Vulnerability Mapping Notes
Justification : This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.
Comment : Use this View or other Views to search and navigate for the appropriate weakness.
NotesNotes
The relationships in this view have been pulled directly from the 2017 OWASP Top 10 document, either from the explicit mapping section, or from weakness types alluded to in the written sections.
Audience
Stakeholder |
Description |
Software Developers |
This view outlines the most important issues as identified by the OWASP Top Ten (2017 version), providing a good starting point for web application developers who want to code more securely. |
Product Customers |
This view outlines the most important issues as identified by the OWASP Top Ten (2017 version), providing product customers with a way of asking their software development teams to follow minimum expectations for secure code. |
Educators |
Since the OWASP Top Ten covers the most frequently encountered issues, this view can be used by educators as training material for students. |
Submission
Name |
Organization |
Date |
Date release |
Version |
CWE Content Team |
MITRE |
2018-01-22 +00:00 |
2018-03-29 +00:00 |
3.1 |
Modifications
Name |
Organization |
Date |
Comment |
CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated References |
CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated References, View_Audience |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
References
REF-957
Top 10 2017
https://owasp.org/www-pdf-archive/OWASP_Top_10-2017_%28en%29.pdf.pdf