This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Log forging

From OWASP
Jump to: navigation, search


Description

Examples

Related Threats

Related Attacks

XSS Attacks

Related Vulnerabilities

Related Countermeasures

Category:Input Validation

Categories

This article is a stub. You can help OWASP by expanding it or discussing it on its Talk page.