This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Vulnerability Classification Mappings

From OWASP
Revision as of 01:47, 22 January 2010 by Dancornell (talk | contribs) (Created page with 'This is still a work in progress - the Wiki markup language makes it challenging to translate the [http://blog.denimgroup.com/denim_group/2010/01/mapping-between-owasp-top-10-200…')

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

This is still a work in progress - the Wiki markup language makes it challenging to translate the original mapping document. Please send comments or feedback to dan.cornell _at_ owasp.org.

OWASP Top 10 2007
OWASP Top 10 2004
SANS CWE/25
WASC 24(+2)
A1. Cross Site Scripting (XSS) A4. Cross Site Scripting (XSS) CWE-79: Failure to preserve Web Page Structure ('Cross-site Scripting') 3.2 Cross-site Scripting
A2. Injection Flaws A6. Injection Flaws CWE-89: Failure to Preserve SQL Query Structure('SQL Injection')
CWE-78: Improper Sanitization of special elements used in an OS Command
CWE-94: Failure to Control Generation of Code ('Code Injection')
4.5 SQL Injection
4.4 OS commanding
4.6 SSI Injection
4.3 LDAP Injection
4.7 XPath Injection
A7. Broken Authentication and Session management A3. Broken Authentication and Session management 1.1 Brute Force
1.2 Insufficient Authentication
1.3 Weak Password Recovery Validation
2.1 Credential/Session Prediction
2.3 Insufficient Session Expiration
2.4 Session Fixation
A8. Insecure Cryptographic Storage A8. Insecure Storage CWE-327 Use of a Broken or Risky Cryptographic Algorithm
A5. Cross Site Request Forgery (CSRF) CWE-352 Cross-Site Request Forgery (CSRF) 1.4 CSRF *
A6. Information Leakage and Improper Error Handling A7. Improper Error Handling CWE-209 Error message information leak 5.2 Information leakage
A10. Failure to Restrict URL Access
A4. Insecure Direct Object Reference
A2. Broken Access Control CWE-285: Improper Access Control (Authorization)
CWE-73: External control of file name or path
2.2 Insufficient Authorization
A9. Insecure Communications CWE-319: Cleartext Transmission of Sensitive Information
A1. Unvalidated Input CWE-20: Improper Input Validation
A5. Buffer Overflows CWE-119: Failure to Constrain Operations within the Bounds of a memory Buffer 4.1 Buffer Overflow
A9. Denial of Service CWE-404: Improper Resource Shutdown or Release 6.2 Denial of Service
A3. Malicious File Execution CWE-494: Download of Code Without Integrity Check
A10. Insecure Configuration Management CWE-732: Incorrect Permission Assignment for Critical Resource
CWE-250: Execution with Unnecessary Privileges
CWE-362: Race Condition
CWE-642: External Control of Critical State Data
CWE-426: Untrusted Search Path
CWE-665: Improper Initialization
CWE-682: Incorrect Calculation
CWE-330: Use of Insufficiently Random Values
CWE-602: Client-Side Enforcement of Server-Side Security
CWE-116: Improper Encoding or Escaping of Output
3.1 Content Spoofing
3.3 HTTP Response Splitting *
4.2 Format String Attack
5.1 Directory Indexing
5.3 Path Traversal
5.4 Predictable Resource Location
6.1 Abuse of Functionality
6.3 Insufficient Anti-automation
6.4 Insufficient Process Validation