Difference between revisions of "Top 10 2013-A1-Injection"

From OWASP
Jump to: navigation, search
Line 21: Line 21:
 
{{Top_10_2010:SummaryTableEndTemplate}}
 
{{Top_10_2010:SummaryTableEndTemplate}}
  
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=1|risk=1|year=2013}}
+
          <table style="border: none; text-align: left; width: 100%; border-spacing:5px 5px;">
blank
+
              <tr>
 +
 
 +
<td style="vertical-align: top; width: 50%; padding: 5px; border: 3px solid #93b88b; background-color: #d9ead5">
 +
 
 +
<div style="font-style: bold; color: #000000; font-size: 150%;">Am I vulnerable to</div>
 +
hardy har har har
 
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1|year=2013}}
 
{{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|number=2|risk=1|year=2013}}
 
blank
 
blank

Revision as of 20:22, 15 February 2013

[[Top 10 {{{year}}}-Main|← Main]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-Broken Authentication and Session Management|Broken Authentication and Session Management →]]
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific Exploitability
EASY
Prevalence
COMMON
Detectability
AVERAGE
Impact
SEVERE
Application / Business Specific
blank. blank blank blank blank
Am I vulnerable to

hardy har har har

How Do I Prevent 'Injection'?

blank

  1. blankBullet1
  2. blankBullet2
Example Attack Scenarios

blank

blank code

blank

http://example.com/app/accountView?id=' or '1'='1

blank

References

OWASP

External

[[Top 10 {{{year}}}-Main|← Main]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-Broken Authentication and Session Management|Broken Authentication and Session Management →]]

© 2002-2013 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png
[[Category:OWASP Top Ten {{{year}}} Project]]