lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
| OWASP-0904&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-005 &lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
| OWASP-0905&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-006 &lt;br /&gt;
| Naughty SOAP attachments &lt;br /&gt;
| OWASP-0906&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-007 &lt;br /&gt;
| Replay Testing &lt;br /&gt;
| OWASP-0907&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''AJAX Testing - OWASP-10'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AJ-001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
| OWASP-1001&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AJ-002 &lt;br /&gt;
| AJAX Testing &lt;br /&gt;
| OWASP-1002&lt;br /&gt;
|}&lt;br /&gt;
== Mapping to Top 10 2010 IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| A1 &lt;br /&gt;
| Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
OWASP-0706&lt;br /&gt;
&lt;br /&gt;
OWASP-0707&lt;br /&gt;
&lt;br /&gt;
OWASP-0708&lt;br /&gt;
&lt;br /&gt;
OWASP-0709&lt;br /&gt;
&lt;br /&gt;
OWASP-0710&lt;br /&gt;
&lt;br /&gt;
OWASP-0711&lt;br /&gt;
&lt;br /&gt;
OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| A2 &lt;br /&gt;
| Cross Site Scripting &lt;br /&gt;
| OWASP-0701 &lt;br /&gt;
OWASP-0702&lt;br /&gt;
&lt;br /&gt;
OWASP-0703&lt;br /&gt;
&lt;br /&gt;
OWASP-0704 &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A3 &lt;br /&gt;
| Broken Authentication and Session Management&lt;br /&gt;
| OWASP-03&lt;br /&gt;
&lt;br /&gt;
OWASP-04&lt;br /&gt;
|-&lt;br /&gt;
| A4 &lt;br /&gt;
| Insecure Direct Object References &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| A5 &lt;br /&gt;
| Cross Site Request Forgery&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| A6&lt;br /&gt;
| Security Misconfiguration&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
&lt;br /&gt;
OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| A7&lt;br /&gt;
| Failure to Restrict URL Access&lt;br /&gt;
| OWASP-05&lt;br /&gt;
|-&lt;br /&gt;
| A8&lt;br /&gt;
| Unvalidated Redirects and Forwards&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
|-&lt;br /&gt;
| A9&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
|-&lt;br /&gt;
| A10&lt;br /&gt;
| Insufficient Transport Layer Protection&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*adding the (release) year into the numbering scheme can be problematic, because the document has a life cycle that goes over years .... &lt;br /&gt;
*One should rather try to accommodate a versioning scheme that is human readable in the reference number as well (e.g. V02, or RevA, or...)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*don't try to encode any information into the ID that is likely to change or be subject to debate. In the olden days of CVE, we used to have &amp;quot;CAN-1999-0067&amp;quot; which would change into &amp;quot;CVE-1999-0067&amp;quot; once the item was considered stable and sufficiently verified. That made the ID hard to use. Right now, OWASP-DV-001 encodes the term &amp;quot;data validation&amp;quot; in the DV acronym, but what happens if in a couple of years, some new and better term occurs, or the focus changes from validation to something else? (As an example, it's only recently that the &amp;quot;data validation&amp;quot; term itself has become popular.)&lt;br /&gt;
&lt;br /&gt;
*carefully consider the range of values that your ID space supports, and if possible, allow it to expand. CVE has a &amp;quot;CVE-10K&amp;quot; problem because we never expected that we would ever come close to tracking 10,000 vulnerabilities a year. Red Hat had to change their advisory numbering scheme a couple years ago. etc.&lt;br /&gt;
&lt;br /&gt;
*don't change the fundamental meaning of the ID once you've assigned it. This causes confusion, and more importantly, it immediately invalidates almost everyone's mappings to that ID - including people who you don't even know are using that ID.&lt;br /&gt;
&lt;br /&gt;
*closely monitor the mappings that get made. Typos and misunderstandings are rarely caught. People may make assumptions about what &amp;quot;the item&amp;quot; really is, based only on a quick scan of a short name or title. Since you're dealing with diverse sources, there are likely to be many-to-many relationships in dealing with mappings.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for handling duplicates. They're gonna happen.&lt;br /&gt;
&lt;br /&gt;
*the more you distribute the process of creating and assigning IDs between multiple people, the more inconsistencies and duplicates you will wind up with. This may be unavoidable, since the job is usually bigger than one person.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for deprecating IDs, i.e., &amp;quot;retiring&amp;quot; them and discouraging their use by others. This will probably happen for reasons other than duplicates. There should be some final record, somewhere, of what happened to the deprecated item - i.e., it shouldn't just disappear off the face of the earth.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Much of the discussion surrounding the establishment of &amp;quot;Common OWASP Numbering&amp;quot; can be found on the various [https://lists.owasp.org/mailman/listinfo OWASP mailing lists]. (For your convenience here is a direct link to the [https://lists.owasp.org/pipermail/owasp-testing/ OWASP Testing Guide Mailing List Archive].) &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Verification_Standard_Project]] [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76211</id>
		<title>OWASP Common Numbering Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76211"/>
				<updated>2010-01-14T00:56:27Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
Here is the generally agreed-upon new numbering scheme. Additional explanatory text coming soon. Questions/Comments? Email [mailto:mike.boberski@owasp.org Mike]or [mailto:brad.causey@owasp.org Brad]. . &lt;br /&gt;
&lt;br /&gt;
 OWASP-06&lt;br /&gt;
 OWASP-06-DEPRECATED &lt;br /&gt;
 OWASP-0604&lt;br /&gt;
 OWASP-0604-DEPRECATED&lt;br /&gt;
 OWASP-0604-DG&lt;br /&gt;
 OWASP-0604-DG-01&lt;br /&gt;
 OWASP-0604-TG&lt;br /&gt;
 OWASP-0604-TG-DV-005&lt;br /&gt;
 OWASP-0604-TG-DV-005-DEPRECATED&lt;br /&gt;
&lt;br /&gt;
 0123456789012345678901234567890123456789&lt;br /&gt;
           1         2         3&lt;br /&gt;
&lt;br /&gt;
*0-4 OWASP &lt;br /&gt;
*6-7 Detailed requirement identifier (major) &lt;br /&gt;
*8-9 Detailed requirement identifier (minor) &lt;br /&gt;
*11-12 Document code (DG=Development Guide, TG=Testing Guide, CG=Code Review Guide, AR, ED, RM, OR, others reserved) &lt;br /&gt;
*14-40 (Optional: DEPRECATED, or # for iterations, or legacy identifiers)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Primary OWASP CWVN Table (DRAFT)  ==&lt;br /&gt;
This table outlines the OWASP Common Web Vulnerability Numbering(CWVN)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''COVN Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Description'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| '''Information Gathering'''&lt;br /&gt;
| '''OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0102&lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0103&lt;br /&gt;
| Identify application entry points &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0104&lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0105&lt;br /&gt;
| Application Discovery &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0106&lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
|-&lt;br /&gt;
|'''Configuration Management Testing'''&lt;br /&gt;
|'''OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0202&lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0204&lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0205&lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0206&lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0207 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0208 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
|-&lt;br /&gt;
|'''Authentication Testing'''&lt;br /&gt;
|'''OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0301&lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0302&lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0303&lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0304&lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0305&lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0306&lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0307&lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0308&lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0309 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0310&lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
|-&lt;br /&gt;
|'''Session Management'''&lt;br /&gt;
|'''OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0401&lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0402&lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0403&lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0404&lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
|-&lt;br /&gt;
|'''Authorization Testing'''&lt;br /&gt;
|'''OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0502 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0503 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
|-&lt;br /&gt;
|'''Business logic testing'''&lt;br /&gt;
|'''OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
| Testing for business logic &lt;br /&gt;
|-&lt;br /&gt;
|'''Data Validation Testing'''&lt;br /&gt;
|'''OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0702&lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0703&lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0704 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0705&lt;br /&gt;
| SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0706&lt;br /&gt;
| LDAP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0707&lt;br /&gt;
| ORM Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0708&lt;br /&gt;
| XML Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0709&lt;br /&gt;
| SSI Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0710&lt;br /&gt;
| XPath Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0711&lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0712&lt;br /&gt;
| Code Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0713&lt;br /&gt;
| OS Commanding &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0714&lt;br /&gt;
| Buffer overflow &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0715&lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0716&lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
| Unvalidated Redirects and Forwards &lt;br /&gt;
|-&lt;br /&gt;
|'''Denial of Service Testing'''&lt;br /&gt;
|'''OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0802&lt;br /&gt;
| Locking User Accounts &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0803&lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0804&lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0805&lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0806&lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0807&lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0808&lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
|-&lt;br /&gt;
|'''Web Services Testing'''&lt;br /&gt;
|'''OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0902&lt;br /&gt;
| Testing WSDL &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0903&lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0904&lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0905&lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0906 &lt;br /&gt;
| Malicious SOAP attachments &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0907&lt;br /&gt;
| Replay Testing &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-10'''&lt;br /&gt;
|'''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-1001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-1002  &lt;br /&gt;
| AJAX Testing&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Legacy Testing Guide IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Test Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Information Gathering - OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-001 &lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-002 &lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
| OWASP-0102&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-003 &lt;br /&gt;
| Identify application entry points &lt;br /&gt;
| OWASP-0103&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-004 &lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
| OWASP-0104&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-005 &lt;br /&gt;
| Application Discovery &lt;br /&gt;
| OWASP-0105&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-006 &lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
| OWASP-0106&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Configuration Management Testing - OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-001 &lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-002 &lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
| OWASP-0202&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-003 &lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
| OWASP-0203&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-004 &lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
| OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-005 &lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
| OWASP-0205&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-006 &lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
| OWASP-0206&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-007 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
| OWASP-0207&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-008 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
| OWASP-0208&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authentication Testing - OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-001 &lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
| OWASP-0301&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-002 &lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
| OWASP-0302&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-003 &lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
| OWASP-0303&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-004 &lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
| OWASP-0304&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-005 &lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
| OWASP-0305&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-006 &lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
| OWASP-0306&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-007 &lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
| OWASP-0307&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-008 &lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
| OWASP-0308&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-009 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
| OWASP-0309&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-010 &lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
| OWASP-0310&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Session Management - OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-001 &lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
| OWASP-0401&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-002 &lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
| OWASP-0402&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-003 &lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
| OWASP-0403&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-004 &lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
| OWASP-0404&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-005 &lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authorization Testing - OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AZ-001 &lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-002 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-003 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
| OWASP-0503&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Business logic testing - OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-BL-001 &lt;br /&gt;
| Testing for business logic &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Data Validation Testing - OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DV-001 &lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-002 &lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
| OWASP-0702&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-003 &lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
| OWASP-0703&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-004 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
| OWASP-0704&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-005 &lt;br /&gt;
| SQL Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-006 &lt;br /&gt;
| LDAP Injection &lt;br /&gt;
| OWASP-0706&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-007 &lt;br /&gt;
| ORM Injection &lt;br /&gt;
| OWASP-0707&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-008 &lt;br /&gt;
| XML Injection &lt;br /&gt;
| OWASP-0708&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-009 &lt;br /&gt;
| SSI Injection &lt;br /&gt;
| OWASP-0709&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-010 &lt;br /&gt;
| XPath Injection &lt;br /&gt;
| OWASP-0710&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-011 &lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
| OWASP-0711&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-012 &lt;br /&gt;
| Code Injection &lt;br /&gt;
| OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-013 &lt;br /&gt;
| OS Commanding &lt;br /&gt;
| OWASP-0713&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-014 &lt;br /&gt;
| Buffer overflow &lt;br /&gt;
| OWASP-0714&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-015 &lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
| OWASP-0715&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-016 &lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
| OWASP-0716&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Denial of Service Testing - OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DS-001 &lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-002 &lt;br /&gt;
| Locking Customer Accounts &lt;br /&gt;
| OWASP-0802&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-003 &lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
| OWASP-0803&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-004 &lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
| OWASP-0804&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-005 &lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
| OWASP-0805&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-006 &lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
| OWASP-0806&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-007 &lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
| OWASP-0807&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-008 &lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
| OWASP-0808&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Services Testing - OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-WS-001 &lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-002 &lt;br /&gt;
| Testing WSDL &lt;br /&gt;
| OWASP-0902&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-003 &lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
| OWASP-0903&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-004 &lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
| OWASP-0904&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-005 &lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
| OWASP-0905&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-006 &lt;br /&gt;
| Naughty SOAP attachments &lt;br /&gt;
| OWASP-0906&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-007 &lt;br /&gt;
| Replay Testing &lt;br /&gt;
| OWASP-0907&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''AJAX Testing - OWASP-10'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AJ-001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
| OWASP-1001&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AJ-002 &lt;br /&gt;
| AJAX Testing &lt;br /&gt;
| OWASP-1002&lt;br /&gt;
|}&lt;br /&gt;
== Mapping to Top 10 2010 IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| A1 &lt;br /&gt;
| Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
OWASP-0706&lt;br /&gt;
&lt;br /&gt;
OWASP-0707&lt;br /&gt;
&lt;br /&gt;
OWASP-0708&lt;br /&gt;
&lt;br /&gt;
OWASP-0709&lt;br /&gt;
&lt;br /&gt;
OWASP-0710&lt;br /&gt;
&lt;br /&gt;
OWASP-0711&lt;br /&gt;
&lt;br /&gt;
OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| A2 &lt;br /&gt;
| Cross Site Scripting &lt;br /&gt;
| OWASP-0701 &lt;br /&gt;
OWASP-0702&lt;br /&gt;
&lt;br /&gt;
OWASP-0703&lt;br /&gt;
&lt;br /&gt;
OWASP-0704 &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A3 &lt;br /&gt;
| Broken Authentication and Session Management&lt;br /&gt;
| OWASP-03&lt;br /&gt;
&lt;br /&gt;
OWASP-04&lt;br /&gt;
|-&lt;br /&gt;
| A4 &lt;br /&gt;
| Insecure Direct Object References &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| A5 &lt;br /&gt;
| Cross Site Request Forgery&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| A6&lt;br /&gt;
| Security Misconfiguration&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
&lt;br /&gt;
OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| A7&lt;br /&gt;
| Failure to Restrict URL Access&lt;br /&gt;
| OWASP-05&lt;br /&gt;
|-&lt;br /&gt;
| A8&lt;br /&gt;
| Unvalidated Redirects and Forwards&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
|-&lt;br /&gt;
| A9&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
|-&lt;br /&gt;
| A10&lt;br /&gt;
| Insufficient Transport Layer Protection&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*adding the (release) year into the numbering scheme can be problematic, because the document has a life cycle that goes over years .... &lt;br /&gt;
*One should rather try to accommodate a versioning scheme that is human readable in the reference number as well (e.g. V02, or RevA, or...)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*don't try to encode any information into the ID that is likely to change or be subject to debate. In the olden days of CVE, we used to have &amp;quot;CAN-1999-0067&amp;quot; which would change into &amp;quot;CVE-1999-0067&amp;quot; once the item was considered stable and sufficiently verified. That made the ID hard to use. Right now, OWASP-DV-001 encodes the term &amp;quot;data validation&amp;quot; in the DV acronym, but what happens if in a couple of years, some new and better term occurs, or the focus changes from validation to something else? (As an example, it's only recently that the &amp;quot;data validation&amp;quot; term itself has become popular.)&lt;br /&gt;
&lt;br /&gt;
*carefully consider the range of values that your ID space supports, and if possible, allow it to expand. CVE has a &amp;quot;CVE-10K&amp;quot; problem because we never expected that we would ever come close to tracking 10,000 vulnerabilities a year. Red Hat had to change their advisory numbering scheme a couple years ago. etc.&lt;br /&gt;
&lt;br /&gt;
*don't change the fundamental meaning of the ID once you've assigned it. This causes confusion, and more importantly, it immediately invalidates almost everyone's mappings to that ID - including people who you don't even know are using that ID.&lt;br /&gt;
&lt;br /&gt;
*closely monitor the mappings that get made. Typos and misunderstandings are rarely caught. People may make assumptions about what &amp;quot;the item&amp;quot; really is, based only on a quick scan of a short name or title. Since you're dealing with diverse sources, there are likely to be many-to-many relationships in dealing with mappings.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for handling duplicates. They're gonna happen.&lt;br /&gt;
&lt;br /&gt;
*the more you distribute the process of creating and assigning IDs between multiple people, the more inconsistencies and duplicates you will wind up with. This may be unavoidable, since the job is usually bigger than one person.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for deprecating IDs, i.e., &amp;quot;retiring&amp;quot; them and discouraging their use by others. This will probably happen for reasons other than duplicates. There should be some final record, somewhere, of what happened to the deprecated item - i.e., it shouldn't just disappear off the face of the earth.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Much of the discussion surrounding the establishment of &amp;quot;Common OWASP Numbering&amp;quot; can be found on the various [https://lists.owasp.org/mailman/listinfo OWASP mailing lists]. (For your convenience here is a direct link to the [https://lists.owasp.org/pipermail/owasp-testing/ OWASP Testing Guide Mailing List Archive].) &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Verification_Standard_Project]] [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76210</id>
		<title>OWASP Common Numbering Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76210"/>
				<updated>2010-01-14T00:54:38Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Primary COVN Table (DRAFT) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
Here is the generally agreed-upon new numbering scheme. Additional explanatory text coming soon. Questions/Comments? Email [mailto:mike.boberski@owasp.org Mike]. &lt;br /&gt;
&lt;br /&gt;
 OWASP-06&lt;br /&gt;
 OWASP-06-DEPRECATED &lt;br /&gt;
 OWASP-0604&lt;br /&gt;
 OWASP-0604-DEPRECATED&lt;br /&gt;
 OWASP-0604-DG&lt;br /&gt;
 OWASP-0604-DG-01&lt;br /&gt;
 OWASP-0604-TG&lt;br /&gt;
 OWASP-0604-TG-DV-005&lt;br /&gt;
 OWASP-0604-TG-DV-005-DEPRECATED&lt;br /&gt;
&lt;br /&gt;
 0123456789012345678901234567890123456789&lt;br /&gt;
           1         2         3&lt;br /&gt;
&lt;br /&gt;
*0-4 OWASP &lt;br /&gt;
*6-7 Detailed requirement identifier (major) &lt;br /&gt;
*8-9 Detailed requirement identifier (minor) &lt;br /&gt;
*11-12 Document code (DG=Development Guide, TG=Testing Guide, CG=Code Review Guide, AR, ED, RM, OR, others reserved) &lt;br /&gt;
*14-40 (Optional: DEPRECATED, or # for iterations, or legacy identifiers)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Primary OWASP CWVN Table (DRAFT)  ==&lt;br /&gt;
This table outlines the OWASP Common Web Vulnerability Numbering(CWVN)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''COVN Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Description'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| '''Information Gathering'''&lt;br /&gt;
| '''OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0102&lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0103&lt;br /&gt;
| Identify application entry points &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0104&lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0105&lt;br /&gt;
| Application Discovery &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0106&lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
|-&lt;br /&gt;
|'''Configuration Management Testing'''&lt;br /&gt;
|'''OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0202&lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0204&lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0205&lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0206&lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0207 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0208 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
|-&lt;br /&gt;
|'''Authentication Testing'''&lt;br /&gt;
|'''OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0301&lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0302&lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0303&lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0304&lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0305&lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0306&lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0307&lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0308&lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0309 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0310&lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
|-&lt;br /&gt;
|'''Session Management'''&lt;br /&gt;
|'''OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0401&lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0402&lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0403&lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0404&lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
|-&lt;br /&gt;
|'''Authorization Testing'''&lt;br /&gt;
|'''OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0502 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0503 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
|-&lt;br /&gt;
|'''Business logic testing'''&lt;br /&gt;
|'''OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
| Testing for business logic &lt;br /&gt;
|-&lt;br /&gt;
|'''Data Validation Testing'''&lt;br /&gt;
|'''OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0702&lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0703&lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0704 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0705&lt;br /&gt;
| SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0706&lt;br /&gt;
| LDAP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0707&lt;br /&gt;
| ORM Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0708&lt;br /&gt;
| XML Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0709&lt;br /&gt;
| SSI Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0710&lt;br /&gt;
| XPath Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0711&lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0712&lt;br /&gt;
| Code Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0713&lt;br /&gt;
| OS Commanding &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0714&lt;br /&gt;
| Buffer overflow &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0715&lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0716&lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
| Unvalidated Redirects and Forwards &lt;br /&gt;
|-&lt;br /&gt;
|'''Denial of Service Testing'''&lt;br /&gt;
|'''OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0802&lt;br /&gt;
| Locking User Accounts &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0803&lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0804&lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0805&lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0806&lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0807&lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0808&lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
|-&lt;br /&gt;
|'''Web Services Testing'''&lt;br /&gt;
|'''OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0902&lt;br /&gt;
| Testing WSDL &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0903&lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0904&lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0905&lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0906 &lt;br /&gt;
| Malicious SOAP attachments &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0907&lt;br /&gt;
| Replay Testing &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-10'''&lt;br /&gt;
|'''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-1001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-1002  &lt;br /&gt;
| AJAX Testing&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Legacy Testing Guide IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Test Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Information Gathering - OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-001 &lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-002 &lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
| OWASP-0102&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-003 &lt;br /&gt;
| Identify application entry points &lt;br /&gt;
| OWASP-0103&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-004 &lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
| OWASP-0104&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-005 &lt;br /&gt;
| Application Discovery &lt;br /&gt;
| OWASP-0105&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-006 &lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
| OWASP-0106&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Configuration Management Testing - OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-001 &lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-002 &lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
| OWASP-0202&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-003 &lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
| OWASP-0203&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-004 &lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
| OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-005 &lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
| OWASP-0205&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-006 &lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
| OWASP-0206&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-007 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
| OWASP-0207&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-008 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
| OWASP-0208&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authentication Testing - OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-001 &lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
| OWASP-0301&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-002 &lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
| OWASP-0302&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-003 &lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
| OWASP-0303&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-004 &lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
| OWASP-0304&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-005 &lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
| OWASP-0305&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-006 &lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
| OWASP-0306&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-007 &lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
| OWASP-0307&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-008 &lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
| OWASP-0308&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-009 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
| OWASP-0309&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-010 &lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
| OWASP-0310&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Session Management - OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-001 &lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
| OWASP-0401&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-002 &lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
| OWASP-0402&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-003 &lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
| OWASP-0403&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-004 &lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
| OWASP-0404&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-005 &lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authorization Testing - OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AZ-001 &lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-002 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-003 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
| OWASP-0503&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Business logic testing - OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-BL-001 &lt;br /&gt;
| Testing for business logic &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Data Validation Testing - OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DV-001 &lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-002 &lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
| OWASP-0702&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-003 &lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
| OWASP-0703&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-004 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
| OWASP-0704&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-005 &lt;br /&gt;
| SQL Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-006 &lt;br /&gt;
| LDAP Injection &lt;br /&gt;
| OWASP-0706&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-007 &lt;br /&gt;
| ORM Injection &lt;br /&gt;
| OWASP-0707&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-008 &lt;br /&gt;
| XML Injection &lt;br /&gt;
| OWASP-0708&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-009 &lt;br /&gt;
| SSI Injection &lt;br /&gt;
| OWASP-0709&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-010 &lt;br /&gt;
| XPath Injection &lt;br /&gt;
| OWASP-0710&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-011 &lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
| OWASP-0711&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-012 &lt;br /&gt;
| Code Injection &lt;br /&gt;
| OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-013 &lt;br /&gt;
| OS Commanding &lt;br /&gt;
| OWASP-0713&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-014 &lt;br /&gt;
| Buffer overflow &lt;br /&gt;
| OWASP-0714&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-015 &lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
| OWASP-0715&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-016 &lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
| OWASP-0716&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Denial of Service Testing - OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DS-001 &lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-002 &lt;br /&gt;
| Locking Customer Accounts &lt;br /&gt;
| OWASP-0802&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-003 &lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
| OWASP-0803&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-004 &lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
| OWASP-0804&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-005 &lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
| OWASP-0805&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-006 &lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
| OWASP-0806&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-007 &lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
| OWASP-0807&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-008 &lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
| OWASP-0808&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Services Testing - OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-WS-001 &lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-002 &lt;br /&gt;
| Testing WSDL &lt;br /&gt;
| OWASP-0902&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-003 &lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
| OWASP-0903&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-004 &lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
| OWASP-0904&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-005 &lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
| OWASP-0905&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-006 &lt;br /&gt;
| Naughty SOAP attachments &lt;br /&gt;
| OWASP-0906&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-007 &lt;br /&gt;
| Replay Testing &lt;br /&gt;
| OWASP-0907&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''AJAX Testing - OWASP-10'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AJ-001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
| OWASP-1001&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AJ-002 &lt;br /&gt;
| AJAX Testing &lt;br /&gt;
| OWASP-1002&lt;br /&gt;
|}&lt;br /&gt;
== Mapping to Top 10 2010 IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| A1 &lt;br /&gt;
| Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
OWASP-0706&lt;br /&gt;
&lt;br /&gt;
OWASP-0707&lt;br /&gt;
&lt;br /&gt;
OWASP-0708&lt;br /&gt;
&lt;br /&gt;
OWASP-0709&lt;br /&gt;
&lt;br /&gt;
OWASP-0710&lt;br /&gt;
&lt;br /&gt;
OWASP-0711&lt;br /&gt;
&lt;br /&gt;
OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| A2 &lt;br /&gt;
| Cross Site Scripting &lt;br /&gt;
| OWASP-0701 &lt;br /&gt;
OWASP-0702&lt;br /&gt;
&lt;br /&gt;
OWASP-0703&lt;br /&gt;
&lt;br /&gt;
OWASP-0704 &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A3 &lt;br /&gt;
| Broken Authentication and Session Management&lt;br /&gt;
| OWASP-03&lt;br /&gt;
&lt;br /&gt;
OWASP-04&lt;br /&gt;
|-&lt;br /&gt;
| A4 &lt;br /&gt;
| Insecure Direct Object References &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| A5 &lt;br /&gt;
| Cross Site Request Forgery&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| A6&lt;br /&gt;
| Security Misconfiguration&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
&lt;br /&gt;
OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| A7&lt;br /&gt;
| Failure to Restrict URL Access&lt;br /&gt;
| OWASP-05&lt;br /&gt;
|-&lt;br /&gt;
| A8&lt;br /&gt;
| Unvalidated Redirects and Forwards&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
|-&lt;br /&gt;
| A9&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
|-&lt;br /&gt;
| A10&lt;br /&gt;
| Insufficient Transport Layer Protection&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*adding the (release) year into the numbering scheme can be problematic, because the document has a life cycle that goes over years .... &lt;br /&gt;
*One should rather try to accommodate a versioning scheme that is human readable in the reference number as well (e.g. V02, or RevA, or...)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*don't try to encode any information into the ID that is likely to change or be subject to debate. In the olden days of CVE, we used to have &amp;quot;CAN-1999-0067&amp;quot; which would change into &amp;quot;CVE-1999-0067&amp;quot; once the item was considered stable and sufficiently verified. That made the ID hard to use. Right now, OWASP-DV-001 encodes the term &amp;quot;data validation&amp;quot; in the DV acronym, but what happens if in a couple of years, some new and better term occurs, or the focus changes from validation to something else? (As an example, it's only recently that the &amp;quot;data validation&amp;quot; term itself has become popular.)&lt;br /&gt;
&lt;br /&gt;
*carefully consider the range of values that your ID space supports, and if possible, allow it to expand. CVE has a &amp;quot;CVE-10K&amp;quot; problem because we never expected that we would ever come close to tracking 10,000 vulnerabilities a year. Red Hat had to change their advisory numbering scheme a couple years ago. etc.&lt;br /&gt;
&lt;br /&gt;
*don't change the fundamental meaning of the ID once you've assigned it. This causes confusion, and more importantly, it immediately invalidates almost everyone's mappings to that ID - including people who you don't even know are using that ID.&lt;br /&gt;
&lt;br /&gt;
*closely monitor the mappings that get made. Typos and misunderstandings are rarely caught. People may make assumptions about what &amp;quot;the item&amp;quot; really is, based only on a quick scan of a short name or title. Since you're dealing with diverse sources, there are likely to be many-to-many relationships in dealing with mappings.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for handling duplicates. They're gonna happen.&lt;br /&gt;
&lt;br /&gt;
*the more you distribute the process of creating and assigning IDs between multiple people, the more inconsistencies and duplicates you will wind up with. This may be unavoidable, since the job is usually bigger than one person.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for deprecating IDs, i.e., &amp;quot;retiring&amp;quot; them and discouraging their use by others. This will probably happen for reasons other than duplicates. There should be some final record, somewhere, of what happened to the deprecated item - i.e., it shouldn't just disappear off the face of the earth.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Much of the discussion surrounding the establishment of &amp;quot;Common OWASP Numbering&amp;quot; can be found on the various [https://lists.owasp.org/mailman/listinfo OWASP mailing lists]. (For your convenience here is a direct link to the [https://lists.owasp.org/pipermail/owasp-testing/ OWASP Testing Guide Mailing List Archive].) &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Verification_Standard_Project]] [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76209</id>
		<title>OWASP Common Numbering Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76209"/>
				<updated>2010-01-14T00:38:14Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Mapping to Top 10 2010 IDs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
Here is the generally agreed-upon new numbering scheme. Additional explanatory text coming soon. Questions/Comments? Email [mailto:mike.boberski@owasp.org Mike]. &lt;br /&gt;
&lt;br /&gt;
 OWASP-06&lt;br /&gt;
 OWASP-06-DEPRECATED &lt;br /&gt;
 OWASP-0604&lt;br /&gt;
 OWASP-0604-DEPRECATED&lt;br /&gt;
 OWASP-0604-DG&lt;br /&gt;
 OWASP-0604-DG-01&lt;br /&gt;
 OWASP-0604-TG&lt;br /&gt;
 OWASP-0604-TG-DV-005&lt;br /&gt;
 OWASP-0604-TG-DV-005-DEPRECATED&lt;br /&gt;
&lt;br /&gt;
 0123456789012345678901234567890123456789&lt;br /&gt;
           1         2         3&lt;br /&gt;
&lt;br /&gt;
*0-4 OWASP &lt;br /&gt;
*6-7 Detailed requirement identifier (major) &lt;br /&gt;
*8-9 Detailed requirement identifier (minor) &lt;br /&gt;
*11-12 Document code (DG=Development Guide, TG=Testing Guide, CG=Code Review Guide, AR, ED, RM, OR, others reserved) &lt;br /&gt;
*14-40 (Optional: DEPRECATED, or # for iterations, or legacy identifiers)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Primary COVN Table (DRAFT)  ==&lt;br /&gt;
This table outlines the Common OWASP Vulnerability Numbers (COVN)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''COVN Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Description'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| '''Information Gathering'''&lt;br /&gt;
| '''OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0102&lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0103&lt;br /&gt;
| Identify application entry points &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0104&lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0105&lt;br /&gt;
| Application Discovery &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0106&lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
|-&lt;br /&gt;
|'''Configuration Management Testing'''&lt;br /&gt;
|'''OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0202&lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0204&lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0205&lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0206&lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0207 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0208 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
|-&lt;br /&gt;
|'''Authentication Testing'''&lt;br /&gt;
|'''OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0301&lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0302&lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0303&lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0304&lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0305&lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0306&lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0307&lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0308&lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0309 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0310&lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
|-&lt;br /&gt;
|'''Session Management'''&lt;br /&gt;
|'''OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0401&lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0402&lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0403&lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0404&lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
|-&lt;br /&gt;
|'''Authorization Testing'''&lt;br /&gt;
|'''OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0502 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0503 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
|-&lt;br /&gt;
|'''Business logic testing'''&lt;br /&gt;
|'''OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
| Testing for business logic &lt;br /&gt;
|-&lt;br /&gt;
|'''Data Validation Testing'''&lt;br /&gt;
|'''OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0702&lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0703&lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0704 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0705&lt;br /&gt;
| SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0706&lt;br /&gt;
| LDAP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0707&lt;br /&gt;
| ORM Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0708&lt;br /&gt;
| XML Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0709&lt;br /&gt;
| SSI Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0710&lt;br /&gt;
| XPath Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0711&lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0712&lt;br /&gt;
| Code Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0713&lt;br /&gt;
| OS Commanding &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0714&lt;br /&gt;
| Buffer overflow &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0715&lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0716&lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
| Unvalidated Redirects and Forwards &lt;br /&gt;
|-&lt;br /&gt;
|'''Denial of Service Testing'''&lt;br /&gt;
|'''OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0802&lt;br /&gt;
| Locking User Accounts &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0803&lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0804&lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0805&lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0806&lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0807&lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0808&lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
|-&lt;br /&gt;
|'''Web Services Testing'''&lt;br /&gt;
|'''OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0902&lt;br /&gt;
| Testing WSDL &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0903&lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0904&lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0905&lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0906 &lt;br /&gt;
| Malicious SOAP attachments &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0907&lt;br /&gt;
| Replay Testing &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-10'''&lt;br /&gt;
|'''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-1001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-1002  &lt;br /&gt;
| AJAX Testing&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Legacy Testing Guide IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Test Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Information Gathering - OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-001 &lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-002 &lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
| OWASP-0102&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-003 &lt;br /&gt;
| Identify application entry points &lt;br /&gt;
| OWASP-0103&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-004 &lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
| OWASP-0104&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-005 &lt;br /&gt;
| Application Discovery &lt;br /&gt;
| OWASP-0105&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-006 &lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
| OWASP-0106&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Configuration Management Testing - OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-001 &lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-002 &lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
| OWASP-0202&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-003 &lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
| OWASP-0203&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-004 &lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
| OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-005 &lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
| OWASP-0205&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-006 &lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
| OWASP-0206&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-007 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
| OWASP-0207&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-008 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
| OWASP-0208&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authentication Testing - OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-001 &lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
| OWASP-0301&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-002 &lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
| OWASP-0302&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-003 &lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
| OWASP-0303&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-004 &lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
| OWASP-0304&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-005 &lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
| OWASP-0305&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-006 &lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
| OWASP-0306&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-007 &lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
| OWASP-0307&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-008 &lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
| OWASP-0308&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-009 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
| OWASP-0309&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-010 &lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
| OWASP-0310&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Session Management - OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-001 &lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
| OWASP-0401&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-002 &lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
| OWASP-0402&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-003 &lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
| OWASP-0403&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-004 &lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
| OWASP-0404&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-005 &lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authorization Testing - OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AZ-001 &lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-002 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-003 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
| OWASP-0503&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Business logic testing - OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-BL-001 &lt;br /&gt;
| Testing for business logic &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Data Validation Testing - OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DV-001 &lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-002 &lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
| OWASP-0702&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-003 &lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
| OWASP-0703&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-004 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
| OWASP-0704&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-005 &lt;br /&gt;
| SQL Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-006 &lt;br /&gt;
| LDAP Injection &lt;br /&gt;
| OWASP-0706&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-007 &lt;br /&gt;
| ORM Injection &lt;br /&gt;
| OWASP-0707&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-008 &lt;br /&gt;
| XML Injection &lt;br /&gt;
| OWASP-0708&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-009 &lt;br /&gt;
| SSI Injection &lt;br /&gt;
| OWASP-0709&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-010 &lt;br /&gt;
| XPath Injection &lt;br /&gt;
| OWASP-0710&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-011 &lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
| OWASP-0711&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-012 &lt;br /&gt;
| Code Injection &lt;br /&gt;
| OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-013 &lt;br /&gt;
| OS Commanding &lt;br /&gt;
| OWASP-0713&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-014 &lt;br /&gt;
| Buffer overflow &lt;br /&gt;
| OWASP-0714&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-015 &lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
| OWASP-0715&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-016 &lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
| OWASP-0716&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Denial of Service Testing - OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DS-001 &lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-002 &lt;br /&gt;
| Locking Customer Accounts &lt;br /&gt;
| OWASP-0802&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-003 &lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
| OWASP-0803&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-004 &lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
| OWASP-0804&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-005 &lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
| OWASP-0805&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-006 &lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
| OWASP-0806&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-007 &lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
| OWASP-0807&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-008 &lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
| OWASP-0808&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Services Testing - OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-WS-001 &lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-002 &lt;br /&gt;
| Testing WSDL &lt;br /&gt;
| OWASP-0902&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-003 &lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
| OWASP-0903&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-004 &lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
| OWASP-0904&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-005 &lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
| OWASP-0905&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-006 &lt;br /&gt;
| Naughty SOAP attachments &lt;br /&gt;
| OWASP-0906&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-007 &lt;br /&gt;
| Replay Testing &lt;br /&gt;
| OWASP-0907&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''AJAX Testing - OWASP-10'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AJ-001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
| OWASP-1001&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AJ-002 &lt;br /&gt;
| AJAX Testing &lt;br /&gt;
| OWASP-1002&lt;br /&gt;
|}&lt;br /&gt;
== Mapping to Top 10 2010 IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| A1 &lt;br /&gt;
| Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
OWASP-0706&lt;br /&gt;
&lt;br /&gt;
OWASP-0707&lt;br /&gt;
&lt;br /&gt;
OWASP-0708&lt;br /&gt;
&lt;br /&gt;
OWASP-0709&lt;br /&gt;
&lt;br /&gt;
OWASP-0710&lt;br /&gt;
&lt;br /&gt;
OWASP-0711&lt;br /&gt;
&lt;br /&gt;
OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| A2 &lt;br /&gt;
| Cross Site Scripting &lt;br /&gt;
| OWASP-0701 &lt;br /&gt;
OWASP-0702&lt;br /&gt;
&lt;br /&gt;
OWASP-0703&lt;br /&gt;
&lt;br /&gt;
OWASP-0704 &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A3 &lt;br /&gt;
| Broken Authentication and Session Management&lt;br /&gt;
| OWASP-03&lt;br /&gt;
&lt;br /&gt;
OWASP-04&lt;br /&gt;
|-&lt;br /&gt;
| A4 &lt;br /&gt;
| Insecure Direct Object References &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| A5 &lt;br /&gt;
| Cross Site Request Forgery&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| A6&lt;br /&gt;
| Security Misconfiguration&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
&lt;br /&gt;
OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| A7&lt;br /&gt;
| Failure to Restrict URL Access&lt;br /&gt;
| OWASP-05&lt;br /&gt;
|-&lt;br /&gt;
| A8&lt;br /&gt;
| Unvalidated Redirects and Forwards&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
|-&lt;br /&gt;
| A9&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
|-&lt;br /&gt;
| A10&lt;br /&gt;
| Insufficient Transport Layer Protection&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*adding the (release) year into the numbering scheme can be problematic, because the document has a life cycle that goes over years .... &lt;br /&gt;
*One should rather try to accommodate a versioning scheme that is human readable in the reference number as well (e.g. V02, or RevA, or...)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*don't try to encode any information into the ID that is likely to change or be subject to debate. In the olden days of CVE, we used to have &amp;quot;CAN-1999-0067&amp;quot; which would change into &amp;quot;CVE-1999-0067&amp;quot; once the item was considered stable and sufficiently verified. That made the ID hard to use. Right now, OWASP-DV-001 encodes the term &amp;quot;data validation&amp;quot; in the DV acronym, but what happens if in a couple of years, some new and better term occurs, or the focus changes from validation to something else? (As an example, it's only recently that the &amp;quot;data validation&amp;quot; term itself has become popular.)&lt;br /&gt;
&lt;br /&gt;
*carefully consider the range of values that your ID space supports, and if possible, allow it to expand. CVE has a &amp;quot;CVE-10K&amp;quot; problem because we never expected that we would ever come close to tracking 10,000 vulnerabilities a year. Red Hat had to change their advisory numbering scheme a couple years ago. etc.&lt;br /&gt;
&lt;br /&gt;
*don't change the fundamental meaning of the ID once you've assigned it. This causes confusion, and more importantly, it immediately invalidates almost everyone's mappings to that ID - including people who you don't even know are using that ID.&lt;br /&gt;
&lt;br /&gt;
*closely monitor the mappings that get made. Typos and misunderstandings are rarely caught. People may make assumptions about what &amp;quot;the item&amp;quot; really is, based only on a quick scan of a short name or title. Since you're dealing with diverse sources, there are likely to be many-to-many relationships in dealing with mappings.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for handling duplicates. They're gonna happen.&lt;br /&gt;
&lt;br /&gt;
*the more you distribute the process of creating and assigning IDs between multiple people, the more inconsistencies and duplicates you will wind up with. This may be unavoidable, since the job is usually bigger than one person.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for deprecating IDs, i.e., &amp;quot;retiring&amp;quot; them and discouraging their use by others. This will probably happen for reasons other than duplicates. There should be some final record, somewhere, of what happened to the deprecated item - i.e., it shouldn't just disappear off the face of the earth.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Much of the discussion surrounding the establishment of &amp;quot;Common OWASP Numbering&amp;quot; can be found on the various [https://lists.owasp.org/mailman/listinfo OWASP mailing lists]. (For your convenience here is a direct link to the [https://lists.owasp.org/pipermail/owasp-testing/ OWASP Testing Guide Mailing List Archive].) &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Verification_Standard_Project]] [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76208</id>
		<title>OWASP Common Numbering Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Common_Numbering_Project&amp;diff=76208"/>
				<updated>2010-01-14T00:37:21Z</updated>
		
		<summary type="html">&lt;p&gt;Bradcausey: /* Mapping to Top 10 2010 IDs */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Introduction  ==&lt;br /&gt;
&lt;br /&gt;
Here is the generally agreed-upon new numbering scheme. Additional explanatory text coming soon. Questions/Comments? Email [mailto:mike.boberski@owasp.org Mike]. &lt;br /&gt;
&lt;br /&gt;
 OWASP-06&lt;br /&gt;
 OWASP-06-DEPRECATED &lt;br /&gt;
 OWASP-0604&lt;br /&gt;
 OWASP-0604-DEPRECATED&lt;br /&gt;
 OWASP-0604-DG&lt;br /&gt;
 OWASP-0604-DG-01&lt;br /&gt;
 OWASP-0604-TG&lt;br /&gt;
 OWASP-0604-TG-DV-005&lt;br /&gt;
 OWASP-0604-TG-DV-005-DEPRECATED&lt;br /&gt;
&lt;br /&gt;
 0123456789012345678901234567890123456789&lt;br /&gt;
           1         2         3&lt;br /&gt;
&lt;br /&gt;
*0-4 OWASP &lt;br /&gt;
*6-7 Detailed requirement identifier (major) &lt;br /&gt;
*8-9 Detailed requirement identifier (minor) &lt;br /&gt;
*11-12 Document code (DG=Development Guide, TG=Testing Guide, CG=Code Review Guide, AR, ED, RM, OR, others reserved) &lt;br /&gt;
*14-40 (Optional: DEPRECATED, or # for iterations, or legacy identifiers)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== Primary COVN Table (DRAFT)  ==&lt;br /&gt;
This table outlines the Common OWASP Vulnerability Numbers (COVN)&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''COVN Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Description'''&amp;lt;/center&amp;gt; &lt;br /&gt;
|-&lt;br /&gt;
| '''Information Gathering'''&lt;br /&gt;
| '''OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0102&lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0103&lt;br /&gt;
| Identify application entry points &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0104&lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0105&lt;br /&gt;
| Application Discovery &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0106&lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
|-&lt;br /&gt;
|'''Configuration Management Testing'''&lt;br /&gt;
|'''OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0202&lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0204&lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0205&lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0206&lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0207 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0208 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
|-&lt;br /&gt;
|'''Authentication Testing'''&lt;br /&gt;
|'''OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0301&lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0302&lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0303&lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0304&lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0305&lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0306&lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0307&lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0308&lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0309 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0310&lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
|-&lt;br /&gt;
|'''Session Management'''&lt;br /&gt;
|'''OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0401&lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0402&lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0403&lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0404&lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
|-&lt;br /&gt;
|'''Authorization Testing'''&lt;br /&gt;
|'''OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0502 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0503 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
|-&lt;br /&gt;
|'''Business logic testing'''&lt;br /&gt;
|'''OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
| Testing for business logic &lt;br /&gt;
|-&lt;br /&gt;
|'''Data Validation Testing'''&lt;br /&gt;
|'''OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0702&lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0703&lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0704 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0705&lt;br /&gt;
| SQL Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0706&lt;br /&gt;
| LDAP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0707&lt;br /&gt;
| ORM Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0708&lt;br /&gt;
| XML Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0709&lt;br /&gt;
| SSI Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0710&lt;br /&gt;
| XPath Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0711&lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0712&lt;br /&gt;
| Code Injection &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0713&lt;br /&gt;
| OS Commanding &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0714&lt;br /&gt;
| Buffer overflow &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0715&lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0716&lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
| Unvalidated Redirects and Forwards &lt;br /&gt;
|-&lt;br /&gt;
|'''Denial of Service Testing'''&lt;br /&gt;
|'''OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0802&lt;br /&gt;
| Locking User Accounts &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0803&lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0804&lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0805&lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0806&lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0807&lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0808&lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
|-&lt;br /&gt;
|'''Web Services Testing'''&lt;br /&gt;
|'''OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0902&lt;br /&gt;
| Testing WSDL &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0903&lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0904&lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0905&lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0906 &lt;br /&gt;
| Malicious SOAP attachments &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-0907&lt;br /&gt;
| Replay Testing &lt;br /&gt;
|-&lt;br /&gt;
| '''OWASP-10'''&lt;br /&gt;
|'''AJAX Testing'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-1001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-1002  &lt;br /&gt;
| AJAX Testing&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Mapping to Legacy Testing Guide IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Test Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Information Gathering - OWASP-01'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-001 &lt;br /&gt;
| Spiders, Robots and Crawlers&lt;br /&gt;
| OWASP-0101&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-002 &lt;br /&gt;
| Search Engine Discovery/Reconnaissance &lt;br /&gt;
| OWASP-0102&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-003 &lt;br /&gt;
| Identify application entry points &lt;br /&gt;
| OWASP-0103&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-004 &lt;br /&gt;
| Testing for Web Application Fingerprint &lt;br /&gt;
| OWASP-0104&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-005 &lt;br /&gt;
| Application Discovery &lt;br /&gt;
| OWASP-0105&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-IG-006 &lt;br /&gt;
| Analysis of Error Codes &lt;br /&gt;
| OWASP-0106&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Configuration Management Testing - OWASP-02'''&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-001 &lt;br /&gt;
| SSL/TLS Testing (SSL Version, Algorithms, Key length, Digital Cert. Validity) &lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-002 &lt;br /&gt;
| DB Listener Testing &lt;br /&gt;
| OWASP-0202&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-003 &lt;br /&gt;
| Infrastructure Configuration Management Testing &lt;br /&gt;
| OWASP-0203&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-004 &lt;br /&gt;
| Application Configuration Management Testing &lt;br /&gt;
| OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-005 &lt;br /&gt;
| Testing for File Extensions Handling &lt;br /&gt;
| OWASP-0205&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-006 &lt;br /&gt;
| Old, backup and unreferenced files &lt;br /&gt;
| OWASP-0206&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-007 &lt;br /&gt;
| Infrastructure and Application Admin Interfaces &lt;br /&gt;
| OWASP-0207&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-CM-008 &lt;br /&gt;
| Testing for HTTP Methods and XST &lt;br /&gt;
| OWASP-0208&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authentication Testing - OWASP-03''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-001 &lt;br /&gt;
| Credentials transport over an encrypted channel &lt;br /&gt;
| OWASP-0301&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-002 &lt;br /&gt;
| Testing for user enumeration &lt;br /&gt;
| OWASP-0302&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-003 &lt;br /&gt;
| Testing for Guessable (Dictionary) User Account &lt;br /&gt;
| OWASP-0303&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-004 &lt;br /&gt;
| Brute Force Testing &lt;br /&gt;
| OWASP-0304&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-005 &lt;br /&gt;
| Testing for bypassing authentication schema &lt;br /&gt;
| OWASP-0305&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-006 &lt;br /&gt;
| Testing for vulnerable remember password and pwd reset &lt;br /&gt;
| OWASP-0306&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-007 &lt;br /&gt;
| Testing for Logout and Browser Cache Management &lt;br /&gt;
| OWASP-0307&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-008 &lt;br /&gt;
| Testing for CAPTCHA &lt;br /&gt;
| OWASP-0308&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-009 &lt;br /&gt;
| Testing Multiple Factors Authentication &lt;br /&gt;
| OWASP-0309&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AT-010 &lt;br /&gt;
| Testing for Race Conditions &lt;br /&gt;
| OWASP-0310&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Session Management - OWASP-04''' &lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-001 &lt;br /&gt;
| Testing for Session Management Schema &lt;br /&gt;
| OWASP-0401&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-002 &lt;br /&gt;
| Testing for Cookies attributes &lt;br /&gt;
| OWASP-0402&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-003 &lt;br /&gt;
| Testing for Session Fixation &lt;br /&gt;
| OWASP-0403&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-004 &lt;br /&gt;
| Testing for Exposed Session Variables &lt;br /&gt;
| OWASP-0404&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-SM-005 &lt;br /&gt;
| Testing for CSRF &lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Authorization Testing - OWASP-05'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AZ-001 &lt;br /&gt;
| Testing for Path Traversal &lt;br /&gt;
| OWASP-0501&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-002 &lt;br /&gt;
| Testing for bypassing authorization schema &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AZ-003 &lt;br /&gt;
| Testing for Privilege Escalation &lt;br /&gt;
| OWASP-0503&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Business logic testing - OWASP-06'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-BL-001 &lt;br /&gt;
| Testing for business logic &lt;br /&gt;
| OWASP-0601&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Data Validation Testing - OWASP-07'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DV-001 &lt;br /&gt;
| Testing for Reflected Cross Site Scripting &lt;br /&gt;
| OWASP-0701&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-002 &lt;br /&gt;
| Testing for Stored Cross Site Scripting &lt;br /&gt;
| OWASP-0702&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-003 &lt;br /&gt;
| Testing for DOM based Cross Site Scripting &lt;br /&gt;
| OWASP-0703&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-004 &lt;br /&gt;
| Testing for Cross Site Flashing &lt;br /&gt;
| OWASP-0704&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-005 &lt;br /&gt;
| SQL Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-006 &lt;br /&gt;
| LDAP Injection &lt;br /&gt;
| OWASP-0706&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-007 &lt;br /&gt;
| ORM Injection &lt;br /&gt;
| OWASP-0707&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-008 &lt;br /&gt;
| XML Injection &lt;br /&gt;
| OWASP-0708&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-009 &lt;br /&gt;
| SSI Injection &lt;br /&gt;
| OWASP-0709&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-010 &lt;br /&gt;
| XPath Injection &lt;br /&gt;
| OWASP-0710&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-011 &lt;br /&gt;
| IMAP/SMTP Injection &lt;br /&gt;
| OWASP-0711&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-012 &lt;br /&gt;
| Code Injection &lt;br /&gt;
| OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-013 &lt;br /&gt;
| OS Commanding &lt;br /&gt;
| OWASP-0713&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-014 &lt;br /&gt;
| Buffer overflow &lt;br /&gt;
| OWASP-0714&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-015 &lt;br /&gt;
| Incubated vulnerability Testing &lt;br /&gt;
| OWASP-0715&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DV-016 &lt;br /&gt;
| Testing for HTTP Splitting/Smuggling &lt;br /&gt;
| OWASP-0716&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Denial of Service Testing - OWASP-08'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-DS-001 &lt;br /&gt;
| Testing for SQL Wildcard Attacks &lt;br /&gt;
| OWASP-0801&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-002 &lt;br /&gt;
| Locking Customer Accounts &lt;br /&gt;
| OWASP-0802&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-003 &lt;br /&gt;
| Testing for DoS Buffer Overflows &lt;br /&gt;
| OWASP-0803&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-004 &lt;br /&gt;
| User Specified Object Allocation &lt;br /&gt;
| OWASP-0804&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-005 &lt;br /&gt;
| User Input as a Loop Counter &lt;br /&gt;
| OWASP-0805&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-006 &lt;br /&gt;
| Writing User Provided Data to Disk &lt;br /&gt;
| OWASP-0806&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-007 &lt;br /&gt;
| Failure to Release Resources &lt;br /&gt;
| OWASP-0807&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-DS-008 &lt;br /&gt;
| Storing too Much Data in Session &lt;br /&gt;
| OWASP-0808&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''Web Services Testing - OWASP-09'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-WS-001 &lt;br /&gt;
| WS Information Gathering &lt;br /&gt;
| OWASP-0901&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-002 &lt;br /&gt;
| Testing WSDL &lt;br /&gt;
| OWASP-0902&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-003 &lt;br /&gt;
| XML Structural Testing &lt;br /&gt;
| OWASP-0903&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-004 &lt;br /&gt;
| XML content-level Testing &lt;br /&gt;
| OWASP-0904&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-005 &lt;br /&gt;
| HTTP GET parameters/REST Testing &lt;br /&gt;
| OWASP-0905&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-006 &lt;br /&gt;
| Naughty SOAP attachments &lt;br /&gt;
| OWASP-0906&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-WS-007 &lt;br /&gt;
| Replay Testing &lt;br /&gt;
| OWASP-0907&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; | '''AJAX Testing - OWASP-10'''&lt;br /&gt;
|- &lt;br /&gt;
| OWASP-AJ-001 &lt;br /&gt;
| AJAX Vulnerabilities &lt;br /&gt;
| OWASP-1001&lt;br /&gt;
|-&lt;br /&gt;
| OWASP-AJ-002 &lt;br /&gt;
| AJAX Testing &lt;br /&gt;
| OWASP-1002&lt;br /&gt;
|}&lt;br /&gt;
== Mapping to Top 10 2010 IDs  ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;prettytable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &amp;lt;center&amp;gt;'''Ref. Number'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''Name'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| &amp;lt;center&amp;gt;'''New Common Ref.'''&amp;lt;/center&amp;gt; &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; | &lt;br /&gt;
|-&lt;br /&gt;
| A1 &lt;br /&gt;
| Injection &lt;br /&gt;
| OWASP-0705&lt;br /&gt;
OWASP-0706&lt;br /&gt;
&lt;br /&gt;
OWASP-0707&lt;br /&gt;
&lt;br /&gt;
OWASP-0708&lt;br /&gt;
&lt;br /&gt;
OWASP-0709&lt;br /&gt;
&lt;br /&gt;
OWASP-0710&lt;br /&gt;
&lt;br /&gt;
OWASP-0711&lt;br /&gt;
&lt;br /&gt;
OWASP-0712&lt;br /&gt;
|-&lt;br /&gt;
| A2 &lt;br /&gt;
| Cross Site Scripting &lt;br /&gt;
| OWASP-0701 &lt;br /&gt;
OWASP-0702&lt;br /&gt;
&lt;br /&gt;
OWASP-0703&lt;br /&gt;
&lt;br /&gt;
OWASP-0704 &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| A3 &lt;br /&gt;
| Broken Authentication and Session Management&lt;br /&gt;
| OWASP-03&lt;br /&gt;
&lt;br /&gt;
OWASP-04&lt;br /&gt;
|-&lt;br /&gt;
| A4 &lt;br /&gt;
| Insecure Direct Object References &lt;br /&gt;
| OWASP-0502&lt;br /&gt;
|-&lt;br /&gt;
| A5 &lt;br /&gt;
| Cross Site Request Forgery&lt;br /&gt;
| OWASP-0405&lt;br /&gt;
|-&lt;br /&gt;
| A6&lt;br /&gt;
| Security Misconfiguration&lt;br /&gt;
| OWASP-0203&lt;br /&gt;
&lt;br /&gt;
OWASP-0204&lt;br /&gt;
|-&lt;br /&gt;
| A7&lt;br /&gt;
| Failure to Restrict URL Access&lt;br /&gt;
| OWASP-05&lt;br /&gt;
|-&lt;br /&gt;
| A8&lt;br /&gt;
| Unvalidated Redirects and Forwards&lt;br /&gt;
| OWASP-0717&lt;br /&gt;
|-&lt;br /&gt;
| A9&lt;br /&gt;
| Insecure Cryptographic Storage&lt;br /&gt;
| OWASP-0209&lt;br /&gt;
|-&lt;br /&gt;
| A10&lt;br /&gt;
| Insufficient Transport Layer Protection&lt;br /&gt;
| OWASP-0201&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== References  ==&lt;br /&gt;
&lt;br /&gt;
*adding the (release) year into the numbering scheme can be problematic, because the document has a life cycle that goes over years .... &lt;br /&gt;
*One should rather try to accommodate a versioning scheme that is human readable in the reference number as well (e.g. V02, or RevA, or...)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
*don't try to encode any information into the ID that is likely to change or be subject to debate. In the olden days of CVE, we used to have &amp;quot;CAN-1999-0067&amp;quot; which would change into &amp;quot;CVE-1999-0067&amp;quot; once the item was considered stable and sufficiently verified. That made the ID hard to use. Right now, OWASP-DV-001 encodes the term &amp;quot;data validation&amp;quot; in the DV acronym, but what happens if in a couple of years, some new and better term occurs, or the focus changes from validation to something else? (As an example, it's only recently that the &amp;quot;data validation&amp;quot; term itself has become popular.)&lt;br /&gt;
&lt;br /&gt;
*carefully consider the range of values that your ID space supports, and if possible, allow it to expand. CVE has a &amp;quot;CVE-10K&amp;quot; problem because we never expected that we would ever come close to tracking 10,000 vulnerabilities a year. Red Hat had to change their advisory numbering scheme a couple years ago. etc.&lt;br /&gt;
&lt;br /&gt;
*don't change the fundamental meaning of the ID once you've assigned it. This causes confusion, and more importantly, it immediately invalidates almost everyone's mappings to that ID - including people who you don't even know are using that ID.&lt;br /&gt;
&lt;br /&gt;
*closely monitor the mappings that get made. Typos and misunderstandings are rarely caught. People may make assumptions about what &amp;quot;the item&amp;quot; really is, based only on a quick scan of a short name or title. Since you're dealing with diverse sources, there are likely to be many-to-many relationships in dealing with mappings.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for handling duplicates. They're gonna happen.&lt;br /&gt;
&lt;br /&gt;
*the more you distribute the process of creating and assigning IDs between multiple people, the more inconsistencies and duplicates you will wind up with. This may be unavoidable, since the job is usually bigger than one person.&lt;br /&gt;
&lt;br /&gt;
*determine some kind of procedure for deprecating IDs, i.e., &amp;quot;retiring&amp;quot; them and discouraging their use by others. This will probably happen for reasons other than duplicates. There should be some final record, somewhere, of what happened to the deprecated item - i.e., it shouldn't just disappear off the face of the earth.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Much of the discussion surrounding the establishment of &amp;quot;Common OWASP Numbering&amp;quot; can be found on the various [https://lists.owasp.org/mailman/listinfo OWASP mailing lists]. (For your convenience here is a direct link to the [https://lists.owasp.org/pipermail/owasp-testing/ OWASP Testing Guide Mailing List Archive].) &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP_Application_Security_Verification_Standard_Project]] [[Category:How_To]]&lt;/div&gt;</summary>
		<author><name>Bradcausey</name></author>	</entry>

	</feed>