This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "SpoC 007 - Web Application Security put into Practice - Progress Page"

From OWASP
Jump to: navigation, search
 
Line 1: Line 1:
 
* Apache Guide (done)
 
* Apache Guide (done)
 
* MySQL Guide (done)
 
* MySQL Guide (done)
* Ruby On Rails Guide for the OWASP Top 10 (on the way)
+
* Ruby On Rails Guide for the OWASP Top 10 (done)
 
** A1 - Cross Site Scripting (XSS)
 
** A1 - Cross Site Scripting (XSS)
 
** A2 - Injection Flaws
 
** A2 - Injection Flaws

Latest revision as of 15:33, 31 October 2007

  • Apache Guide (done)
  • MySQL Guide (done)
  • Ruby On Rails Guide for the OWASP Top 10 (done)
    • A1 - Cross Site Scripting (XSS)
    • A2 - Injection Flaws
    • A3 - Malicious File Execution
    • A4 - Insecure Direct Object Reference
    • A5 - Cross Site Request Forgery (CSRF)
    • A6 - Information Leakage and Improper Error Handling
    • A7 - Broken Authentication and Session Management
    • A8 - Insecure Cryptographic Storage
    • A9 - Insecure Communications
    • A10 - Failure to Restrict URL Access

Web Application Put Into Practice: [1]