Difference between revisions of "Top 10 2010-A6-Security Misconfiguration"

From OWASP
Jump to: navigation, search
(Created page with '{{Top_10_2010:TopTemplate|usenext=NextLink|next=-Broken Authentication and Session Management|useprev=PrevLink|prev=-Cross Site Request Forgery|usemain=MainLink|main=}} <center…')
 
Line 22: Line 22:
 
</center>
 
</center>
  
{{Top_10_2010:SubsectionVulnerableTemplate|Injection|
+
{{Top_10_2010:SubsectionVulnerableTemplate|Injection|a}}
{{Top_10_2010:SubsectionPreventionTemplate|Injection|
+
{{Top_10_2010:SubsectionPreventionTemplate|Injection|b}}
{{Top_10_2010:SubsectionExampleTemplate|Injection|
+
{{Top_10_2010:SubsectionExampleTemplate|Injection|c}}
{{Top_10_2010:SubsectionReferencesTemplate|Injection|
+
{{Top_10_2010:SubsectionReferencesTemplate|Injection|d}}
  
  
 
{{Top_10_2010:BottomTemplate|usenext=NextLink|next=-Broken Authentication and Session Management|useprev=PrevLink|prev=-Cross Site Request Forgery|usemain=MainLink|main=}}
 
{{Top_10_2010:BottomTemplate|usenext=NextLink|next=-Broken Authentication and Session Management|useprev=PrevLink|prev=-Cross Site Request Forgery|usemain=MainLink|main=}}

Revision as of 16:42, 17 April 2010

««««
Top 10 Introduction
Top 10 Risks
»»»»
Threat Agents Attack Vectors Security Weakness Weakness Detectability Technical Impact Business Impacts
______ Exploitability
EASY
Prevalence
COMMON
Detectability
AVERAGE
Impact
SIMPLE
______

Am I Vulnerable to Injection?

a

How Do I Prevent Injection?

b

Example Attack Scenarios

c

References

««««
Top 10 Introduction
Top 10 Risks
»»»»

© 2002-2010 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png