Weaknesses in OWASP Top Ten (2010)
Description This view outlines the most important issues as identified by the OWASP Top Ten (2010 version), providing a good starting point for web application developers who want to code more securely. CWE nodes in this view (graph) are associated with the OWASP Top Ten, as released in 2010. Applicable PlatformsNone Common ConsequencesNone Detection MethodsNone Potential MitigationsNone RelationshipsThe relationships in this view are a direct extraction of the CWE mappings that are in the 2010 OWASP document. CWE has changed since the release of that document.
Demonstrative ExamplesNone White Box Definitions None Black Box Definitions None Taxynomy MappingsNone References:
|