Backlinks
| Referring page | DR | Ref. domains | Linked domains | Anchor and target URL |
|---|---|---|---|---|
|
T-SQL-:-Hardcoded-encryption-key
https://derscanner.com/vulnerability-database/T-SQL-:-Hardcoded-encryption-key
derscanner.com
|
57 | 5 | 13 |
OWASP: Use of hard-coded cryptographic key
https://wiki.owasp.org/index.php/Use_of_hard-coded_cryptographic_key
NOFOLLOW
|
|
Joomscan: trouver des vulnérabilités sur un site Joomlareplyreply
https://www.funinformatique.com/joomscan-comment-detecter-les-failles-dun-site-joomla
funinformatique.com
|
15 | 25 | 383 |
Joomscan Security Scanner
https://wiki.owasp.org/index.php/Category:OWASP_Joomla_Vulnerability_Scanner_Project
DOFOLLOW
|
|
fuzzbunch-tool
https://sec.skill.or.kr/hacking/fuzzbunch-tool
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
|
|
fuzzbunch-tool
https://sec.skill.or.kr/hacking/fuzzbunch-tool
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
|
|
Oauth2 · Api · Help · GitLab
https://eforce1.feld.cvut.cz/gitlab/help/api/oauth2.md
eforce1.feld.cvut.cz
|
— | 0 | 11 |
CSRF attacks
https://wiki.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
NOFOLLOW
|
|
Go-:-DOS-attack-possible
https://derscanner.com/vulnerability-database/Go-:-DOS-attack-possible
derscanner.com
|
57 | 5 | 13 |
OWASP: Application Denial of Service
https://wiki.owasp.org/index.php/Application_Denial_of_Service
NOFOLLOW
|
|
Classes mixins pour objet unique | Documentation de Django | Django
docs.djangoproject.com
|
79 | 747 | 299 |
référence directe d’objet non sécurisé
https://wiki.owasp.org/index.php/Top_10_2013-A4-Insecure_Direct_Object_References
DOFOLLOW
|
|
Fuzzing web applications | Fluid Attacks
https://fluidattacks.com/blog/fuzzing-web-applications
fluidattacks.com
|
71 | 36 | 751 |
Some examples from OWASP
https://wiki.owasp.org/index.php/OWASP_Testing_Guide_Appendix_C:_Fuzz_Vectors
DOFOLLOW
|
|
VBA-:-Hardcoded-encryption-key
https://derscanner.com/vulnerability-database/VBA-:-Hardcoded-encryption-key
derscanner.com
|
57 | 5 | 13 |
OWASP: Use of hard-coded cryptographic key
https://wiki.owasp.org/index.php/Use_of_hard-coded_cryptographic_key
NOFOLLOW
|
|
T-SQL-:-DOS-attack-possible
https://derscanner.com/vulnerability-database/T-SQL-:-DOS-attack-possible
derscanner.com
|
57 | 5 | 13 |
OWASP: Application Denial of Service
https://wiki.owasp.org/index.php/Application_Denial_of_Service
NOFOLLOW
|
|
wireless-iot
https://sec.skill.or.kr/hacking/wireless-iot
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
|
|
wireless-iot
https://sec.skill.or.kr/hacking/wireless-iot
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
|
|
general – terminal23.net
https://www.terminal23.net/category/general
terminal23.net
|
39 | 5 | 375 |
https://wiki.owasp.org/index.php/Category:OWASP_Code_Review_Project
https://wiki.owasp.org/index.php/Category:OWASP_Code_Review_Project
DOFOLLOW
|
|
Config-files-:-Restrictions-removed:-DOS-attack-possible
https://derscanner.com/vulnerability-database/Config-files-:-Restrictions-removed:-DOS-attack-possible
derscanner.com
|
57 | 5 | 13 |
OWASP: Application Denial of Service
https://wiki.owasp.org/index.php/Application_Denial_of_Service
NOFOLLOW
|
|
Graduate School
https://catalog.cuanschutz.edu/cu-anschutz/schools-colleges-programs/graduate-school
catalog.cuanschutz.edu
|
59 | 1 | 36 |
(no anchor)
https://wiki.owasp.org/index.php/Category:Access_Control
DOFOLLOW
|
|
A08 ソフトウェアとデータの整合性の不具合 - OWASP Top 10:2021
https://owasp.org/Top10/2021/ja/A08_2021-Software_and_Data_Integrity_Failures
owasp.org
|
82 | 2,924 | 502 |
OWASP Cheat Sheet: Deserialization
https://wiki.owasp.org/index.php/Deserialization_Cheat_Sheet
DOFOLLOW
|
|
kadavra-automatic-lfe-exploit
https://sec.skill.or.kr/hacking/kadavra-automatic-lfe-exploit
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
|
|
kadavra-automatic-lfe-exploit
https://sec.skill.or.kr/hacking/kadavra-automatic-lfe-exploit
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
|
|
Kotlin-:-Undocumented-feature:-time-bomb
https://derscanner.com/vulnerability-database/Kotlin-:-Undocumented-feature:-time-bomb
derscanner.com
|
57 | 5 | 13 |
OWASP: Logic/Time Bomb
https://wiki.owasp.org/index.php/Logic/time_bomb
NOFOLLOW
|
|
Confluence OAuth 2.0 provider API
https://developer.atlassian.com/server/confluence/confluence-oauth2-provider-api
developer.atlassian.com
|
77 | 297 | 54 |
CSRF attacks.css-1wits42{display:inline-block;-webkit-flex-shrink:0;-ms-flex-negative:0;flex-shrink:0;line-height:1;width:16px;height:16px;}.css-1wits42 >svg{overflow:hidden;pointer-events:none;max-width:100%;max-height:100%;color:var(--icon-primary-color);fill:var(--icon-secondary-color);vertical-align:bottom;}.css-1wits42 >svg stop{stop-color:currentColor;}@media screen and (forced-colors: active){.css-1wits42 >svg{-webkit-filter:grayscale(1);filter:grayscale(1);--icon-primary-color:CanvasText;--icon-seco
https://wiki.owasp.org/index.php/Cross-Site_Request_Forgery_(CSRF)
DOFOLLOW
|
|
Visual-Basic-6-:-Undocumented-feature:-time-bomb
https://derscanner.com/vulnerability-database/Visual-Basic-6-:-Undocumented-feature:-time-bomb
derscanner.com
|
57 | 5 | 13 |
OWASP: Logic/Time Bomb
https://wiki.owasp.org/index.php/Logic/time_bomb
NOFOLLOW
|
|
bypassing-browser-security
https://sec.skill.or.kr/black-hat/bypassing-browser-security
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
|
|
bypassing-browser-security
https://sec.skill.or.kr/black-hat/bypassing-browser-security
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
|
|
5 Critical Steps for Effective IoT Security - IoTSecure
https://www.iotsecure.io/2021/03/5-critical-steps-for-effective-iot-security
iotsecure.io
|
11 | 1 | 29 |
challenging, but according to the OWASP top 10 controls for IoT,
https://wiki.owasp.org/index.php/OWASP_Internet_of_Things_Project
DOFOLLOW
|
|
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
|
82 | 2,924 | 502 |
download
https://wiki.owasp.org/images/a/ac/OWASP_SCP_Quick_Reference_Guide_v2.doc
DOFOLLOW
|
|
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
|
82 | 2,924 | 502 |
Project Presentation
https://wiki.owasp.org/images/f/fd/Secure_Coding_Practices_Quick_Ref_6.ppt
DOFOLLOW
|
|
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
|
82 | 2,924 | 502 |
Archive XLS Feedback Spreadsheet
https://wiki.owasp.org/images/6/64/SCP-QRG_Revisions_History.xls
DOFOLLOW
|
|
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
|
82 | 2,924 | 502 |
download
https://wiki.owasp.org/images/c/c8/OWASP_SCP_Quick_Reference_Guide_SPA.doc
DOFOLLOW
|
|
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
|
82 | 2,924 | 502 |
download
http://wiki.owasp.org/images/0/0b/OWASP_SCP_Quick_Reference_Guide_v1-1b.doc
DOFOLLOW
|
|
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
|
82 | 2,924 | 502 |
download
https://wiki.owasp.org/images/1/10/OWASP_SCP_Quick_Reference_Guide_v1.doc
DOFOLLOW
|
|
OWASP Secure Coding Practices-Quick Reference Guide | OWASP Foundation
https://owasp.org/www-project-secure-coding-practices-quick-reference-guide?ref=rubycentral.org
owasp.org
|
82 | 2,924 | 502 |
Slide deck
https://wiki.owasp.org/images/5/54/Secure_Coding_Practices_Quick_Ref_5.ppt
DOFOLLOW
|
|
T-SQL-:-Undocumented-feature:-time-bomb
https://derscanner.com/vulnerability-database/T-SQL-:-Undocumented-feature:-time-bomb
derscanner.com
|
57 | 5 | 13 |
OWASP: Logic/Time Bomb
https://wiki.owasp.org/index.php/Logic/time_bomb
NOFOLLOW
|
|
SQL Injection: Desvendando Fraquezas e Fortalecendo a Segurança
https://evernow.com.br/sql-injection-desvendando-fraquezas-e-fortalecendo-a-seguranca
evernow.com.br
|
— | 0 | 10 |
OWASP Top 10
https://wiki.owasp.org/images/0/06/OWASP_Top_10-2017-pt_pt.pdf
DOFOLLOW
|
|
pauloasilva.com
https://pauloasilva.com/
pauloasilva.com
|
47 | 2 | 21 |
English
https://wiki.owasp.org/images/0/08/OWASP_SCP_Quick_Reference_Guide_v2.pdf
DOFOLLOW
|
|
pauloasilva.com
https://pauloasilva.com/
pauloasilva.com
|
47 | 2 | 21 |
OWASP Secure Coding Practices - Quick Reference Guide
https://wiki.owasp.org/index.php/OWASP_Secure_Coding_Practices_-_Quick_Reference_Guide
DOFOLLOW
|
|
pauloasilva.com
https://pauloasilva.com/
pauloasilva.com
|
47 | 2 | 21 |
Português (Portugal)
https://wiki.owasp.org/images/6/6d/OWASP_SCP_v1.3_pt-PT.pdf
DOFOLLOW
|
|
wifi-hacking
https://sec.skill.or.kr/hacking/wifi-hacking
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
|
|
wifi-hacking
https://sec.skill.or.kr/hacking/wifi-hacking
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
|
|
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
|
|
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
|
|
C-or-C++-:-XML-external-entity-(XXE-injection)
https://derscanner.com/vulnerability-database/C-or-C%2B%2B-:-XML-external-entity-(XXE-injection)
derscanner.com
|
57 | 5 | 13 |
OWASP: Testing for XML Injection
https://wiki.owasp.org/index.php/Testing_for_XML_Injection_(OTG-INPVAL-008)
NOFOLLOW
|
|
Firefox 보안 지침 - 웹 보안 | MDNMDN
https://developer.mozilla.org/ko/docs/Web/Security/Firefox_Security_Guidelines
developer.mozilla.org
|
86 | 10,995 | 1,121 |
OWASP 보안 코딩 원칙
https://wiki.owasp.org/index.php/Secure_Coding_Principles
DOFOLLOW
|
|
Insecure Direct Object Reference (IDOR) Vulnerabilities in Brief
https://www.invicti.com/blog/web-security/insecure-direct-object-reference-vulnerabilities-idor
invicti.com
|
73 | 79 | 342 |
A4 Insecure Direct Object Reference
https://wiki.owasp.org/index.php/Top_10_2007-A4
DOFOLLOW
|
|
Insecure Direct Object Reference (IDOR) Vulnerabilities in Brief
https://www.invicti.com/blog/web-security/insecure-direct-object-reference-vulnerabilities-idor
invicti.com
|
73 | 79 | 342 |
A5 Broken Access Control
https://wiki.owasp.org/index.php/Top_10-2017_A5-Broken_Access_Control
DOFOLLOW
|
|
单对象混入 | Django 文档 | Django
https://docs.djangoproject.com/zh-hans/4.0/ref/class-based-views/mixins-single-object
docs.djangoproject.com
|
79 | 747 | 299 |
不安全的直接对象引用
https://wiki.owasp.org/index.php/Top_10_2013-A4-Insecure_Direct_Object_References
DOFOLLOW
|
|
ABAP-:-Hardcoded-encryption-key
https://derscanner.com/vulnerability-database/ABAP-:-Hardcoded-encryption-key
derscanner.com
|
57 | 5 | 13 |
OWASP: Use of hard-coded cryptographic key
https://wiki.owasp.org/index.php/Use_of_hard-coded_cryptographic_key
NOFOLLOW
|
|
JavaScript-:-Easily-guessed-database-name
https://derscanner.com/vulnerability-database/JavaScript-:-Easily-guessed-database-name
derscanner.com
|
57 | 5 | 13 |
OWASP: Database security
https://wiki.owasp.org/index.php/Configuration
NOFOLLOW
|
|
emv
https://sec.skill.or.kr/black-hat/emv
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PPTS-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pptx
DOFOLLOW
|
|
emv
https://sec.skill.or.kr/black-hat/emv
sec.skill.or.kr
|
— | 0 | 26 |
OWASP 2017's Top 10 (Kor-PDF-Download)arrow-up-right
https://wiki.owasp.org/?title=Special:Redirect/file/OWASP_Top_10-2017-ko.pdf
DOFOLLOW
|
|
OWASP Top Ten Web Application Security Risks | OWASP Foundation
https://owasp.org/www-project-top-ten?ref=blog.e-saurio.com
owasp.org
|
82 | 2,924 | 502 |
OWASP Top 10 2013 - Hebrew
https://wiki.owasp.org/index.php/OWASP_Top10_Hebrew
DOFOLLOW
|
Frequently Asked Questions
How many backlinks does wiki.owasp.org have?
The backlinks page for wiki.owasp.org shows all individual inbound links discovered in our crawl of the web. Each backlink represents a hyperlink on another website that points to a page on wiki.owasp.org. Use the filters to narrow results by dofollow/nofollow status, domain rating, or anchor text.
What is a backlink?
A backlink is a hyperlink on one website that points to a page on a different website. Backlinks are one of the most important ranking factors in search engine algorithms because they act as votes of confidence from other sites. The more high-quality backlinks a domain has, the more authority search engines assign to it.
Are the backlinks to wiki.owasp.org dofollow or nofollow?
Backlinks to wiki.owasp.org include both dofollow and nofollow links. Dofollow links pass link equity (ranking power) to the target site, while nofollow links include a rel="nofollow" attribute that tells search engines not to pass authority. Both types contribute to a natural backlink profile, but dofollow links carry more SEO weight. You can filter by link type using the rel filter above the table.
How often is backlink data updated?
Backlink data is updated monthly when our web crawler completes a new cycle. Our pipeline processes billions of web pages to discover new backlinks, track lost links, and update domain authority scores. The freshness of data depends on when our crawler last visited the referring pages.