This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Top 10 2010-A6-Security Misconfiguration
From OWASP
Revision as of 21:42, 17 April 2010 by Neil Smithline (talk | contribs)
NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.
Threat Agents | Attack Vectors | Security Weakness | Weakness Detectability | Technical Impact | Business Impacts |
---|---|---|---|---|---|
______ | Exploitability EASY |
Prevalence COMMON |
Detectability AVERAGE |
Impact SIMPLE |
______ |
Am I Vulnerable to Injection?
a
How Do I Prevent Injection?
b
Example Attack Scenarios
c