OWASP Top Ten 2004 Category A10 - Insecure Configuration Management |
Category ID: 731 (Category) | Status: Incomplete |
Description Summary
Weaknesses in this category are related to the A10 category in the OWASP Top Ten 2004.
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ParentOf | Category | 4 | J2EE Environment Issues | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Category | 10 | ASP.NET Environment Issues | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Base | 209 | Information Exposure Through an Error Message | Weaknesses in OWASP Top Ten (2004)711 |
ParentOf | Weakness Variant | 215 | Information Leak Through Debug Information | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 219 | Sensitive Data Under Web Root | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Category | 275 | Permission Issues | Weaknesses in OWASP Top Ten (2004)711 |
ParentOf | Category | 295 | Certificate Issues | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Base | 459 | Incomplete Cleanup | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Base | 489 | Leftover Debug Code | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 526 | Information Leak Through Environmental Variables | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 527 | Exposure of CVS Repository to an Unauthorized Control Sphere | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 528 | Exposure of Core Dump File to an Unauthorized Control Sphere | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 529 | Exposure of Access Control List Files to an Unauthorized Control Sphere | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 530 | Exposure of Backup File to an Unauthorized Control Sphere | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 531 | Information Leak Through Test Code | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 532 | Information Leak Through Log Files | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 533 | Information Leak Through Server Log Files | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 534 | Information Leak Through Debug Log Files | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 540 | Information Leak Through Source Code | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 541 | Information Leak Through Include Source Code | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 542 | Information Leak Through Cleanup Log Files | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Variant | 548 | Information Leak Through Directory Listing | Weaknesses in OWASP Top Ten (2004) (primary)711 |
ParentOf | Weakness Base | 552 | Files or Directories Accessible to External Parties | Weaknesses in OWASP Top Ten (2004) (primary)711 |
MemberOf | View | 711 | Weaknesses in OWASP Top Ten (2004) | Weaknesses in OWASP Top Ten (2004) (primary)711 |
OWASP. "A10 Insecure Configuration Management". 2007. <http://sourceforge.net/project/showfiles.php?group_id=64424&package_id=70827>. |