Skip to content

Commit aa707e9

Browse files
authored
Merge pull request #4381 from smowton/smowton/admin/fix-owasp-broken-links
Fix OWASP broken links
2 parents 48c6f34 + 578ea1a commit aa707e9

File tree

16 files changed

+16
-16
lines changed

16 files changed

+16
-16
lines changed

cpp/ql/src/Security/CWE/CWE-022/TaintedPath.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ access all the system's passwords.</p>
3939

4040
<li>
4141
OWASP:
42-
<a href="https://www.owasp.org/index.php/Path_traversal">Path Traversal</a>.
42+
<a href="https://owasp.org/www-community/attacks/Path_Traversal">Path Traversal</a>.
4343
</li>
4444

4545
</references>

csharp/ql/src/Security Features/CWE-022/TaintedPath.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ sent back to the user, giving them access to all the system's passwords.</p>
4141

4242
<li>
4343
OWASP:
44-
<a href="https://www.owasp.org/index.php/Path_traversal">Path Traversal</a>.
44+
<a href="https://owasp.org/www-community/attacks/Path_Traversal">Path Traversal</a>.
4545
</li>
4646

4747
</references>

csharp/ql/src/Security Features/CWE-022/ZipSlip.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ Snyk:
7171
</li>
7272
<li>
7373
OWASP:
74-
<a href="https://www.owasp.org/index.php/Path_traversal">Path Traversal</a>.
74+
<a href="https://owasp.org/www-community/attacks/Path_Traversal">Path Traversal</a>.
7575
</li>
7676

7777
</references>

csharp/ql/src/Security Features/CWE-643/XPathInjection.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ variables in an <code>XsltArgumentList</code>.
4242
</example>
4343

4444
<references>
45-
<li>OWASP: <a href="https://www.owasp.org/index.php?title=Testing_for_XPath_Injection_(OTG-INPVAL-010)">Testing for XPath Injection</a>.</li>
45+
<li>OWASP: <a href="https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/09-Testing_for_XPath_Injection">Testing for XPath Injection</a>.</li>
4646
<li>OWASP: <a href="https://www.owasp.org/index.php/XPATH_Injection">XPath Injection</a>.</li>
4747
<li>MSDN: <a href="https://msdn.microsoft.com/en-us/library/dd567715.aspx">User Defined Functions and Variables</a>.</li>
4848
</references>

csharp/ql/src/experimental/CWE-099/TaintedWebClient.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ system's passwords.</p>
5151

5252
<li>
5353
OWASP:
54-
<a href="https://www.owasp.org/index.php/Path_traversal">Path Traversal</a>.
54+
<a href="https://owasp.org/www-community/attacks/Path_Traversal">Path Traversal</a>.
5555
</li>
5656

5757
</references>

java/ql/src/Security/CWE/CWE-022/TaintedPath.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -39,7 +39,7 @@ giving them access to all the system's passwords.</p>
3939

4040
<li>
4141
OWASP:
42-
<a href="https://www.owasp.org/index.php/Path_traversal">Path Traversal</a>.
42+
<a href="https://owasp.org/www-community/attacks/Path_Traversal">Path Traversal</a>.
4343
</li>
4444

4545
</references>

java/ql/src/Security/CWE/CWE-022/ZipSlip.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,7 @@ Snyk:
6363
</li>
6464
<li>
6565
OWASP:
66-
<a href="https://www.owasp.org/index.php/Path_traversal">Path Traversal</a>.
66+
<a href="https://owasp.org/www-community/attacks/Path_Traversal">Path Traversal</a>.
6767
</li>
6868

6969
</references>

java/ql/src/Security/CWE/CWE-209/StackTraceExposure.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ information.</p>
3838
</example>
3939

4040
<references>
41-
<li>OWASP: <a href="https://www.owasp.org/index.php/Information_Leak_(information_disclosure)">Information Leak</a>.</li>
41+
<li>OWASP: <a href="https://owasp.org/www-community/Improper_Error_Handling">Improper Error Handling</a>.</li>
4242

4343
<li>CERT Java Coding Standard:
4444
<a href="https://www.securecoding.cert.org/confluence/display/java/ERR01-J.+Do+not+allow+exceptions+to+expose+sensitive+information">ERR01-J.

java/ql/src/experimental/Security/CWE/CWE-643/XPathInjection.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ The fifth example is a dom4j XPath injection example.
3838
</example>
3939

4040
<references>
41-
<li>OWASP: <a href="https://www.owasp.org/index.php?title=Testing_for_XPath_Injection_(OTG-INPVAL-010)">Testing for XPath Injection</a>.</li>
41+
<li>OWASP: <a href="https://owasp.org/www-project-web-security-testing-guide/latest/4-Web_Application_Security_Testing/07-Input_Validation_Testing/09-Testing_for_XPath_Injection">Testing for XPath Injection</a>.</li>
4242
<li>OWASP: <a href="https://www.owasp.org/index.php/XPATH_Injection">XPath Injection</a>.</li>
4343
</references>
4444
</qhelp>

javascript/ql/src/Security/CWE-022/TaintedPath.qhelp

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ system's passwords.
5050
</example>
5151

5252
<references>
53-
<li>OWASP: <a href="https://www.owasp.org/index.php/Path_traversal">Path Traversal</a>.</li>
53+
<li>OWASP: <a href="https://owasp.org/www-community/attacks/Path_Traversal">Path Traversal</a>.</li>
5454
<li>npm: <a href="https://www.npmjs.com/package/sanitize-filename">sanitize-filename</a> package.</li>
5555
</references>
5656
</qhelp>

0 commit comments

Comments
 (0)