Top 10 2010-A8-Failure to Restrict URL Access

From OWASP
Revision as of 16:24, 17 April 2010 by Neil Smithline (Talk | contribs)

(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
««««
Top 10 Introduction
Top 10 Risks
»»»»
Threat Agents Attack Vectors Security Weakness Weakness Detectability Technical Impact Business Impacts
______ Exploitability
EASY
Prevalence
COMMON
Detectability
AVERAGE
Impact
SIMPLE
______

{{Top_10_2010:SubsectionVulnerableTemplate|Injection| {{Top_10_2010:SubsectionPreventionTemplate|Injection| {{Top_10_2010:SubsectionExampleTemplate|Injection| {{Top_10_2010:SubsectionReferencesTemplate|Injection|


««««
Top 10 Introduction
Top 10 Risks
»»»»

© 2002-2010 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png