This paper is a one-stop user guide covering various critical web application vulnerabilities mapped under important documentation like OWASP Top 10, OWASP ASVS, WASC, and SANS CWE 25.
- Introduction to OWASP and taking a look at the OWASP Top 10 web vulnerabilities
- Introduction to OWASP ASVS and its use
- Introduction to WASC and their list of security threats
- Introduction to CWE and the list of CWE Top 25
- Comparing SANS CWE 25 with OWASP Top 10