Difference between revisions of "Behavioral Discrepancy Infoleak"

From OWASP
Jump to: navigation, search
 
Line 1: Line 1:
 +
{{Template:Stub}}
 +
{{Template:Vulnerability}}
 +
 +
__TOC__
 +
 +
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
 +
 +
[[ASDR_TOC_Vulnerabilities|Vulnerabilities Table of Contents]]
 +
 +
[[ASDR Table of Contents]]
 +
 +
==Description==
 +
 
Changes of behaviors or responses reveal information about the application.  
 
Changes of behaviors or responses reveal information about the application.  
  
==Related Attacks==
 
[[OS fingerprinting]]
 
  
{{Template:Stub}}
+
==Risk Factors==
 +
TBD
 +
 
 +
 
 +
==Examples==
 +
 
 +
TBD
 +
 
 +
 
 +
==Related [[Attacks]]==
 +
 
 +
* [[OS fingerprinting]]
 +
 
 +
 
 +
==Related [[Vulnerabilities]]==
 +
 
 +
* [[Vulnerability 1]]
 +
* [[Vulnerabiltiy 2]]
 +
 
 +
 
 +
==Related [[Controls]]==
 +
 
 +
* [[Control 1]]
 +
* [[Control 2]]
 +
 
 +
 
 +
==Related [[Technical Impacts]]==
 +
 
 +
* [[Technical Impact 1]]
 +
* [[Technical Impact 2]]
 +
 
 +
 
 +
==References==
 +
TBD
 +
 
 +
[[Category:FIXME|add links and subcategory
 +
 
 +
In addition, one should classify vulnerability based on the following subcategories: Ex:<nowiki>[[Category:Error Handling Vulnerability]]</nowiki>
 +
 
 +
Availability Vulnerability
 +
 
 +
Authorization Vulnerability
 +
 
 +
Authentication Vulnerability
 +
 
 +
Concurrency Vulnerability
 +
 
 +
Configuration Vulnerability
 +
 
 +
Cryptographic Vulnerability
 +
 
 +
Encoding Vulnerability
 +
 
 +
Error Handling Vulnerability
 +
 
 +
Input Validation Vulnerability
 +
 
 +
Logging and Auditing Vulnerability
 +
 
 +
Session Management Vulnerability]]
 +
 
 +
__NOTOC__
 +
 
  
 +
[[Category:OWASP ASDR Project]]
 
[[Category:Vulnerability]]
 
[[Category:Vulnerability]]

Revision as of 11:44, 22 September 2008

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.


This is a Vulnerability. To view all vulnerabilities, please see the Vulnerability Category page.


Last revision (mm/dd/yy): 09/22/2008

Vulnerabilities Table of Contents

ASDR Table of Contents

Description

Changes of behaviors or responses reveal information about the application.


Risk Factors

TBD


Examples

TBD


Related Attacks


Related Vulnerabilities


Related Controls


Related Technical Impacts


References

TBD