OWASP Top Ten 2004 Category A10 - Insecure Configuration Management |
Category ID: 731 (Category) | Status: Incomplete |
Description Summary
Weaknesses in this category are related to the A10 category in the OWASP Top Ten 2004.
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ParentOf | ![]() | 4 | J2EE Environment Issues | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 10 | ASP.NET Environment Issues | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 209 | Information Exposure Through an Error Message | Weaknesses in OWASP Top Ten (2004)711 |
ParentOf | ![]() | 215 | Information Leak Through Debug Information | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 219 | Sensitive Data Under Web Root | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 275 | Permission Issues | Weaknesses in OWASP Top Ten (2004)711 |
ParentOf | ![]() | 295 | Certificate Issues | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 459 | Incomplete Cleanup | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 489 | Leftover Debug Code | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 526 | Information Leak Through Environmental Variables | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 527 | Exposure of CVS Repository to an Unauthorized Control Sphere | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 528 | Exposure of Core Dump File to an Unauthorized Control Sphere | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 529 | Exposure of Access Control List Files to an Unauthorized Control Sphere | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 530 | Exposure of Backup File to an Unauthorized Control Sphere | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 531 | Information Leak Through Test Code | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 532 | Information Leak Through Log Files | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 533 | Information Leak Through Server Log Files | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 534 | Information Leak Through Debug Log Files | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 540 | Information Leak Through Source Code | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 541 | Information Leak Through Include Source Code | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 542 | Information Leak Through Cleanup Log Files | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 548 | Information Leak Through Directory Listing | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | ![]() | 552 | Files or Directories Accessible to External Parties | Weaknesses in OWASP Top Ten (2004) (primary)711 |
MemberOf | ![]() | 711 | Weaknesses in OWASP Top Ten (2004) | Weaknesses in OWASP Top Ten (2004) (primary)711 |
OWASP. "A10 Insecure Configuration Management". 2007. <http://sourceforge.net/project/showfiles.php?group_id=64424&package_id=70827>. |