Difference between revisions of "OWASP Periodic Table of Vulnerabilities - Application Misconfiguration"

From OWASP
Jump to: navigation, search
Line 28: Line 28:
  
 
=== References ===
 
=== References ===
[https://www.owasp.org/index.php/Top_10_2010-A6-Security_Misconfiguration (Top 10 2010-A6-Security Misconfiguration)]<br>
+
[https://www.owasp.org/index.php/Top_10_2010-A6-Security_Misconfiguration Top 10 2010-A6-Security Misconfiguration]<br>
  
 
[http://projects.webappsec.org/w/page/13246914/Application%20Misconfiguration Application Misconfiguration WASC TC]<br>
 
[http://projects.webappsec.org/w/page/13246914/Application%20Misconfiguration Application Misconfiguration WASC TC]<br>
  
 
[http://capec.mitre.org/data/definitions/348.html CAREC-348 WASC Threat Classification 2.0 – WASC – 15 Application Misconfiguration]<br>
 
[http://capec.mitre.org/data/definitions/348.html CAREC-348 WASC Threat Classification 2.0 – WASC – 15 Application Misconfiguration]<br>

Revision as of 13:57, 5 June 2013

Return to Periodic Table Working View

Application Misconfiguration

Root Cause Summary

Browser / Standards Solution

Perimeter Solution

Generic Framework Solution

Custom Framework Solution

Custom Code Solution

Discussion / Controversy

References

Top 10 2010-A6-Security Misconfiguration

Application Misconfiguration WASC TC

CAREC-348 WASC Threat Classification 2.0 – WASC – 15 Application Misconfiguration