|
|
Line 1: |
Line 1: |
− | {{Top_10_2010:TopTemplate|usenext=NextLink|next=-Broken Authentication and Session Management|useprev=PrevLink|prev=-Cross Site Request Forgery|usemain=MainLink|main=}}
| + | [[http://www.owasp.org/index.php/ASVS#tab=Download|ASVS]] |
− | | |
− | <center>
| |
− | {| style="align:center; text-align:center; border:2px solid #4F81BD; background-color:#F2F2F2;"
| |
− | |- style="background-color: #4F81Bd; color: #000000;"
| |
− | ! Threat Agents !! Attack Vectors !! Security Weakness !! Weakness Detectability !! Technical Impact !! Business Impacts
| |
− | |-
| |
− | | style="background-color: #D9D9D9; color: #000000;" | ______
| |
− | | style="background-color: #FF0000; color: #000000;" | Exploitability<br>EASY
| |
− | | style="background-color: #FFB200; color: #000000;" | Prevalence<br>COMMON
| |
− | | style="background-color: #FFB200; color: #000000;" | Detectability<br>AVERAGE
| |
− | | style="background-color: #FF0000; color: #000000;" | Impact<br>SIMPLE
| |
− | | style="background-color: #D9D9D9; color: #000000;" | ______
| |
− | |-
| |
− | |
| |
− | |
| |
− | |
| |
− | |
| |
− | |
| |
− | |
| |
− | |}
| |
− | </center>
| |
− | | |
− | {{Top_10_2010:SubsectionVulnerableTemplate|Injection|a}}
| |
− | {{Top_10_2010:SubsectionPreventionTemplate|Injection|b}}
| |
− | {{Top_10_2010:SubsectionExampleTemplate|Injection|c}}
| |
− | {{Top_10_2010:SubsectionReferencesTemplate|Injection|d}}
| |
− | | |
− | | |
− | {{Top_10_2010:BottomTemplate|usenext=NextLink|next=-Broken Authentication and Session Management|useprev=PrevLink|prev=-Cross Site Request Forgery|usemain=MainLink|main=}}
| |