Difference between revisions of "Code Injection"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
{{Template:Stub}}
 
{{Template:Stub}}
 +
 +
==Description==
 +
 +
This article should cover attacks based on injecting code into a running application.
 +
 +
==Examples ==
 +
 +
==Related Threats==
 +
 +
==Related Attacks==
 +
 +
==Related Vulnerabilities==
 +
 +
==Related Countermeasures==
  
 
[[Category:Attack]]
 
[[Category:Attack]]
  
 
[[Category:Injection Attack]]
 
[[Category:Injection Attack]]

Revision as of 18:37, 17 July 2006

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.


Description

This article should cover attacks based on injecting code into a running application.

Examples

Related Threats

Related Attacks

Related Vulnerabilities

Related Countermeasures