This paper is a one-stop user guide covering various critical web application vulnerabilities mapped under important documentation like OWASP Top 10, OWASP ASVS, WASC, and SANS CWE 25.

Key Pointers:

  • Introduction to OWASP and taking a look at the OWASP Top 10 web vulnerabilities
  • Introduction to OWASP ASVS and its use
  • Introduction to WASC and their list of security threats
  • Introduction to CWE and the list of CWE Top 25
  • Comparing SANS CWE 25 with OWASP Top 10