This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Top 10 2017-A10-Underprotected APIs"
From OWASP
(Create an empty page for the new Top 10 2017-A10-Underprotected APIs (RC1)) |
m (Deleted doubled argument 'year=2017' in SubsectionAdvancedTemplate => final reference) |
||
| Line 39: | Line 39: | ||
| − | {{Top_10_2010:SubsectionAdvancedTemplate | + | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=howPrevent|position=right|risk=10|year=2017|language=en}} |
| − | {{Top_10_2010:SubsectionAdvancedTemplate | + | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=example|position=left|risk=10|year=2017|language=en}} |
| Line 48: | Line 48: | ||
{{Top_10_2010:ExampleEndTemplate}} ---> | {{Top_10_2010:ExampleEndTemplate}} ---> | ||
| − | {{Top_10_2010:SubsectionAdvancedTemplate | + | {{Top_10_2010:SubsectionAdvancedTemplate|type={{Top_10_2010:StyleTemplate}}|subsection=references|position=right|risk=10|year=2017|language=en}} |
{{Top_10_2010:SubSubsectionOWASPReferencesTemplate|year=2017}} | {{Top_10_2010:SubSubsectionOWASPReferencesTemplate|year=2017}} | ||
* | * | ||
Revision as of 22:44, 20 April 2017
| ← A9-Using Components with Known Vulnerabilities | What's Next for Developers → |
| Threat Agents / Attack Vectors | Security Weakness | Impacts | |||
|---|---|---|---|---|---|
| App Specific | Exploitability AVERAGE |
Prevalence UNCOMMON |
Detectability EASY |
Impact MODERATE |
Business ? |
|
Am I Vulnerable To 'Insufficient Logging&Monitoring'?
|
How Do I Prevent 'Insufficient Logging&Monitoring'?
|
|
Example Attack Scenarios
|
References
OWASP External |
| ← A9-Using Components with Known Vulnerabilities | What's Next for Developers → |