This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Category:OWASP Top Ten Project"
From OWASP
(Removed 'OWASP Top 10 2017 GM - PDF' from downloads and a Typo) |
|||
Line 247: | Line 247: | ||
* French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. | * French: Ludovic Petit: Ludovic.Petit@owasp.org, Sébastien Gioria: Sebastien.Gioria@owasp.org. | ||
− | * Chinese: | + | * Chinese: |
+ | RC1:Rip、包悦忠、顾凌志、王颉、王厚奎、王文君、吴楠、夏天泽、夏玉明、杨天识、袁明坤、张镇(排名不分先后,按姓氏拼音排列) [https://www.owasp.org/images/8/8f/OWASP_Top_10_2017(RC1)中文版(V1.0).pdf OWASP Top10 2017 RC1 - Chinese PDF] | ||
+ | RC2:Rip、包悦忠、李旭勤、王颉、王厚奎、吴楠、徐瑞祝、夏天泽、张家银、张剑钟、赵学文(排名不分先后,按姓氏拼音排列) | ||
+ | [https://www.owasp.org/images/d/d6/OWASP_Top_10_2017%EF%BC%88RC2%EF%BC%89%E4%B8%AD%E6%96%87%E7%89%88%EF%BC%88%E5%8F%91%E5%B8%83%E7%89%88%EF%BC%89.pdf OWASP Top10 2017 RC2 - Chinese PDF] | ||
* Azerbaijanian: Rashad Aliyev (rashad@aliev.info) | * Azerbaijanian: Rashad Aliyev (rashad@aliev.info) | ||
* Others to be listed. | * Others to be listed. |
Revision as of 08:32, 29 November 2017
Subcategories
This category has the following 2 subcategories, out of 2 total.
O
Pages in category "OWASP Top Ten Project"
The following 107 pages are in this category, out of 107 total.
A
- A1 2004 Unvalidated Input
- A10 2004 Insecure Configuration Management
- A2 2004 Broken Access Control
- A3 2004 Broken Authentication and Session Management
- A4 2004 Cross Site Scripting
- A5 2004 Buffer Overflow
- A6 2004 Injection Flaws
- A7 2004 Improper Error Handling
- A8 2004 Insecure Storage
- A9 2004 Application Denial of Service
- Access Control In Your J2EE Application
C
G
T
- Top 10 2004
- Top 10 2007
- Top 10 2007-Broken Authentication and Session Management
- Top 10 2007-Cross Site Request Forgery
- Top 10 2007-Cross Site Scripting
- Top 10 2007-Failure to Restrict URL Access
- Top 10 2007-Information Leakage and Improper Error Handling
- Top 10 2007-Injection Flaws
- Top 10 2007-Insecure Communications
- Top 10 2007-Insecure Cryptographic Storage
- Top 10 2007-Insecure Direct Object Reference
- Top 10 2007-Malicious File Execution
- Top 10 2007-Methodology
- Top 10 2007-References
- Top 10 2007-Where to Go From Here
- Top 10 2010
- Top 10 2010-A1-Injection
- Top 10 2010-A10-Unvalidated Redirects and Forwards
- Top 10 2010-A2-Cross-Site Scripting (XSS)
- Top 10 2010-A3-Broken Authentication and Session Management
- Top 10 2010-A4-Insecure Direct Object References
- Top 10 2010-A5-Cross-Site Request Forgery (CSRF)
- Top 10 2010-A6-Security Misconfiguration
- Top 10 2010-A7-Insecure Cryptographic Storage
- Top 10 2010-A8-Failure to Restrict URL Access
- Top 10 2010-A9-Insufficient Transport Layer Protection
- Top 10 2010-Main
- Top 10 2010-Notes About Risk
- Top 10 2010-Release Notes
- Top 10 2010-What's Next For Developers
- Top 10 2010-What's Next For Organizations
- Top 10 2010-What's Next For Verifiers
- Top 10 2013
- Top 10 2013-A1-Injection
- Top 10 2013-A10-Unvalidated Redirects and Forwards
- Top 10 2013-A2-Broken Authentication and Session Management
- Top 10 2013-A3-Cross-Site Scripting (XSS)
- Top 10 2013-A4-Insecure Direct Object References
- Top 10 2013-A5-Security Misconfiguration
- Top 10 2013-A6-Sensitive Data Exposure
- Top 10 2013-A7-Missing Function Level Access Control
- Top 10 2013-A8-Cross-Site Request Forgery (CSRF)
- Top 10 2013-A9-Using Components with Known Vulnerabilities
- Top 10 2013-Details About Risk Factors
- Top 10 2013-Introduction
- Top 10 2013-Note About Risks
- Top 10 2013-Release Notes
- Top 10 2013-Risk
- Top 10 2013-Top 10
- Top 10 2013-What's Next for Developers
- Top 10 2013-What's Next for Organizations
- Top 10 2013-What's Next for Verifiers
- Template:Top 10 2013:BottomAdvancedTemplate
- Template:Top 10 2013:BottomTemplate
- Top 10-2017 A1-Injection
- Top 10-2017 A10-Insufficient Logging&Monitoring
- Top 10-2017 A2-Broken Authentication
- Top 10-2017 A3-Sensitive Data Exposure
- Top 10-2017 A4-XML External Entities (XXE)
- Top 10-2017 A5-Broken Access Control
- Top 10-2017 A6-Security Misconfiguration
- Top 10-2017 A7-Cross-Site Scripting (XSS)
- Top 10-2017 A8-Insecure Deserialization
- Top 10-2017 A9-Using Components with Known Vulnerabilities
- Top 10-2017 Acknowledgements
- Top 10-2017 Application Security Risks
- Top 10-2017 Details About Risk Factors
- Top 10-2017 Foreword
- Top 10-2017 Introduction
- Top 10-2017 Methodology and Data
- Top 10-2017 Note About Risks
- Top 10-2017 Release Notes
- Top 10-2017 Top 10
- Top 10-2017 What's Next for Application Managers
- Top 10-2017 What's Next for Developers
- Top 10-2017 What's Next for Organizations
- Top 10-2017 What's Next for Security Testers
Media in category "OWASP Top Ten Project"
The following 2 files are in this category, out of 2 total.