5 |
J2EE Misconfiguration: Data Transmission Without Encryption |
|
Major |
Other_Notes |
|
Minor |
None |
20 |
Improper Input Validation |
|
Major |
Observed_Examples |
|
Minor |
None |
22 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
Major |
Potential_Mitigations |
|
Minor |
None |
23 |
Relative Path Traversal |
|
Major |
Potential_Mitigations |
|
Minor |
None |
24 |
Path Traversal: '../filedir' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
25 |
Path Traversal: '/../filedir' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
26 |
Path Traversal: '/dir/../filename' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
27 |
Path Traversal: 'dir/../../filename' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
28 |
Path Traversal: '..\filedir' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
29 |
Path Traversal: '\..\filename' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
30 |
Path Traversal: '\dir\..\filename' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
31 |
Path Traversal: 'dir\..\..\filename' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
32 |
Path Traversal: '...' (Triple Dot) |
|
Major |
Maintenance_Notes, Potential_Mitigations |
|
Minor |
None |
33 |
Path Traversal: '....' (Multiple Dot) |
|
Major |
Potential_Mitigations |
|
Minor |
None |
34 |
Path Traversal: '....//' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
35 |
Path Traversal: '.../...//' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
37 |
Path Traversal: '/absolute/pathname/here' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
38 |
Path Traversal: '\absolute\pathname\here' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
39 |
Path Traversal: 'C:dirname' |
|
Major |
Potential_Mitigations |
|
Minor |
None |
40 |
Path Traversal: '\\UNC\share\name\' (Windows UNC Share) |
|
Major |
Potential_Mitigations |
|
Minor |
None |
41 |
Improper Resolution of Path Equivalence |
|
Major |
Other_Notes, Potential_Mitigations, Relationship_Notes |
|
Minor |
None |
67 |
Improper Handling of Windows Device Names |
|
Major |
Description |
|
Minor |
None |
77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
78 |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
|
Major |
Demonstrative_Examples, Description |
|
Minor |
None |
79 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
|
Major |
Demonstrative_Examples, References |
|
Minor |
None |
80 |
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
81 |
Improper Neutralization of Script in an Error Message Web Page |
|
Major |
Potential_Mitigations |
|
Minor |
None |
83 |
Improper Neutralization of Script in Attributes in a Web Page |
|
Major |
Potential_Mitigations |
|
Minor |
None |
84 |
Improper Neutralization of Encoded URI Schemes in a Web Page |
|
Major |
Potential_Mitigations |
|
Minor |
None |
85 |
Doubled Character XSS Manipulations |
|
Major |
Potential_Mitigations |
|
Minor |
None |
87 |
Improper Neutralization of Alternate XSS Syntax |
|
Major |
Potential_Mitigations |
|
Minor |
None |
89 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
93 |
Improper Neutralization of CRLF Sequences ('CRLF Injection') |
|
Major |
Description |
|
Minor |
None |
94 |
Improper Control of Generation of Code ('Code Injection') |
|
Major |
Name |
|
Minor |
None |
102 |
Struts: Duplicate Validation Forms |
|
Major |
Background_Details, Common_Consequences |
|
Minor |
None |
106 |
Struts: Plug-in Framework not in Use |
|
Major |
Other_Notes |
|
Minor |
None |
108 |
Struts: Unvalidated Action Form |
|
Major |
Other_Notes |
|
Minor |
None |
109 |
Struts: Validator Turned Off |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
111 |
Direct Use of Unsafe JNI |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
113 |
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') |
|
Major |
Potential_Mitigations |
|
Minor |
None |
116 |
Improper Encoding or Escaping of Output |
|
Major |
Relationship_Notes, Relationships |
|
Minor |
None |
117 |
Improper Output Neutralization for Logs |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
119 |
Improper Restriction of Operations within the Bounds of a Memory Buffer |
|
Major |
Relationships |
|
Minor |
None |
120 |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
|
Major |
Demonstrative_Examples, Description |
|
Minor |
None |
124 |
Buffer Underwrite ('Buffer Underflow') |
|
Major |
Demonstrative_Examples, Relationships |
|
Minor |
None |
126 |
Buffer Over-read |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
129 |
Improper Validation of Array Index |
|
Major |
Common_Consequences, Demonstrative_Examples, Weakness_Ordinalities |
|
Minor |
None |
130 |
Improper Handling of Length Parameter Inconsistency |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
131 |
Incorrect Calculation of Buffer Size |
|
Major |
Maintenance_Notes |
|
Minor |
None |
138 |
Improper Neutralization of Special Elements |
|
Major |
Potential_Mitigations |
|
Minor |
None |
140 |
Improper Neutralization of Delimiters |
|
Major |
Potential_Mitigations |
|
Minor |
None |
141 |
Improper Neutralization of Parameter/Argument Delimiters |
|
Major |
Potential_Mitigations |
|
Minor |
None |
142 |
Improper Neutralization of Value Delimiters |
|
Major |
Potential_Mitigations |
|
Minor |
None |
143 |
Improper Neutralization of Record Delimiters |
|
Major |
Potential_Mitigations |
|
Minor |
None |
144 |
Improper Neutralization of Line Delimiters |
|
Major |
Potential_Mitigations |
|
Minor |
None |
145 |
Improper Neutralization of Section Delimiters |
|
Major |
Potential_Mitigations |
|
Minor |
None |
146 |
Improper Neutralization of Expression/Command Delimiters |
|
Major |
Potential_Mitigations |
|
Minor |
None |
147 |
Improper Neutralization of Input Terminators |
|
Major |
Potential_Mitigations |
|
Minor |
None |
148 |
Improper Neutralization of Input Leaders |
|
Major |
Potential_Mitigations |
|
Minor |
None |
149 |
Improper Neutralization of Quoting Syntax |
|
Major |
Potential_Mitigations |
|
Minor |
None |
150 |
Improper Neutralization of Escape, Meta, or Control Sequences |
|
Major |
Potential_Mitigations |
|
Minor |
None |
151 |
Improper Neutralization of Comment Delimiters |
|
Major |
Potential_Mitigations |
|
Minor |
None |
152 |
Improper Neutralization of Macro Symbols |
|
Major |
Observed_Examples, Potential_Mitigations |
|
Minor |
None |
153 |
Improper Neutralization of Substitution Characters |
|
Major |
Observed_Examples, Potential_Mitigations |
|
Minor |
None |
154 |
Improper Neutralization of Variable Name Delimiters |
|
Major |
Observed_Examples, Potential_Mitigations |
|
Minor |
None |
155 |
Improper Neutralization of Wildcards or Matching Symbols |
|
Major |
Potential_Mitigations |
|
Minor |
None |
156 |
Improper Neutralization of Whitespace |
|
Major |
Potential_Mitigations |
|
Minor |
None |
157 |
Failure to Sanitize Paired Delimiters |
|
Major |
Potential_Mitigations |
|
Minor |
None |
158 |
Improper Neutralization of Null Byte or NUL Character |
|
Major |
Potential_Mitigations |
|
Minor |
None |
159 |
Failure to Sanitize Special Element |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
160 |
Improper Neutralization of Leading Special Elements |
|
Major |
Potential_Mitigations |
|
Minor |
None |
161 |
Improper Neutralization of Multiple Leading Special Elements |
|
Major |
Potential_Mitigations |
|
Minor |
None |
162 |
Improper Neutralization of Trailing Special Elements |
|
Major |
Potential_Mitigations |
|
Minor |
None |
163 |
Improper Neutralization of Multiple Trailing Special Elements |
|
Major |
Potential_Mitigations |
|
Minor |
None |
164 |
Improper Neutralization of Internal Special Elements |
|
Major |
Potential_Mitigations |
|
Minor |
None |
165 |
Improper Neutralization of Multiple Internal Special Elements |
|
Major |
Potential_Mitigations |
|
Minor |
None |
166 |
Improper Handling of Missing Special Element |
|
Major |
Potential_Mitigations |
|
Minor |
None |
167 |
Improper Handling of Additional Special Element |
|
Major |
Potential_Mitigations |
|
Minor |
None |
168 |
Improper Handling of Inconsistent Special Elements |
|
Major |
Potential_Mitigations |
|
Minor |
None |
169 |
Technology-Specific Special Elements |
|
Major |
Other_Notes |
|
Minor |
None |
170 |
Improper Null Termination |
|
Major |
Common_Consequences |
|
Minor |
None |
172 |
Encoding Error |
|
Major |
Potential_Mitigations |
|
Minor |
None |
173 |
Improper Handling of Alternate Encoding |
|
Major |
Potential_Mitigations |
|
Minor |
None |
174 |
Double Decoding of the Same Data |
|
Major |
Potential_Mitigations |
|
Minor |
None |
175 |
Improper Handling of Mixed Encoding |
|
Major |
Potential_Mitigations |
|
Minor |
None |
176 |
Improper Handling of Unicode Encoding |
|
Major |
Potential_Mitigations |
|
Minor |
None |
177 |
Improper Handling of URL Encoding (Hex Encoding) |
|
Major |
Potential_Mitigations |
|
Minor |
None |
178 |
Improper Handling of Case Sensitivity |
|
Major |
Potential_Mitigations |
|
Minor |
None |
179 |
Incorrect Behavior Order: Early Validation |
|
Major |
Potential_Mitigations |
|
Minor |
None |
180 |
Incorrect Behavior Order: Validate Before Canonicalize |
|
Major |
Potential_Mitigations |
|
Minor |
None |
181 |
Incorrect Behavior Order: Validate Before Filter |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
182 |
Collapse of Data into Unsafe Value |
|
Major |
Potential_Mitigations |
|
Minor |
None |
183 |
Permissive Whitelist |
|
Major |
Potential_Mitigations |
|
Minor |
None |
185 |
Incorrect Regular Expression |
|
Major |
Observed_Examples |
|
Minor |
None |
187 |
Partial Comparison |
|
Major |
Relationships |
|
Minor |
None |
188 |
Reliance on Data/Memory Layout |
|
Major |
Common_Consequences |
|
Minor |
None |
189 |
Numeric Errors |
|
Major |
Relationships |
|
Minor |
None |
195 |
Signed to Unsigned Conversion Error |
|
Major |
Relationships |
|
Minor |
None |
200 |
Information Exposure |
|
Major |
Description, Relationships |
|
Minor |
None |
202 |
Exposure of Sensitive Data Through Data Queries |
|
Major |
Name |
|
Minor |
None |
206 |
Information Exposure of Internal State Through Behavioral Inconsistency |
|
Major |
Name |
|
Minor |
None |
208 |
Information Exposure Through Timing Discrepancy |
|
Major |
Name |
|
Minor |
None |
209 |
Information Exposure Through an Error Message |
|
Major |
Demonstrative_Examples, Observed_Examples, Relationships |
|
Minor |
None |
210 |
Information Exposure Through Generated Error Message |
|
Major |
Name, Relationships |
|
Minor |
None |
211 |
Information Exposure Through External Error Message |
|
Major |
Name |
|
Minor |
None |
213 |
Intentional Information Exposure |
|
Major |
Name |
|
Minor |
None |
214 |
Information Exposure Through Process Environment |
|
Major |
Name |
|
Minor |
None |
223 |
Omission of Security-relevant Information |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
224 |
Obscured Security-relevant Information by Alternate Name |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
227 |
Improper Fulfillment of API Contract ('API Abuse') |
|
Major |
Description, Name |
|
Minor |
None |
241 |
Improper Handling of Unexpected Data Type |
|
Major |
Potential_Mitigations |
|
Minor |
None |
248 |
Uncaught Exception |
|
Major |
Description, Relationships |
|
Minor |
None |
250 |
Execution with Unnecessary Privileges |
|
Major |
Relationships |
|
Minor |
None |
261 |
Weak Cryptography for Passwords |
|
Major |
Relationships |
|
Minor |
None |
262 |
Not Using Password Aging |
|
Major |
Relationships |
|
Minor |
None |
263 |
Password Aging with Long Expiration |
|
Major |
Description, Other_Notes, Relationships |
|
Minor |
None |
264 |
Permissions, Privileges, and Access Controls |
|
Major |
Relationships |
|
Minor |
None |
265 |
Privilege / Sandbox Issues |
|
Major |
Relationships |
|
Minor |
None |
269 |
Improper Privilege Management |
|
Major |
Description, Relationships |
|
Minor |
None |
271 |
Privilege Dropping / Lowering Errors |
|
Major |
Relationships |
|
Minor |
None |
282 |
Improper Ownership Management |
|
Major |
Relationships |
|
Minor |
None |
283 |
Unverified Ownership |
|
Major |
Relationships |
|
Minor |
None |
284 |
Improper Access Control |
|
Major |
Alternate_Terms, Background_Details, Description, Maintenance_Notes, Name, Relationships |
|
Minor |
None |
285 |
Improper Authorization |
|
Major |
Background_Details, Demonstrative_Examples, Description, Name, Relationships |
|
Minor |
None |
286 |
Incorrect User Management |
|
Major |
Applicable_Platforms, Maintenance_Notes, Relationships |
|
Minor |
None |
287 |
Improper Authentication |
|
Major |
Relationships |
|
Minor |
None |
288 |
Authentication Bypass Using an Alternate Path or Channel |
|
Major |
Relationships |
|
Minor |
None |
289 |
Authentication Bypass by Alternate Name |
|
Major |
Potential_Mitigations |
|
Minor |
None |
307 |
Improper Restriction of Excessive Authentication Attempts |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
311 |
Missing Encryption of Sensitive Data |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
319 |
Cleartext Transmission of Sensitive Information |
|
Major |
Potential_Mitigations |
|
Minor |
None |
320 |
Key Management Errors |
|
Major |
Observed_Examples |
|
Minor |
None |
327 |
Use of a Broken or Risky Cryptographic Algorithm |
|
Major |
Demonstrative_Examples, Description |
|
Minor |
None |
330 |
Use of Insufficiently Random Values |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
352 |
Cross-Site Request Forgery (CSRF) |
|
Major |
Description |
|
Minor |
None |
359 |
Privacy Violation |
|
Major |
Other_Notes |
|
Minor |
None |
361 |
Time and State |
|
Major |
Relationships |
|
Minor |
None |
363 |
Race Condition Enabling Link Following |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
385 |
Covert Timing Channel |
|
Major |
Description |
|
Minor |
None |
395 |
Use of NullPointerException Catch to Detect NULL Pointer Dereference |
|
Major |
Other_Notes, Relationships |
|
Minor |
None |
401 |
Improper Release of Memory Before Removing Last Reference ('Memory Leak') |
|
Major |
Alternate_Terms |
|
Minor |
None |
402 |
Transmission of Private Resources into a New Sphere ('Resource Leak') |
|
Major |
Alternate_Terms |
|
Minor |
None |
403 |
Exposure of File Descriptor to Unintended Control Sphere |
|
Major |
Name |
|
Minor |
None |
404 |
Improper Resource Shutdown or Release |
|
Major |
Weakness_Ordinalities |
|
Minor |
None |
406 |
Insufficient Control of Network Message Volume (Network Amplification) |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
408 |
Incorrect Behavior Order: Early Amplification |
|
Major |
Demonstrative_Examples, Observed_Examples, Relationships |
|
Minor |
None |
412 |
Unrestricted Externally Accessible Lock |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
416 |
Use After Free |
|
Major |
Description |
|
Minor |
None |
425 |
Direct Request ('Forced Browsing') |
|
Major |
Applicable_Platforms, Description, Relationships |
|
Minor |
None |
426 |
Untrusted Search Path |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
427 |
Uncontrolled Search Path Element |
|
Major |
Potential_Mitigations |
|
Minor |
None |
428 |
Unquoted Search Path or Element |
|
Major |
Potential_Mitigations |
|
Minor |
None |
431 |
Missing Handler |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
438 |
Behavioral Problems |
|
Major |
Relationships |
|
Minor |
None |
442 |
Web Problems |
|
Major |
Relationships |
|
Minor |
None |
446 |
UI Discrepancy for Security Feature |
|
Major |
Other_Notes, Relationship_Notes |
|
Minor |
None |
450 |
Multiple Interpretations of UI Input |
|
Major |
Potential_Mitigations |
|
Minor |
None |
454 |
External Initialization of Trusted Variables or Data Stores |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
456 |
Missing Initialization |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
470 |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
472 |
External Control of Assumed-Immutable Web Parameter |
|
Major |
Potential_Mitigations |
|
Minor |
None |
477 |
Use of Obsolete Functions |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
478 |
Missing Default Case in Switch Statement |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
488 |
Exposure of Data Element to Wrong Session |
|
Major |
Name |
|
Minor |
None |
494 |
Download of Code Without Integrity Check |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
498 |
Cloneable Class Containing Sensitive Information |
|
Major |
Name |
|
Minor |
None |
521 |
Weak Password Requirements |
|
Major |
Potential_Mitigations, Relationships |
|
Minor |
None |
522 |
Insufficiently Protected Credentials |
|
Major |
Relationships |
|
Minor |
None |
524 |
Information Exposure Through Caching |
|
Major |
Name |
|
Minor |
None |
525 |
Information Exposure Through Browser Caching |
|
Major |
Name |
|
Minor |
None |
526 |
Information Exposure Through Environmental Variables |
|
Major |
Name |
|
Minor |
None |
531 |
Information Exposure Through Test Code |
|
Major |
Name |
|
Minor |
None |
532 |
Information Exposure Through Log Files |
|
Major |
Name |
|
Minor |
None |
533 |
Information Exposure Through Server Log Files |
|
Major |
Name |
|
Minor |
None |
534 |
Information Exposure Through Debug Log Files |
|
Major |
Name |
|
Minor |
None |
535 |
Information Exposure Through Shell Error Message |
|
Major |
Name |
|
Minor |
None |
536 |
Information Exposure Through Servlet Runtime Error Message |
|
Major |
Name |
|
Minor |
None |
537 |
Information Exposure Through Java Runtime Error Message |
|
Major |
Demonstrative_Examples, Name |
|
Minor |
None |
539 |
Information Exposure Through Persistent Cookies |
|
Major |
Name |
|
Minor |
None |
540 |
Information Exposure Through Source Code |
|
Major |
Description, Name |
|
Minor |
None |
541 |
Information Exposure Through Include Source Code |
|
Major |
Name |
|
Minor |
None |
542 |
Information Exposure Through Cleanup Log Files |
|
Major |
Description, Name |
|
Minor |
None |
543 |
Use of Singleton Pattern Without Synchronization in a Multithreaded Context |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
548 |
Information Exposure Through Directory Listing |
|
Major |
Name |
|
Minor |
None |
549 |
Missing Password Field Masking |
|
Major |
Description |
|
Minor |
None |
550 |
Information Exposure Through Server Error Message |
|
Major |
Name, Relationships |
|
Minor |
None |
554 |
ASP.NET Misconfiguration: Not Using Input Validation Framework |
|
Major |
Common_Consequences, Description, Potential_Mitigations |
|
Minor |
None |
555 |
J2EE Misconfiguration: Plaintext Password in Configuration File |
|
Major |
Description |
|
Minor |
None |
566 |
Authorization Bypass Through User-Controlled SQL Primary Key |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Name |
|
Minor |
None |
568 |
finalize() Method Without super.finalize() |
|
Major |
None |
|
Minor |
Description |
573 |
Improper Following of Specification by Caller |
|
Major |
Description, Name |
|
Minor |
None |
580 |
clone() Method Without super.clone() |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
581 |
Object Model Violation: Just One of Equals and Hashcode Defined |
|
Major |
Description |
|
Minor |
None |
596 |
Incorrect Semantic Object Comparison |
|
Major |
Relationships |
|
Minor |
None |
597 |
Use of Wrong Operator in String Comparison |
|
Major |
Demonstrative_Examples, Description, Potential_Mitigations |
|
Minor |
None |
598 |
Information Exposure Through Query Strings in GET Request |
|
Major |
Name |
|
Minor |
None |
600 |
Uncaught Exception in Servlet |
|
Major |
Relationships |
|
Minor |
None |
602 |
Client-Side Enforcement of Server-Side Security |
|
Major |
Relationships |
|
Minor |
None |
606 |
Unchecked Input for Loop Condition |
|
Major |
Demonstrative_Examples, Relationships |
|
Minor |
None |
607 |
Public Static Final Field References Mutable Object |
|
Major |
None |
|
Minor |
Description |
611 |
Information Exposure Through XML External Entity Reference |
|
Major |
Name |
|
Minor |
None |
612 |
Information Exposure Through Indexing of Private Data |
|
Major |
Name |
|
Minor |
None |
615 |
Information Exposure Through Comments |
|
Major |
Name |
|
Minor |
None |
616 |
Incomplete Identification of Uploaded File Variables (PHP) |
|
Major |
Other_Notes |
|
Minor |
None |
626 |
Null Byte Interaction Error (Poison Null Byte) |
|
Major |
Other_Notes |
|
Minor |
None |
627 |
Dynamic Variable Evaluation |
|
Major |
Description |
|
Minor |
None |
639 |
Authorization Bypass Through User-Controlled Key |
|
Major |
Alternate_Terms, Applicable_Platforms, Description, Name, Potential_Mitigations, Relationships |
|
Minor |
None |
640 |
Weak Password Recovery Mechanism for Forgotten Password |
|
Major |
Relationships |
|
Minor |
None |
644 |
Improper Neutralization of HTTP Headers for Scripting Syntax |
|
Major |
Description |
|
Minor |
None |
646 |
Reliance on File Name or Extension of Externally-Supplied File |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
647 |
Use of Non-Canonical URL Paths for Authorization Decisions |
|
Major |
Relationships |
|
Minor |
None |
648 |
Incorrect Use of Privileged APIs |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
650 |
Trusting HTTP Permission Methods on the Server Side |
|
Major |
Common_Consequences |
|
Minor |
None |
651 |
Information Exposure Through WSDL File |
|
Major |
None |
|
Minor |
Name |
656 |
Reliance on Security Through Obscurity |
|
Major |
None |
|
Minor |
Name |
664 |
Improper Control of a Resource Through its Lifetime |
|
Major |
Relationships |
|
Minor |
None |
666 |
Operation on Resource in Wrong Phase of Lifetime |
|
Major |
Relationships |
|
Minor |
None |
668 |
Exposure of Resource to Wrong Sphere |
|
Major |
Relationships |
|
Minor |
None |
674 |
Uncontrolled Recursion |
|
Major |
Relationships |
|
Minor |
None |
681 |
Incorrect Conversion between Numeric Types |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
682 |
Incorrect Calculation |
|
Major |
Relationships |
|
Minor |
None |
684 |
Incorrect Provision of Specified Functionality |
|
Major |
Description, Name |
|
Minor |
None |
691 |
Insufficient Control Flow Management |
|
Major |
Maintenance_Notes, Other_Notes, Relationships |
|
Minor |
None |
693 |
Protection Mechanism Failure |
|
Major |
Maintenance_Notes, Other_Notes, Relationships |
|
Minor |
None |
696 |
Incorrect Behavior Order |
|
Major |
Relationships |
|
Minor |
None |
697 |
Insufficient Comparison |
|
Major |
Description |
|
Minor |
None |
703 |
Improper Check or Handling of Exceptional Conditions |
|
Major |
Relationships |
|
Minor |
None |
705 |
Incorrect Control Flow Scoping |
|
Major |
Relationships |
|
Minor |
None |
706 |
Use of Incorrectly-Resolved Name or Reference |
|
Major |
Relationships |
|
Minor |
None |
732 |
Incorrect Permission Assignment for Critical Resource |
|
Major |
Demonstrative_Examples, Description, Relationships |
|
Minor |
None |
754 |
Improper Check for Unusual or Exceptional Conditions |
|
Major |
Description, Relationships |
|
Minor |
None |
755 |
Improper Handling of Exceptional Conditions |
|
Major |
Relationships |
|
Minor |
None |
759 |
Use of a One-Way Hash without a Salt |
|
Major |
Observed_Examples |
|
Minor |
None |
760 |
Use of a One-Way Hash with a Predictable Salt |
|
Major |
Observed_Examples |
|
Minor |
None |
770 |
Allocation of Resources Without Limits or Throttling |
|
Major |
Demonstrative_Examples, Detection_Factors, Relationships |
|
Minor |
None |
789 |
Uncontrolled Memory Allocation |
|
Major |
Common_Consequences, Observed_Examples |
|
Minor |
None |
795 |
Only Filtering Special Elements at a Specified Location |
|
Major |
None |
|
Minor |
Description |
799 |
Improper Control of Interaction Frequency |
|
Major |
Observed_Examples, Relationships |
|
Minor |
None |
806 |
Buffer Access Using Size of Source Buffer |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
822 |
Untrusted Pointer Dereference |
|
Major |
Description |
|
Minor |
Common_Consequences |
823 |
Use of Out-of-range Pointer Offset |
|
Major |
None |
|
Minor |
Common_Consequences |
827 |
Improper Control of Document Type Definition |
|
Major |
Relationships |
|
Minor |
None |