This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Template:Featured article"
Line 5: | Line 5: | ||
<center>[http://www.fortifysoftware.com http://www.owasp.org/images/5/5d/Fortifysoftware_lowres.JPG]</center> | <center>[http://www.fortifysoftware.com http://www.owasp.org/images/5/5d/Fortifysoftware_lowres.JPG]</center> | ||
− | OWASP will help manage the research as part of the new "Honeycomb" project, which is creating a comprehensive and integrated guide to the fundamental building blocks of application security, including principles, threats, attacks | + | OWASP will help manage the research as part of the new "Honeycomb" project, which is creating a comprehensive and integrated guide to the fundamental building blocks of application security, including [[:Category:Principle|principles]], [[:Category:Threat|threats]], [[:Category:Vulnerability|vulnerabilities]], [[:Category:Attack|attacks]], and [[:Category:Countermeasure|countermeasures]]. |
The full set of vulnerabilities and the research that accompanies it is available in the [[:Category:OWASP Honeycomb Project|OWASP Honeycomb Project]]. | The full set of vulnerabilities and the research that accompanies it is available in the [[:Category:OWASP Honeycomb Project|OWASP Honeycomb Project]]. |
Revision as of 03:03, 31 July 2006
Jul 31, 2006 - Fortify donates vulnerability research to OWASP
OWASP is pleased to announce the immediate free and open availability of an extensive classification of software security errors. The set of 115 vulnerabilities was researched by Dr. Brian Chess, Chief Scientist at Fortify Software and others. They were contributed to OWASP by Fortify Software Inc.
OWASP will help manage the research as part of the new "Honeycomb" project, which is creating a comprehensive and integrated guide to the fundamental building blocks of application security, including principles, threats, vulnerabilities, attacks, and countermeasures.
The full set of vulnerabilities and the research that accompanies it is available in the OWASP Honeycomb Project.