Top 10 2013-A9-Using Components with Known Vulnerabilities

From OWASP
Revision as of 13:28, 17 February 2013 by Neil Smithline (Talk | contribs)

Jump to: navigation, search
[[Top 10 {{{year}}}-Cross-Site Request Forgery (CSRF)|← Cross-Site Request Forgery (CSRF)]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-Unvalidated Redirects and Forwards|Unvalidated Redirects and Forwards →]]
Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts
Application Specific Exploitability
EASY
Prevalence
COMMON
Detectability
AVERAGE
Impact
SEVERE
Application / Business Specific
blank. blank blank blank blank
Am I Vulnerable To 'Using Components with Known Vulnerabilities'?

blank

How Do I Prevent 'Using Components with Known Vulnerabilities'?

blank

  1. blankBullet1
  2. blankBullet2
Example Attack Scenarios

blank

blank code

blank

http://example.com/app/accountView?id=' or '1'='1

blank

References

OWASP

External

[[Top 10 {{{year}}}-Cross-Site Request Forgery (CSRF)|← Cross-Site Request Forgery (CSRF)]]
2013 Table of Contents

2013 Top 10 List

[[Top 10 {{{year}}}-Unvalidated Redirects and Forwards|Unvalidated Redirects and Forwards →]]

© 2002-2013 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png
[[Category:OWASP Top Ten {{{year}}} Project]]