This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Mobile Top 10 2016-M1-Improper Platform Usage"
From OWASP
(Created page with "{{Mobile_Top_10_2016:TopTemplate |usenext=Mobile2016NextLink |next=M2-{{Mobile_Top_10_2016:ByTheNumbers |2 |year=2016 |langua...") |
|||
Line 16: | Line 16: | ||
<td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}>This category covers misuse of a platform feature or failure to use platform security controls. It might include Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system. | <td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}>This category covers misuse of a platform feature or failure to use platform security controls. It might include Android intents, platform permissions, misuse of TouchID, the Keychain, or some other security control that is part of the mobile operating system. | ||
</td> | </td> | ||
− | <td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}>The attack vectors correspond to the same attack vectors available through the traditional OWASP Top Ten. | + | <td {{Template:Mobile Top 10 2016:SummaryTableRowStyleTemplate|year=2016}}>The attack vectors correspond to the same attack vectors available through the traditional OWASP Top Ten. Any exposed API call can serve as attack vector here. |
</td> | </td> |