log inhelp
This view enumerates the attacks, and weaknesses that can lead to the compromise of a website, its data, or its users. This serves as the base view for the WASC Threat Classification.
Improper Output Handling
Insecure Indexing
Insert links to other pages or uploaded files.
Tip: To turn text into a link, highlight the text, then click on a page or file from the list above.
You don't have permission to comment on this page.
Threat Classification Enumeration View tags changed
WASC Projects
WASC Project Leaders
WASC Main Website
WASC Mailing Lists
WASC on Twitter
Join us on Linkedin!
Comments (0)
You don't have permission to comment on this page.