This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP Periodic Table of Vulnerabilities - Abuse of Functionality"
From OWASP
David Fern (talk | contribs) |
David Fern (talk | contribs) |
||
Line 27: | Line 27: | ||
=== References === | === References === | ||
+ | |||
+ | [http://projects.webappsec.org/w/page/13246913/Abuse%20of%20Functionality WASC Abuse of Functionality]<br> | ||
+ | |||
[http://capec.mitre.org/data/definitions/210.html CAPEC – 210: Abuse of Functionality>]<br> | [http://capec.mitre.org/data/definitions/210.html CAPEC – 210: Abuse of Functionality>]<br> | ||
− | |||
− | |||
− | |||
[https://www.owasp.org/index.php/Category:Abuse_of_Functionality OWASP Category: Abuse of Functionality]<br> | [https://www.owasp.org/index.php/Category:Abuse_of_Functionality OWASP Category: Abuse of Functionality]<br> |
Revision as of 02:20, 6 June 2013
Return to Periodic Table Working View
Abuse of Functionality
Root Cause Summary
Browser / Standards Solution
None
Perimeter Solution
None
Generic Framework Solution
None
Custom Framework Solution
None
Custom Code Solution
All features should have defined abuse cases and implemented protections against these abuses.