This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Top 10/Mapping to WHID"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
Here is a mapping of the [[OWASP Top 10#OWASP_Top_10_for_2010 | OWASP Top 10 - 2010]] to example real world entries in the [https://www.owasp.org/index.php/OWASP_WASC_Web_Hacking_Incidents_Database_Project OWASP/WASC Web Hacking Incident Database (WHID)]:
+
Here is a mapping of the [[https://www.owasp.org/index.php/Top_10_2013 | OWASP Top 10 - 2013]] to example real world entries in the [https://www.owasp.org/index.php/OWASP_WASC_Web_Hacking_Incidents_Database_Project OWASP/WASC Web Hacking Incident Database (WHID)]:
  
 
* A1: Injection - http://www.google.com/fusiontables/DataSource?snapid=S2086702IR5
 
* A1: Injection - http://www.google.com/fusiontables/DataSource?snapid=S2086702IR5

Revision as of 19:32, 12 March 2015

Here is a mapping of the [| OWASP Top 10 - 2013] to example real world entries in the OWASP/WASC Web Hacking Incident Database (WHID):