Fortify has graciously donated these vulnerability writeups to OWASP,
where they will be maintained wikipedia-style.  We have a strong team of
reviewers in place to review all changes daily.  There are a total of
almost 500 vulnerabilities now, from Fortify, CLASP, and many other
sources.  We're creating an interlinked knowledgebase of common
application security principles, threats, attacks, vulnerabilities, and
countermeasures.  Anyone can participate, so come help us out.

http://www.owasp.org/index.php/Category:OWASP_Honeycomb_Project 

--Jeff
 
-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Gergely Buday
Sent: Wednesday, August 09, 2006 10:08 AM
To: Secure Coding
Subject: [***SPAM (header)***] - Re: [SC-L] A New Open Source Approach
to Weakness - Email found in subject

On 09/08/06, Kenneth Van Wyk <[EMAIL PROTECTED]> wrote:
>
> FYI, here's an article about Fortify's pernicious kingdom taxonomy of
common
> coding defects that I thought would be of interest here:
>
> http://www.internetnews.com/dev-news/article.php/3623751

The link to the original paper is:

http://vulncat.fortifysoftware.com/docs/tcm_taxonomy_submission.pdf

Cheers

- Gergely
_______________________________________________
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc -
http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php

_______________________________________________
Secure Coding mailing list (SC-L)
SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php

Reply via email to