This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "SpoC 007 - Web Application Security put into Practice - Progress Page"
From OWASP
Line 1: | Line 1: | ||
* Apache Guide (done) | * Apache Guide (done) | ||
* MySQL Guide (done) | * MySQL Guide (done) | ||
− | * Ruby On Rails Guide for the OWASP Top 10 ( | + | * Ruby On Rails Guide for the OWASP Top 10 (done) |
** A1 - Cross Site Scripting (XSS) | ** A1 - Cross Site Scripting (XSS) | ||
** A2 - Injection Flaws | ** A2 - Injection Flaws |
Latest revision as of 15:33, 31 October 2007
- Apache Guide (done)
- MySQL Guide (done)
- Ruby On Rails Guide for the OWASP Top 10 (done)
- A1 - Cross Site Scripting (XSS)
- A2 - Injection Flaws
- A3 - Malicious File Execution
- A4 - Insecure Direct Object Reference
- A5 - Cross Site Request Forgery (CSRF)
- A6 - Information Leakage and Improper Error Handling
- A7 - Broken Authentication and Session Management
- A8 - Insecure Cryptographic Storage
- A9 - Insecure Communications
- A10 - Failure to Restrict URL Access
Web Application Put Into Practice: [1]