This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "SpoC 007 - Web Application Security put into Practice - Progress Page"
From OWASP
(New page: * Apache Guide (done) * MySQL Guide (done) * Ruby On Rails Guide for the OWASP Top 10 (on the way) ** A1 - Cross Site Scripting (XSS) ** A2 - Injection Flaws ** A3 - Malicious File Executi...) |
|||
(One intermediate revision by the same user not shown) | |||
Line 1: | Line 1: | ||
* Apache Guide (done) | * Apache Guide (done) | ||
* MySQL Guide (done) | * MySQL Guide (done) | ||
− | * Ruby On Rails Guide for the OWASP Top 10 ( | + | * Ruby On Rails Guide for the OWASP Top 10 (done) |
** A1 - Cross Site Scripting (XSS) | ** A1 - Cross Site Scripting (XSS) | ||
** A2 - Injection Flaws | ** A2 - Injection Flaws | ||
Line 12: | Line 12: | ||
** A9 - Insecure Communications | ** A9 - Insecure Communications | ||
** A10 - Failure to Restrict URL Access | ** A10 - Failure to Restrict URL Access | ||
+ | |||
+ | Web Application Put Into Practice: [https://www.owasp.org/index.php/Image:Owasp-rails-security.pdf] |
Latest revision as of 15:33, 31 October 2007
- Apache Guide (done)
- MySQL Guide (done)
- Ruby On Rails Guide for the OWASP Top 10 (done)
- A1 - Cross Site Scripting (XSS)
- A2 - Injection Flaws
- A3 - Malicious File Execution
- A4 - Insecure Direct Object Reference
- A5 - Cross Site Request Forgery (CSRF)
- A6 - Information Leakage and Improper Error Handling
- A7 - Broken Authentication and Session Management
- A8 - Insecure Cryptographic Storage
- A9 - Insecure Communications
- A10 - Failure to Restrict URL Access
Web Application Put Into Practice: [1]