Difference between revisions of "Top 10 2013-A1-Injection"

From OWASP
Jump to: navigation, search
Line 29: Line 29:
 
</div>
 
</div>
 
hardy har har har
 
hardy har har har
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1|year=2013}}
+
{{Top_10_2010:SubsectionAdvancedTemplate-TEST|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1|year=2013}}
 
blank
 
blank
 
#blankBullet1
 
#blankBullet1

Revision as of 22:01, 15 February 2013

[[Top 10 {{{year}}}-Main|← Main]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-Broken Authentication and Session Management|Broken Authentication and Session Management →]]
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific Exploitability
EASY
Prevalence
COMMON
Detectability
AVERAGE
Impact
SEVERE
Application / Business Specific
blank. blank blank blank blank
</tr>
Am I vulnerable to

hardy har har har

How Do I Prevent Injection?

blank

  1. blankBullet1
  2. blankBullet2
Am I vulnerable to
hardy har har har
blank code

blank

http://example.com/app/accountView?id=' or '1'='1

blank

References

OWASP

External

[[Top 10 {{{year}}}-Main|← Main]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-Broken Authentication and Session Management|Broken Authentication and Session Management →]]

© 2002-2013 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png
[[Category:OWASP Top Ten {{{year}}} Project]]