This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
OWASP WASC Web Hacking Incidents Database Project
OWASP WASC Web Hacking Incidents Database ProjectThe OWASP WASC Web Hacking Incidents Database Project is a project dedicated to maintaining a list of web applications related security incidents. DescriptionWHID goal is to serve as a tool for raising awareness of the web application security problem and provide information for statistical analysis of web applications security incidents. The database is unique in tracking only media reported security incidents that can be associated with a web application security vulnerability. This data is in contrast to many public statistics reports on vulnerability prevalence in that it shows what types of vulnerabilities attackers are actively exploiting. LicensingThe OWASP WASC Web Hacking Incidents Database Project is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
|
What is WHID?OWASP WHID provides:
PresentationProject LeaderMail-ListRelated Projects
|
Quick Download
News and Events
Classifications |
- How is WHID different than the OWASP Top 10?
- The OWASP Top 10 Risks applies a community-based Threat Model discussion to estimate the top risks to web applications. OWASP WHID, on the other hand, focuses mainly on Attack Liklihood rather than Vulnerability Prevalence.
- How do I submit a WHID Incident?
- If you have identified a possible WHID candidate, please use of the following methods to notify the WHID project team:
- Send an email to - owaspwhid_at_owasp.org
- Send a tweet to @owaspwhid
- Enter a link in the WHID Submittal Form
- Q2
- A2
Volunteers
XXX is developed by a worldwide team of volunteers. The primary contributors to date have been:
- xxx
- xxx
Others
- xxx
- xxx
As of XXX, the priorities are:
- xxx
- xxx
- xxx
Involvement in the development and promotion of XXX is actively encouraged! You do not have to be a security expert in order to contribute. Some of the ways you can help:
- xxx
- xxx
PROJECT INFO What does this OWASP project offer you? |
RELEASE(S) INFO What releases are available for this project? | |||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|