This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Reviewing Code for Authorization Issues"
From OWASP
(New page: OWASP Code Review Guide Table of Contents__TOC__ == Introduction == ==How to locate the potentially vulnerable code == == Vulnerable Patterns for Authorization issues == ==Good Pat...) |
|||
Line 7: | Line 7: | ||
== Vulnerable Patterns for Authorization issues == | == Vulnerable Patterns for Authorization issues == | ||
− | ==Good Patterns & procedures | + | ==Good Patterns & procedures for Authorization == |
[[Category:OWASP Code Review Project]] | [[Category:OWASP Code Review Project]] | ||
[[Category:Authorization]] | [[Category:Authorization]] |