This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Error Conditions, Return Values, Status Codes"

From OWASP
Jump to: navigation, search
 
 
(8 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{Template:Vulnerability}}
+
{{template:CandidateForDeletion}}
 +
 
 +
#REDIRECT [[::Category:Attack]]
 +
 
 +
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}'''
 +
 
  
 
==Description==
 
==Description==
 +
 
Invalid or unhandled error conditions, return values and status codes result in unexpected application behaviors.  
 
Invalid or unhandled error conditions, return values and status codes result in unexpected application behaviors.  
  
==Examples ==
+
Attackers try to crash the application or launch a denail of service attack by triggering the unhandled conditions.
 +
 
 +
 
 +
==Risk Factors==
 +
 
 +
TBD
 +
 
 +
==Examples==
 +
 
 +
TBD
  
==Related Threats==
+
==Related [[Attacks]]==
Attackers try to crash the application or launch a denail of service attack by triggering the unhandled conditions.
+
* [[Denial of Service]]
 +
 
 +
==Related [[Vulnerabilities]]==
 +
* [[Vulnerability 1]]
 +
* [[Vulnerabiltiy 2]]
  
==Related Attacks==
+
==Related [[Controls]]==
[[:Category:Denail of Service]]
+
* [[:Category:Error Handling]]
  
==Related Countermeasures==
+
==Related [[Technical Impacts]]==
[[:Category:Error Handling]]
+
* [[Technical Impact 1]]
 +
* [[Technical Impact 2]]
  
==Categories==
+
==References==
 +
TBD
  
[[Category:Error Handling Problem]]
 
  
{{Template:Stub}}
+
__NOTOC__

Latest revision as of 16:52, 11 April 2009

Template:CandidateForDeletion

#REDIRECT :Category:Attack

Last revision (mm/dd/yy): 04/11/2009


Description

Invalid or unhandled error conditions, return values and status codes result in unexpected application behaviors.

Attackers try to crash the application or launch a denail of service attack by triggering the unhandled conditions.


Risk Factors

TBD

Examples

TBD

Related Attacks

Related Vulnerabilities

Related Controls

Related Technical Impacts

References

TBD