This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Top 10 2010-A6-Security Misconfiguration
From OWASP
Revision as of 21:23, 17 April 2010 by Neil Smithline (talk | contribs) (Created page with '{{Top_10_2010:TopTemplate|usenext=NextLink|next=-Broken Authentication and Session Management|useprev=PrevLink|prev=-Cross Site Request Forgery|usemain=MainLink|main=}} <center…')
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
Threat Agents | Attack Vectors | Security Weakness | Weakness Detectability | Technical Impact | Business Impacts |
---|---|---|---|---|---|
______ | Exploitability EASY |
Prevalence COMMON |
Detectability AVERAGE |
Impact SIMPLE |
______ |
{{Top_10_2010:SubsectionVulnerableTemplate|Injection| {{Top_10_2010:SubsectionPreventionTemplate|Injection| {{Top_10_2010:SubsectionExampleTemplate|Injection| {{Top_10_2010:SubsectionReferencesTemplate|Injection|