This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Periodic Table of Vulnerabilities - Abuse of Functionality"

From OWASP
Jump to: navigation, search
Line 27: Line 27:
  
 
=== References ===
 
=== References ===
 +
 +
[http://projects.webappsec.org/w/page/13246913/Abuse%20of%20Functionality WASC Abuse of Functionality]<br>
 +
 
[http://capec.mitre.org/data/definitions/210.html CAPEC – 210: Abuse of Functionality>]<br>
 
[http://capec.mitre.org/data/definitions/210.html CAPEC – 210: Abuse of Functionality>]<br>
 
[http://projects.webappsec.org/w/page/13246913/Abuse%20of%20Functionality
 
WASC Abuse of Functionality]<br>
 
  
 
[https://www.owasp.org/index.php/Category:Abuse_of_Functionality OWASP Category: Abuse of Functionality]<br>
 
[https://www.owasp.org/index.php/Category:Abuse_of_Functionality OWASP Category: Abuse of Functionality]<br>

Revision as of 20:20, 5 June 2013

Return to Periodic Table Working View

Abuse of Functionality

Root Cause Summary

Browser / Standards Solution

None

Perimeter Solution

None

Generic Framework Solution

None

Custom Framework Solution

None

Custom Code Solution

All features should have defined abuse cases and implemented protections against these abuses.

Discussion / Controversy

References

WASC Abuse of Functionality

CAPEC – 210: Abuse of Functionality>

OWASP Category: Abuse of Functionality