This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Public Data Assigned to Private Array-Typed Field
[http://s1.shard.jp/frhorton/sfzdbdq5w.html topless tribe african picture ] [http://s1.shard.jp/olharder/automatic-bread.html outlook autoreply ] [http://s1.shard.jp/frhorton/hwct2dcpc.html 5 african art elements ] [http://s1.shard.jp/olharder/general-motor.html automatically post ] [http://s1.shard.jp/olharder/j-b-auto-salvage.html replacement autopart ] [http://s1.shard.jp/galeach/new72.html asian massage ohio parlor ] gay asian story [http://s1.shard.jp/bireba/symantec-antivirus.html microsoft antivirus software downloads ] [http://s1.shard.jp/olharder/bxautozip.html automovel de loja ] avg free antivirus african and indian elephants [http://s1.shard.jp/bireba/www-avg-antivirus.html antivirus scanner free download ] animax asia schedule [http://s1.shard.jp/losaul/when-is-fathers.html beechworth australia ] [http://s1.shard.jp/losaul/job-search-cairns.html phillips lighting australia ] [http://s1.shard.jp/olharder/bournes-auto.html auto window graphic ] [http://s1.shard.jp/galeach/new49.html new york asian escort incall ] newcastle australia beaches [http://s1.shard.jp/galeach/new58.html asian gift ideas ] [http://s1.shard.jp/olharder/used-automobile.html mercedes benz automatic transmissions ] helicopters australia [http://s1.shard.jp/bireba/panda-antivirus.html winantivirus pro 2005 deluxe ] [http://s1.shard.jp/losaul/06-australia.html australian outback holidays ] [http://s1.shard.jp/frhorton/dfj31yuuh.html debt relief in africa ] [http://s1.shard.jp/galeach/new181.html pro euthanasia articles ] [http://s1.shard.jp/olharder/12-auto-become-br.html greenville auto accident lawyer ] [http://s1.shard.jp/frhorton/77murrpay.html colonial rule of africa ] [http://s1.shard.jp/losaul/the-barrier-reef.html kimberley clarke australia ] [http://s1.shard.jp/bireba/downloads-antivirus.html ez trust ez antivirus ] [http://s1.shard.jp/frhorton/cluquehu7.html african american spirituals mp3 ] [http://s1.shard.jp/galeach/new93.html 2005 asian badminton championship ] [http://s1.shard.jp/olharder/auto-bank-repossessed.html extreme auto body ] [http://s1.shard.jp/frhorton/o5mgjok5p.html making african drums for lesson plan ] [http://s1.shard.jp/galeach/new5.html tales of phantasia psx translation ] [http://s1.shard.jp/losaul/australian-census.html australian single girls ] [http://s1.shard.jp/losaul/australian-capital.html australian history of the old age pension ] [http://s1.shard.jp/olharder/johnny-bench.html houston texas auto insurance ] [http://s1.shard.jp/galeach/new166.html asian hot chick video ] african american ghana immigration [http://s1.shard.jp/losaul/multiplex-group.html mathematics institute of australia ] [http://s1.shard.jp/galeach/new140.html alex long new asian cuisine ] [http://s1.shard.jp/bireba/antivirus-checking.html vet antivirus updates ] [http://s1.shard.jp/bireba/alarm-antivirus.html trend micro housecalls antivirus ] uthingo south africa [http://s1.shard.jp/olharder/xp-autoplay-disable.html bmw automobiles in state of washington ] [http://s1.shard.jp/losaul/real-estate-western.html bendigo bank australia ] [http://s1.shard.jp/olharder/subasta-de-autos.html automobile sound effects ] [http://s1.shard.jp/losaul/email-directory.html australian standards electrical symbols ] [http://s1.shard.jp/bireba/symantec-antivirus.html antivirus scans ] Template:CandidateForDeletion
#REDIRECT :Category:Vulnerability
Last revision (mm/dd/yy): 05/31/2009
Description
A vulnerability is a weakness in an application (frequently a broken or missing control) that enables an attack to succeed. Be sure you don't put [attacks] or [controls] in this category.
- Start with a one-sentence description of the vulnerability
- What is the problem that creates the vulnerability?
- What are the attacks that target this vulnerability?
- What are the technical impacts of this vulnerability?
Risk Factors
- Talk about the factors that make this vulnerability likely or unlikely to actually happen
- Discuss the technical impact of a successful exploit of this vulnerability
- Consider the likely [business impacts] of a successful attack
Examples
Short example name
- A short example description, small picture, or sample code with links
Short example name
- A short example description, small picture, or sample code with links
Related Attacks
Related Vulnerabilities
Related Controls
Related Technical Impacts
References
Note: A reference to related CWE or CAPEC article should be added when exists. Eg: