Notes de cartographie des vulnérabilités
Justification : This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.
Commentaire : Use this View or other Views to search and navigate for the appropriate weakness.
NotesNotes
The relationships in this view have been pulled directly from the 2017 OWASP Top 10 document, either from the explicit mapping section, or from weakness types alluded to in the written sections.
Audience
Partie prenante |
Description |
Software Developers |
This view outlines the most important issues as identified by the OWASP Top Ten (2017 version), providing a good starting point for web application developers who want to code more securely. |
Product Customers |
This view outlines the most important issues as identified by the OWASP Top Ten (2017 version), providing product customers with a way of asking their software development teams to follow minimum expectations for secure code. |
Educators |
Since the OWASP Top Ten covers the most frequently encountered issues, this view can be used by educators as training material for students. |
Soumission
Nom |
Organisation |
Date |
Date de publication |
Version |
CWE Content Team |
MITRE |
2018-01-22 +00:00 |
2018-03-29 +00:00 |
3.1 |
Modifications
Nom |
Organisation |
Date |
Commentaire |
CWE Content Team |
MITRE |
2017-11-08 +00:00 |
updated References |
CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated References, View_Audience |
CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |
Références
REF-957
Top 10 2017
https://owasp.org/www-pdf-archive/OWASP_Top_10-2017_%28en%29.pdf.pdf