This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP WASC Web Hacking Incidents Database Project"
From OWASP
(→In Print) |
(→FAQs) |
||
Line 85: | Line 85: | ||
=FAQs= | =FAQs= | ||
− | ; | + | ; How is WHID different than the OWASP Top 10? |
− | : | + | : The OWASP Top 10 Risks applies a community-based Threat Model discussion to estimate the top risks to web applications. OWASP WHID, on the other hand, focuses mainly on '''Attack Liklihood''' rather than '''Vulnerability Prevalence'''. |
+ | |||
+ | ; How do I submit a WHID Incident? | ||
+ | : If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team: | ||
+ | <ol> | ||
+ | <li>Send an email to - owaspwhid_at_owasp.org</li> | ||
+ | <li>Send a tweet to [https://twitter.com/owaspwhid @owaspwhid]</li> | ||
+ | <li>Enter a link in the [https://spreadsheets.google.com/spreadsheet/embeddedform?formkey=dHktV0FmWGMyTDZPbkZtOEJXNzhPbXc6MQ WHID Submittal Form]</li> | ||
+ | </ol> | ||
; Q2 | ; Q2 |
Revision as of 19:57, 18 February 2014