Αποτελέσματα Αναζήτησης
The OWASP Top 10 is the reference standard for the most critical web application security risks. Adopting the OWASP Top 10 is perhaps the most effective first step towards changing your software development culture focused on producing secure code.
- OWASP Dependency-Track
For more details about Dependency-Track see the projects...
- OWASP SAMM
OWASP SAMM and the SAMM v2 release is the open source...
- OWASP Mobile Top 10
To achieve this, we collect data from various sources such...
- About
The OWASP Foundation Inc. 300 Delaware Ave Ste 210 #384...
- OWASP Top Ten 2021
What is the value of a top 10 list? Origin subjective;...
- OWASP Dependency-Track
16 Δεκ 2021 · What is the value of a top 10 list? Origin subjective; enough evidence now? Specific enough to be useful to most? Does this kind of tool help make risk decisions? How has the battle gone over 20 years? Line in the Sand Back to context and which risks matter
The Top 10 OWASP vulnerabilities are 1. Injection 2. Broken Authentication 3. Sensitive data exposure 4. XML External Entities (XXE) 5. Broken Access control 6. Security misconfigurations 7. Cross-Site Scripting (XSS) 8. Insecure Deserialization 9. Using Components with Known Vulnerabilities 10. Insufficient Logging and Monitoring 3 4 5 8 9 11 ...
One of the highest weighted impacts from Common Vulnerability and Exposures/Common Vulnerability Scoring System (CVE/CVSS) data mapped to the 10 CWEs in this category. A8:2017-Insecure Deserialization is now a part of this larger category.
We have released the OWASP Top 10 - 2017 (Final) OWASP Top 10 2017 (PPTX) OWASP Top 10 2017 (PDF)
4 Δεκ 2023 · Below is a look at the vulnerabilities detailed in the most recent OWASP Top 10 Vulnerabilities and some potential mitigation methods. The OWASP Top 10 – 2021 follows the organization’s long-standing tradition of grouping known vulnerabilities under broad category headings.
Official OWASP Top 10 Document Repository. Contribute to OWASP/Top10 development by creating an account on GitHub.