Top 10 2013-A5-Security Misconfiguration

From OWASP
Revision as of 10:33, 17 February 2013 by Neil Smithline (Talk | contribs)

Jump to: navigation, search

TEMPORARY PLACEHOLDER for 2013 T10

[[Top 10 {{{year}}}-Insecure Direct Object References|← Insecure Direct Object References]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-Sensitive Data Exposure|Sensitive Data Exposure →]]

PLEASE DELETE ME

Template:Top 10 2010:SummaryTableValues

Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific Prevalence
COMMON
Detectability
EASY
Impact
MODERATE
Application / Business Specific
blank. blank blank blank blank
Am I Vulnerable To 'Security Misconfiguration'?

blank

How Do I Prevent 'Security Misconfiguration'?

blank

  1. blankBullet1
  2. blankBullet2
Example Attack Scenarios

blank

blank code

blank

http://example.com/app/accountView?id=' or '1'='1

blank

References

OWASP

External

[[Top 10 {{{year}}}-Insecure Direct Object References|← Insecure Direct Object References]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-Sensitive Data Exposure|Sensitive Data Exposure →]]

© 2002-2013 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png
[[Category:OWASP Top Ten {{{year}}} Project]]