Difference between revisions of "Reviewing Code for Authorization Issues"

From OWASP
Jump to: navigation, search
(New page: OWASP Code Review Guide Table of Contents__TOC__ == Introduction == ==How to locate the potentially vulnerable code == == Vulnerable Patterns for Authorization issues == ==Good Pat...)
 
Line 7: Line 7:
 
== Vulnerable Patterns for Authorization issues ==
 
== Vulnerable Patterns for Authorization issues ==
  
==Good Patterns & procedures to prevent OS injection==
+
==Good Patterns & procedures for Authorization ==
  
 
[[Category:OWASP Code Review Project]]
 
[[Category:OWASP Code Review Project]]
 
[[Category:Authorization]]
 
[[Category:Authorization]]

Revision as of 04:38, 1 August 2007

OWASP Code Review Guide Table of Contents

Introduction

How to locate the potentially vulnerable code

Vulnerable Patterns for Authorization issues

Good Patterns & procedures for Authorization