Skip to content

Instantly share code, notes, and snippets.

@cromwellryan
Last active September 13, 2017 15:46
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save cromwellryan/57a7fc107bbd802f6227fb7d83e046c0 to your computer and use it in GitHub Desktop.
Save cromwellryan/57a7fc107bbd802f6227fb7d83e046c0 to your computer and use it in GitHub Desktop.
2017-09-13 Dayton Clean Coders
  • A1-Injection
  • A2-Broken Authentication and Session Management
  • A3-Cross-Site Scripting (XSS)
  • A4-Broken Access Control
  • A5-Security Misconfiguration
  • A6-Sensitive Data Exposure
  • A7-Insufficient Attack Protection
  • A8-Cross-Site Request Forgery (CSRF)
  • A9-Using Components with Known Vulnerabilities
  • A10-Underprotected APIs

OWASP Juice Shop is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment