This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10 2013-A1-Injection"
From OWASP
Line 10: | Line 10: | ||
}} | }} | ||
− | + | <center> | |
− | {{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}} | + | <table style="align:center; text-align:center; margin: 0px 5px 0px 5px; border: 3px solid #000000; background-color:#FFFFFF; padding=2;"> |
+ | |||
+ | <tr style="background-color: #d9ead5; color: #000000;"> | ||
+ | <th width="16.5%"> Threat Agents</th> | ||
+ | <th width="16.5%"> Attack Vectors</th> | ||
+ | <th width="33%" colspan="2"> Security Weakness</th> | ||
+ | <th width="16.5%"> Technical Impacts</th> | ||
+ | <th width="16.5%"> Business Impacts</th> | ||
+ | </tr> | ||
+ | <tr> | ||
+ | <td style="background-color: #D9D9D9; color: #000000;"> ______</td>{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|EASY}} | ||
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}} | {{Top_10_2010:SummaryTableValue-2-Template|Prevalence|COMMON}} | ||
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|AVERAGE}} | {{Top_10_2010:SummaryTableValue-2-Template|Detectability|AVERAGE}} | ||
Line 21: | Line 31: | ||
<td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}>blank</td> | <td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}>blank</td> | ||
<td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}>blank</td> | <td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}>blank</td> | ||
− | + | <td style="background-color: #D9D9D9; color: #000000;">______</td> | |
+ | </tr> | ||
+ | <tr valign="top"> | ||
<table style="border: none; text-align: left; width: 100%; border-spacing:5px 5px;"> | <table style="border: none; text-align: left; width: 100%; border-spacing:5px 5px;"> |
Revision as of 16:19, 19 February 2013
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
[[Top 10 {{{year}}}-Injection|← Injection]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-A2-Broken Authentication and Session Management|A2-Broken Authentication and Session Management →]] |
Threat Agents | Attack Vectors | Security Weakness | Technical Impacts | Business Impacts | ||
---|---|---|---|---|---|---|
______ | Exploitability EASY |
Prevalence COMMON |
Detectability AVERAGE |
Impact SEVERE |
Application / Business Specific | |
blank. | blank | blank | blank | blank | ______ | |
My Title
blank
|
My Title
blank
| |
My Title
blank
|
My Title
blank
|
</td>
[[Top 10 {{{year}}}-Injection|← Injection]] | [[Top_10_{{{year}}}-Top 10|{{{year}}} Top 10 List]] |
[[Top 10 {{{year}}}-A2-Broken Authentication and Session Management|A2-Broken Authentication and Session Management →]] |