Use the revised OWASP Top Ten to secure your Web applications -- Part 6
Source: Tom Olzak
Vulnerability six in the 2007 OWASP Top Ten is Information Leaking and Improper Error Handling. Typically caused by verbose errors, attackers exploit this weakness to obtain information about the target system's software and hardware architecture. In this, the sixth in a series on the revised OWASP Top Ten Web Application Vulnerabilities, Tom Olzak explains the nature of this Web application weakness followed by recommendations for protecting Web applications from related attacks.
This download is also available as a TechRepublic article.