Top 10-2017 A5-Broken Access Control

From OWASP
Revision as of 18:11, 20 April 2017 by T.Gigler (talk | contribs) (Create an empty page for the new/reactivated Top 10 2017-A4-Broken Access Control (RC1))

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
← A3-Sensitive Data Exposure
2017 Table of Contents

PDF version

A5-Broken Access Control →
Threat Agents / Attack Vectors Security Weakness Impacts
App Specific Exploitability
AVERAGE
Prevalence
UNCOMMON
Detectability
EASY
Impact
MODERATE
Business ?
Am I Vulnerable To 'XML External Entities (XXE)'?


How Do I Prevent 'XML External Entities (XXE)'?


Example Attack Scenarios


References

OWASP

External

← A3-Sensitive Data Exposure
2017 Table of Contents

PDF version

A5-Broken Access Control →

© 2002-2017 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png