This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Top 10/Mapping to WHID"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
Here is a mapping of the [[OWASP Top 10#OWASP_Top_10_for_2010 | OWASP Top 10 - 2010]] to example real world entries in the [http://projects.webappsec.org/w/page/13246995/Web-Hacking-Incident-Database WASC Web Hacking Incident Database (WHID)]:
+
Here is a mapping of the [[OWASP Top 10#OWASP_Top_10_for_2010 | OWASP Top 10 - 2010]] to example real world entries in the [https://www.owasp.org/index.php/OWASP_WASC_Web_Hacking_Incidents_Database_Project OWASP/WASC Web Hacking Incident Database (WHID)]:
  
 
* A1: Injection - http://www.google.com/fusiontables/DataSource?snapid=S2086702IR5
 
* A1: Injection - http://www.google.com/fusiontables/DataSource?snapid=S2086702IR5

Revision as of 21:45, 10 March 2015

Here is a mapping of the OWASP Top 10 - 2010 to example real world entries in the OWASP/WASC Web Hacking Incident Database (WHID):