This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Top 10 2017-A10-Underprotected APIs
From OWASP
Revision as of 22:15, 20 April 2017 by T.Gigler (talk | contribs) (Create an empty page for the new Top 10 2017-A10-Underprotected APIs (RC1))
| ← A9-Using Components with Known Vulnerabilities | What's Next for Developers → |
| Threat Agents / Attack Vectors | Security Weakness | Impacts | |||
|---|---|---|---|---|---|
| App Specific | Exploitability AVERAGE |
Prevalence UNCOMMON |
Detectability EASY |
Impact MODERATE |
Business ? |
|
Am I Vulnerable To 'Insufficient Logging&Monitoring'?
|
How Do I Prevent 'Insufficient Logging&Monitoring'?
|
|
Example Attack Scenarios
|
References
OWASP External |
| ← A9-Using Components with Known Vulnerabilities | What's Next for Developers → |