Skip to content

Commit c5430d7

Browse files
authored
Merge pull request #2 from azharanees/registerForm
Updated SANS 25 Resource
2 parents fecfbaf + 590d0d5 commit c5430d7

File tree

3 files changed

+1286
-118
lines changed

3 files changed

+1286
-118
lines changed

gui/README.md

+3-11
Original file line numberDiff line numberDiff line change
@@ -4,8 +4,7 @@
44
**IN DEVELOPMENT**
55

66
## Description
7-
Adding of SANS TOP 25 to the resource page and fixing issues related to routing and auth guard
8-
7+
Updated SANS 25 resource
98

109
# Todos
1110
- Dynamic Fetching of the Resources
@@ -24,16 +23,9 @@ Adding of SANS TOP 25 to the resource page and fixing issues related to routing
2423
## Impacted Areas in Application
2524
General components of the application that this PR will affect:
2625

27-
* app Component
28-
* app routing Module
29-
* login Component
30-
* User Model
31-
* Navigation Component
32-
* app Module
33-
* dialog Component
34-
* auth Services
26+
3527
* Resource Component
36-
* Readme
28+
3729

3830

3931

gui/src/app/view/resources/resources.component.html

+4-35
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ <h1>OWASP TOP 10</h1>
2424
</mat-card>
2525

2626
<br>
27-
<h1>Resources to Help Eliminate The Top 25 Software Errors</h1>
27+
<h1> SANS TOP 25</h1>
2828
<mat-divider></mat-divider>
2929

3030
<mat-card class="faq-card">
@@ -40,40 +40,9 @@ <h1>Resources to Help Eliminate The Top 25 Software Errors</h1>
4040
</mat-expansion-panel-header>
4141
<p> {{content.subtitle}}</p>
4242
<br>
43-
44-
45-
</mat-expansion-panel>
46-
<mat-expansion-panel >
47-
<mat-expansion-panel-header>
48-
<mat-panel-title> SANS TOP 25 ERRORS </mat-panel-title>
49-
</mat-expansion-panel-header>
50-
<pre> [1] CWE- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
51-
[2] CWE- Improper Neutralization of Special Elements used in an SQL Command('SQL Injection')
52-
[3] CWE-Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
53-
[4] CWE- Cross-Site Request Forgery (CSRF)
54-
[5] CWE- Improper Authorization
55-
[6] CWE- Reliance on Untrusted Inputs in a Security Decision
56-
[7] CWE- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
57-
[8] CWE- Unrestricted Upload of File with Dangerous Type
58-
[9] CWE- Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
59-
[10] CWE- Missing Encryption of Sensitive Data
60-
[11] CWE- Use of Hard-coded Credentials
61-
[12] CWE- Buffer Access with Incorrect Length Value
62-
[13] CWE- Improper Control of Filename for Include/Require Statement in PHP Program ('PHP File Inclusion')
63-
[14] CWE- Improper Validation of Array Index
64-
[15] CWE- Improper Check for Unusual or Exceptional Conditions
65-
[16] CWE- Information Exposure Through an Error Message
66-
[17] CWE- Integer Overflow or Wraparound
67-
[18] CWE- Incorrect Calculation of Buffer Size
68-
[19] CWE- Missing Authentication for Critical Function
69-
[20] CWE- Download of Code Without Integrity Check
70-
[21] CWE- Incorrect Permission Assignment for Critical Resource
71-
[22] CWE- Allocation of Resources Without Limits or Throttling
72-
[23] CWE- URL Redirection to Untrusted Site ('Open Redirect')
73-
[24] CWE- Use of a Broken or Risky Cryptographic Algorithm
74-
[25] CWE- Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Cross-site scripting and SQL injection a</pre>
75-
<br>
76-
43+
<a (click)="openDialog(1, content)" style="cursor:pointer"><div><h3>Is Your Application Vulnerable ?</h3></div></a>
44+
<a (click)="openDialog(2, content)" style="cursor:pointer"><div><h3>How to prevent</h3></div></a>
45+
<a (click)="openDialog(3, content)" style="cursor:pointer"><div><h3>Examples</h3></div></a>
7746

7847
</mat-expansion-panel>
7948
</mat-accordion>

0 commit comments

Comments
 (0)