This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit

Data Structure Issues

Revision as of 12:08, 26 May 2009 by Deleted user (talk | contribs)

Jump to: navigation, search

[ damelin correspondence college south africa ] [ nortan antivirus 2005 serial key ] [ off lease automobiles ] [ african canadian helping youths ] [ automatic mechanical orient watch ] [ de gimnasia la reglas ] [ asian loni pics ] [ norton antivirus live update download ] [ auto cayuga dealer ontario used ] domain [ asia disabled regional society ] [ antivirus for exchange 5.5 ] [ overland tour africa ] [ australian manufacturing inc. ] cedarberg mountains south africa [ neighbours soap australia ] [ automotive fl mail ] [ african american audio book ] [ africa company construction in south ] [ mccaffee antivirus software ] index [ auto body paint hagerstown maryland ] [ 420e auto bennett cpap puritan ] [ joe crede autographs ] [ budget renta car south africa ] [ australia government information ] [ south coast properties south africa ] [ real estate private sales australia ] index [ south african country life magazine ] asian cravings [ auto loan bad ] job agencies sydney australia [ african tribal music instruments ] [ kill bill asian ] [ lyveden australian shepherds ] [ manually uninstall symantec antivirus corporate edition ] [ run autoexec bat ] [ continental map of africa ] map [ inpress magazine australia ] [ auto racing ] [ norton antivirus corporate edition 7.5 ] auto repair service new castle pennsylvania link [ australian travel warnings ] [ discount auto parts jacksonville ] [ win antivirus pro reviews ] [ a political map of south east asia ] pretty asia women Template:CandidateForDeletion


Last revision (mm/dd/yy): 05/26/2009


A vulnerability is a weakness in an application (frequently a broken or missing control) that enables an attack to succeed. Be sure you don't put [attacks] or [controls] in this category.

  1. Start with a one-sentence description of the vulnerability
  2. What is the problem that creates the vulnerability?
  3. What are the attacks that target this vulnerability?
  4. What are the technical impacts of this vulnerability?

Risk Factors

  • Talk about the factors that make this vulnerability likely or unlikely to actually happen
  • Discuss the technical impact of a successful exploit of this vulnerability
  • Consider the likely [business impacts] of a successful attack


Short example name

A short example description, small picture, or sample code with links

Short example name

A short example description, small picture, or sample code with links

Related Attacks

Related Vulnerabilities

Related Controls

Related Technical Impacts


Note: A reference to related CWE or CAPEC article should be added when exists. Eg: