This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Template:Featured article"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
'''Great new projects at OWASP'''
+
'''SANS and OWASP Partner to Add #1 Web Application Security to [http://www.sans.org/top20/?ref=1697#c1 SANS Top 20]'''
  
; [[:Category:OWASP Encoding Project|OWASP Encoding Project]]
+
{| align="center"
: A nice encoding library that supports Java, .NET, PHP, Python, Perl, JavaScript, and Ajax
+
| [http://www.sans.org/top20/?ref=1697#c1 http://www.owasp.org/images/8/80/SANS_Logo.jpg]
 +
| [http://www.owasp.org http://www.owasp.org/images/f/f0/OWASP_Logo.gif]
 +
|}
  
; [[:Category:OWASP WSFuzzer Project|OWASP WSFuzzer Project]]
+
The SANS document is widely used, and we're extremely pleased that we could work with them to recognize the risks associated with web applications. From the document...
: A fuzzing tool for Web Services to support penetration testing efforts
 
  
; [[:Category:OWASP Insecure Web App Project|OWASP Insecure Web App Project]]
+
"Every week hundreds of vulnerabilities are being reported in these web applications, and are being actively exploited. The number of attempted attacks every day for some of the large web hosting farms range from hundreds of thousands to even millions. All web frameworks (PHP, .NET, J2EE, Ruby on Rails, ColdFusion, Perl, etc) and all types of web applications are at risk from web application security defects, ranging from insufficient validation through to application logic errors."
: A realistic but insecure Java EE web application for use in learning and testing tools
+
 
 +
[http://www.sans.org/top20/?ref=1697#c1 Read more...]

Revision as of 20:06, 16 November 2006

SANS and OWASP Partner to Add #1 Web Application Security to SANS Top 20

SANS_Logo.jpg OWASP_Logo.gif

The SANS document is widely used, and we're extremely pleased that we could work with them to recognize the risks associated with web applications. From the document...

"Every week hundreds of vulnerabilities are being reported in these web applications, and are being actively exploited. The number of attempted attacks every day for some of the large web hosting farms range from hundreds of thousands to even millions. All web frameworks (PHP, .NET, J2EE, Ruby on Rails, ColdFusion, Perl, etc) and all types of web applications are at risk from web application security defects, ranging from insufficient validation through to application logic errors."

Read more...