This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Periodic Table of Vulnerabilities - Abuse of Functionality"
From OWASP
David Fern (talk | contribs) |
David Fern (talk | contribs) |
||
Line 27: | Line 27: | ||
=== References === | === References === | ||
+ | [http://capec.mitre.org/data/definitions/210.html CAPEC – 210: Abuse of Functionality>]<br> | ||
+ | |||
+ | [http://projects.webappsec.org/w/page/13246913/Abuse%20of%20Functionality | ||
+ | WASC Abuse of Functionality]<br> | ||
+ | |||
+ | [https://www.owasp.org/index.php/Category:Abuse_of_Functionality OWASP Category: Abuse of Functionality]<br> |
Revision as of 02:19, 6 June 2013
Return to Periodic Table Working View
Abuse of Functionality
Root Cause Summary
Browser / Standards Solution
None
Perimeter Solution
None
Generic Framework Solution
None
Custom Framework Solution
None
Custom Code Solution
All features should have defined abuse cases and implemented protections against these abuses.
Discussion / Controversy
References
CAPEC – 210: Abuse of Functionality>
[http://projects.webappsec.org/w/page/13246913/Abuse%20of%20Functionality
WASC Abuse of Functionality]