This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "Top 10 2010-A6-Security Misconfiguration"

From OWASP
Jump to: navigation, search
(Created page with '{{Top_10_2010:TopTemplate|usenext=NextLink|next=-Broken Authentication and Session Management|useprev=PrevLink|prev=-Cross Site Request Forgery|usemain=MainLink|main=}} <center…')
 
Line 22: Line 22:
 
</center>
 
</center>
  
{{Top_10_2010:SubsectionVulnerableTemplate|Injection|
+
{{Top_10_2010:SubsectionVulnerableTemplate|Injection|a}}
{{Top_10_2010:SubsectionPreventionTemplate|Injection|
+
{{Top_10_2010:SubsectionPreventionTemplate|Injection|b}}
{{Top_10_2010:SubsectionExampleTemplate|Injection|
+
{{Top_10_2010:SubsectionExampleTemplate|Injection|c}}
{{Top_10_2010:SubsectionReferencesTemplate|Injection|
+
{{Top_10_2010:SubsectionReferencesTemplate|Injection|d}}
  
  
 
{{Top_10_2010:BottomTemplate|usenext=NextLink|next=-Broken Authentication and Session Management|useprev=PrevLink|prev=-Cross Site Request Forgery|usemain=MainLink|main=}}
 
{{Top_10_2010:BottomTemplate|usenext=NextLink|next=-Broken Authentication and Session Management|useprev=PrevLink|prev=-Cross Site Request Forgery|usemain=MainLink|main=}}

Revision as of 21:42, 17 April 2010

NOTE: THIS IS NOT THE LATEST VERSION. Please visit the OWASP Top 10 project page to find the latest edition.

««««
Top 10 Introduction
Top 10 Risks
»»»»
Threat Agents Attack Vectors Security Weakness Weakness Detectability Technical Impact Business Impacts
______ Exploitability
EASY
Prevalence
COMMON
Detectability
AVERAGE
Impact
SIMPLE
______

Am I Vulnerable to Injection?

a

How Do I Prevent Injection?

b

Example Attack Scenarios

c

References

««««
Top 10 Introduction
Top 10 Risks
»»»»

© 2002-2010 OWASP Foundation This document is licensed under the Creative Commons Attribution-ShareAlike 3.0 license. Some rights reserved. CC-by-sa-3 0-88x31.png