6 |
J2EE Misconfiguration: Insufficient Session-ID Length |
|
Major |
None |
|
Minor |
Common_Consequences |
11 |
ASP.NET Misconfiguration: Creating Debug Binary |
|
Major |
None |
|
Minor |
Common_Consequences |
12 |
ASP.NET Misconfiguration: Missing Custom Error Page |
|
Major |
None |
|
Minor |
Common_Consequences |
20 |
Improper Input Validation |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Detection_Factors |
|
Minor |
Common_Consequences |
26 |
Path Traversal: '/dir/../filename' |
|
Major |
None |
|
Minor |
Applicable_Platforms |
59 |
Improper Link Resolution Before File Access ('Link Following') |
|
Major |
None |
|
Minor |
Applicable_Platforms |
73 |
External Control of File Name or Path |
|
Major |
Detection_Factors |
|
Minor |
Applicable_Platforms, Common_Consequences |
74 |
Failure to Sanitize Data into a Different Plane ('Injection') |
|
Major |
None |
|
Minor |
Common_Consequences |
77 |
Improper Sanitization of Special Elements used in a Command ('Command Injection') |
|
Major |
None |
|
Minor |
Common_Consequences |
78 |
Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') |
|
Major |
Detection_Factors |
|
Minor |
Common_Consequences |
79 |
Failure to Preserve Web Page Structure ('Cross-site Scripting') |
|
Major |
Demonstrative_Examples, Description, Detection_Factors, Enabling_Factors_for_Exploitation, Observed_Examples |
|
Minor |
Applicable_Platforms, Common_Consequences |
82 |
Improper Sanitization of Script in Attributes of IMG Tags in a Web Page |
|
Major |
Observed_Examples |
|
Minor |
None |
89 |
Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') |
|
Major |
Potential_Mitigations |
|
Minor |
Common_Consequences |
92 |
DEPRECATED: Improper Sanitization of Custom Special Characters |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
93 |
Failure to Sanitize CRLF Sequences ('CRLF Injection') |
|
Major |
Likelihood_of_Exploit |
|
Minor |
None |
94 |
Failure to Control Generation of Code ('Code Injection') |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
98 |
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP File Inclusion') |
|
Major |
Alternate_Terms, Applicable_Platforms, Demonstrative_Examples, Likelihood_of_Exploit, Potential_Mitigations, Time_of_Introduction |
|
Minor |
None |
102 |
Struts: Duplicate Validation Forms |
|
Major |
Background_Details, Common_Consequences, Other_Notes |
|
Minor |
None |
103 |
Struts: Incomplete validate() Method Definition |
|
Major |
Common_Consequences, Other_Notes |
|
Minor |
None |
104 |
Struts: Form Bean Does Not Extend Validation Class |
|
Major |
Common_Consequences, Other_Notes |
|
Minor |
None |
108 |
Struts: Unvalidated Action Form |
|
Major |
Common_Consequences, Other_Notes |
|
Minor |
None |
110 |
Struts: Validator Without Form Field |
|
Major |
None |
|
Minor |
Common_Consequences |
113 |
Failure to Sanitize CRLF Sequences in HTTP Headers ('HTTP Response Splitting') |
|
Major |
None |
|
Minor |
Common_Consequences |
116 |
Improper Encoding or Escaping of Output |
|
Major |
Demonstrative_Examples, Potential_Mitigations |
|
Minor |
Applicable_Platforms, Common_Consequences |
117 |
Improper Output Sanitization for Logs |
|
Major |
None |
|
Minor |
Common_Consequences |
119 |
Failure to Constrain Operations within the Bounds of a Memory Buffer |
|
Major |
Common_Consequences, Demonstrative_Examples, Detection_Factors, Observed_Examples |
|
Minor |
Applicable_Platforms |
120 |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
|
Major |
None |
|
Minor |
Common_Consequences |
121 |
Stack-based Buffer Overflow |
|
Major |
None |
|
Minor |
Common_Consequences |
122 |
Heap-based Buffer Overflow |
|
Major |
None |
|
Minor |
Common_Consequences |
123 |
Write-what-where Condition |
|
Major |
None |
|
Minor |
Common_Consequences |
124 |
Buffer Underwrite ('Buffer Underflow') |
|
Major |
None |
|
Minor |
Common_Consequences |
128 |
Wrap-around Error |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
129 |
Improper Validation of Array Index |
|
Major |
Applicable_Platforms, Common_Consequences, Observed_Examples, Other_Notes, Potential_Mitigations, Theoretical_Notes, Weakness_Ordinalities |
|
Minor |
None |
130 |
Improper Handling of Length Parameter Inconsistency |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
131 |
Incorrect Calculation of Buffer Size |
|
Major |
Demonstrative_Examples, Likelihood_of_Exploit, Observed_Examples, Potential_Mitigations |
|
Minor |
None |
134 |
Uncontrolled Format String |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
138 |
Improper Sanitization of Special Elements |
|
Major |
Relationships |
|
Minor |
None |
170 |
Improper Null Termination |
|
Major |
None |
|
Minor |
Common_Consequences |
171 |
Cleansing, Canonicalization, and Comparison Errors |
|
Major |
Applicable_Platforms |
|
Minor |
None |
185 |
Incorrect Regular Expression |
|
Major |
Common_Consequences, Other_Notes |
|
Minor |
None |
187 |
Partial Comparison |
|
Major |
Demonstrative_Examples, Observed_Examples, Other_Notes, Relationship_Notes |
|
Minor |
None |
188 |
Reliance on Data/Memory Layout |
|
Major |
None |
|
Minor |
Common_Consequences |
190 |
Integer Overflow or Wraparound |
|
Major |
None |
|
Minor |
Common_Consequences |
192 |
Integer Coercion Error |
|
Major |
Description, Other_Notes |
|
Minor |
Common_Consequences |
193 |
Off-by-one Error |
|
Major |
Demonstrative_Examples, Potential_Mitigations |
|
Minor |
None |
194 |
Unexpected Sign Extension |
|
Major |
None |
|
Minor |
Common_Consequences |
195 |
Signed to Unsigned Conversion Error |
|
Major |
None |
|
Minor |
Common_Consequences |
196 |
Unsigned to Signed Conversion Error |
|
Major |
None |
|
Minor |
Common_Consequences |
197 |
Numeric Truncation Error |
|
Major |
None |
|
Minor |
Common_Consequences |
200 |
Information Exposure |
|
Major |
Alternate_Terms, Description, Name |
|
Minor |
None |
201 |
Information Leak Through Sent Data |
|
Major |
None |
|
Minor |
Common_Consequences |
202 |
Privacy Leak through Data Queries |
|
Major |
None |
|
Minor |
Common_Consequences |
203 |
Information Exposure Through Discrepancy |
|
Major |
Description, Name |
|
Minor |
None |
204 |
Response Discrepancy Information Leak |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
205 |
Information Exposure Through Behavioral Discrepancy |
|
Major |
Description, Name |
|
Minor |
None |
207 |
Information Exposure Through an External Behavioral Inconsistency |
|
Major |
Description, Name |
|
Minor |
None |
209 |
Information Exposure Through an Error Message |
|
Major |
Demonstrative_Examples, Name, Potential_Mitigations, References, Time_of_Introduction |
|
Minor |
Applicable_Platforms, Common_Consequences |
210 |
Product-Generated Error Message Information Leak |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
211 |
Product-External Error Message Information Leak |
|
Major |
None |
|
Minor |
Applicable_Platforms |
212 |
Improper Cross-boundary Cleansing |
|
Major |
Name |
|
Minor |
None |
219 |
Sensitive Data Under Web Root |
|
Major |
Relationships |
|
Minor |
None |
234 |
Failure to Handle Missing Parameter |
|
Major |
None |
|
Minor |
Common_Consequences |
244 |
Failure to Clear Heap Memory Before Release ('Heap Inspection') |
|
Major |
None |
|
Minor |
Common_Consequences |
250 |
Execution with Unnecessary Privileges |
|
Major |
None |
|
Minor |
Common_Consequences |
252 |
Unchecked Return Value |
|
Major |
Common_Consequences, Demonstrative_Examples, References |
|
Minor |
None |
253 |
Incorrect Check of Function Return Value |
|
Major |
None |
|
Minor |
Common_Consequences |
257 |
Storing Passwords in a Recoverable Format |
|
Major |
None |
|
Minor |
Common_Consequences |
259 |
Hard-Coded Password |
|
Major |
None |
|
Minor |
Common_Consequences |
262 |
Not Using Password Aging |
|
Major |
None |
|
Minor |
Common_Consequences |
263 |
Password Aging with Long Expiration |
|
Major |
None |
|
Minor |
Common_Consequences |
265 |
Privilege / Sandbox Issues |
|
Major |
Potential_Mitigations |
|
Minor |
None |
266 |
Incorrect Privilege Assignment |
|
Major |
Potential_Mitigations |
|
Minor |
None |
267 |
Privilege Defined With Unsafe Actions |
|
Major |
Potential_Mitigations |
|
Minor |
None |
268 |
Privilege Chaining |
|
Major |
Other_Notes, Potential_Mitigations, Research_Gaps |
|
Minor |
None |
269 |
Improper Privilege Management |
|
Major |
Potential_Mitigations |
|
Minor |
None |
270 |
Privilege Context Switching Error |
|
Major |
Potential_Mitigations |
|
Minor |
None |
271 |
Privilege Dropping / Lowering Errors |
|
Major |
Potential_Mitigations |
|
Minor |
None |
272 |
Least Privilege Violation |
|
Major |
Potential_Mitigations |
|
Minor |
Common_Consequences |
273 |
Improper Check for Dropped Privileges |
|
Major |
None |
|
Minor |
Common_Consequences |
282 |
Improper Ownership Management |
|
Major |
Potential_Mitigations |
|
Minor |
None |
283 |
Unverified Ownership |
|
Major |
Potential_Mitigations |
|
Minor |
None |
284 |
Access Control (Authorization) Issues |
|
Major |
Potential_Mitigations |
|
Minor |
None |
285 |
Improper Access Control (Authorization) |
|
Major |
Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Detection_Factors, Modes_of_Introduction, Observed_Examples, Relationships |
|
Minor |
None |
287 |
Improper Authentication |
|
Major |
Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Detection_Factors, Likelihood_of_Exploit, References |
|
Minor |
None |
291 |
Trusting Self-reported IP Address |
|
Major |
None |
|
Minor |
Common_Consequences |
292 |
Trusting Self-reported DNS Name |
|
Major |
None |
|
Minor |
Common_Consequences |
293 |
Using Referer Field for Authentication |
|
Major |
None |
|
Minor |
Common_Consequences |
294 |
Authentication Bypass by Capture-replay |
|
Major |
None |
|
Minor |
Common_Consequences |
296 |
Improper Following of Chain of Trust for Certificate Validation |
|
Major |
None |
|
Minor |
Common_Consequences |
297 |
Improper Validation of Host-specific Certificate Data |
|
Major |
None |
|
Minor |
Common_Consequences |
298 |
Improper Validation of Certificate Expiration |
|
Major |
None |
|
Minor |
Common_Consequences |
299 |
Improper Check for Certificate Revocation |
|
Major |
None |
|
Minor |
Common_Consequences |
301 |
Reflection Attack in an Authentication Protocol |
|
Major |
None |
|
Minor |
Common_Consequences |
307 |
Failure to Restrict Excessive Authentication Attempts |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Potential_Mitigations |
|
Minor |
None |
308 |
Use of Single-factor Authentication |
|
Major |
None |
|
Minor |
Common_Consequences |
309 |
Use of Password System for Primary Authentication |
|
Major |
None |
|
Minor |
Common_Consequences |
311 |
Failure to Encrypt Sensitive Data |
|
Major |
None |
|
Minor |
Common_Consequences |
317 |
Plaintext Storage in GUI |
|
Major |
None |
|
Minor |
Applicable_Platforms |
319 |
Cleartext Transmission of Sensitive Information |
|
Major |
None |
|
Minor |
Common_Consequences |
321 |
Use of Hard-coded Cryptographic Key |
|
Major |
None |
|
Minor |
Common_Consequences |
322 |
Key Exchange without Entity Authentication |
|
Major |
None |
|
Minor |
Common_Consequences |
323 |
Reusing a Nonce, Key Pair in Encryption |
|
Major |
None |
|
Minor |
Common_Consequences |
324 |
Use of a Key Past its Expiration Date |
|
Major |
None |
|
Minor |
Common_Consequences |
326 |
Inadequate Encryption Strength |
|
Major |
None |
|
Minor |
Common_Consequences |
327 |
Use of a Broken or Risky Cryptographic Algorithm |
|
Major |
References |
|
Minor |
Common_Consequences |
329 |
Not Using a Random IV with CBC Mode |
|
Major |
None |
|
Minor |
Common_Consequences |
330 |
Use of Insufficiently Random Values |
|
Major |
Applicable_Platforms, Common_Consequences, Description, Observed_Examples, Potential_Mitigations, Time_of_Introduction |
|
Minor |
Functional_Areas |
332 |
Insufficient Entropy in PRNG |
|
Major |
Potential_Mitigations |
|
Minor |
Common_Consequences |
333 |
Improper Handling of Insufficient Entropy in TRNG |
|
Major |
None |
|
Minor |
Common_Consequences |
334 |
Small Space of Random Values |
|
Major |
Potential_Mitigations |
|
Minor |
None |
336 |
Same Seed in PRNG |
|
Major |
Potential_Mitigations |
|
Minor |
None |
337 |
Predictable Seed in PRNG |
|
Major |
Potential_Mitigations |
|
Minor |
None |
338 |
Use of Cryptographically Weak PRNG |
|
Major |
None |
|
Minor |
Common_Consequences |
339 |
Small Seed Space in PRNG |
|
Major |
Potential_Mitigations |
|
Minor |
None |
341 |
Predictable from Observable State |
|
Major |
Potential_Mitigations |
|
Minor |
None |
342 |
Predictable Exact Value from Previous Values |
|
Major |
Potential_Mitigations |
|
Minor |
None |
343 |
Predictable Value Range from Previous Values |
|
Major |
Potential_Mitigations |
|
Minor |
None |
344 |
Use of Invariant Value in Dynamically Changing Context |
|
Major |
Potential_Mitigations |
|
Minor |
None |
352 |
Cross-Site Request Forgery (CSRF) |
|
Major |
Common_Consequences, Demonstrative_Examples, Detection_Factors, Likelihood_of_Exploit, Observed_Examples, Potential_Mitigations, Time_of_Introduction |
|
Minor |
None |
353 |
Failure to Add Integrity Check Value |
|
Major |
None |
|
Minor |
Common_Consequences |
354 |
Improper Validation of Integrity Check Value |
|
Major |
None |
|
Minor |
Common_Consequences |
359 |
Privacy Violation |
|
Major |
Other_Notes, References |
|
Minor |
None |
360 |
Trust of System Event Data |
|
Major |
None |
|
Minor |
Common_Consequences |
362 |
Race Condition |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
364 |
Signal Handler Race Condition |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
365 |
Race Condition in Switch |
|
Major |
None |
|
Minor |
Common_Consequences |
366 |
Race Condition within a Thread |
|
Major |
None |
|
Minor |
Common_Consequences |
367 |
Time-of-check Time-of-use (TOCTOU) Race Condition |
|
Major |
None |
|
Minor |
Common_Consequences |
369 |
Divide By Zero |
|
Major |
None |
|
Minor |
Common_Consequences |
370 |
Missing Check for Certificate Revocation after Initial Check |
|
Major |
None |
|
Minor |
Common_Consequences |
373 |
State Synchronization Error |
|
Major |
None |
|
Minor |
Common_Consequences |
374 |
Mutable Objects Passed by Reference |
|
Major |
None |
|
Minor |
Common_Consequences |
375 |
Passing Mutable Objects to an Untrusted Method |
|
Major |
None |
|
Minor |
Common_Consequences |
378 |
Creation of Temporary File With Insecure Permissions |
|
Major |
None |
|
Minor |
Common_Consequences |
379 |
Creation of Temporary File in Directory with Incorrect Permissions |
|
Major |
None |
|
Minor |
Common_Consequences |
385 |
Covert Timing Channel |
|
Major |
None |
|
Minor |
Common_Consequences |
386 |
Symbolic Name not Mapping to Correct Object |
|
Major |
None |
|
Minor |
Common_Consequences |
387 |
Signal Errors |
|
Major |
Other_Notes |
|
Minor |
None |
388 |
Error Handling |
|
Major |
None |
|
Minor |
Common_Consequences |
389 |
Error Conditions, Return Values, Status Codes |
|
Major |
Other_Notes, Weakness_Ordinalities |
|
Minor |
None |
394 |
Unexpected Status Code or Return Value |
|
Major |
Other_Notes, Relationship_Notes |
|
Minor |
None |
400 |
Uncontrolled Resource Consumption ('Resource Exhaustion') |
|
Major |
Common_Consequences, Demonstrative_Examples, Detection_Factors, Likelihood_of_Exploit, Observed_Examples, Other_Notes, Potential_Mitigations, References |
|
Minor |
None |
401 |
Failure to Release Memory Before Removing Last Reference ('Memory Leak') |
|
Major |
None |
|
Minor |
Common_Consequences |
404 |
Improper Resource Shutdown or Release |
|
Major |
None |
|
Minor |
Common_Consequences |
405 |
Asymmetric Resource Consumption (Amplification) |
|
Major |
None |
|
Minor |
Common_Consequences |
407 |
Algorithmic Complexity |
|
Major |
Applicable_Platforms, Likelihood_of_Exploit |
|
Minor |
Common_Consequences |
410 |
Insufficient Resource Pool |
|
Major |
None |
|
Minor |
Common_Consequences |
412 |
Unrestricted Externally Accessible Lock |
|
Major |
None |
|
Minor |
Common_Consequences |
415 |
Double Free |
|
Major |
None |
|
Minor |
Common_Consequences |
416 |
Use After Free |
|
Major |
None |
|
Minor |
Common_Consequences |
426 |
Untrusted Search Path |
|
Major |
References |
|
Minor |
Common_Consequences, Potential_Mitigations |
428 |
Unquoted Search Path or Element |
|
Major |
None |
|
Minor |
Applicable_Platforms |
434 |
Unrestricted File Upload |
|
Major |
Applicable_Platforms, Functional_Areas, Likelihood_of_Exploit, Potential_Mitigations, Time_of_Introduction |
|
Minor |
None |
447 |
Unimplemented or Unsupported Feature in UI |
|
Major |
Other_Notes, Potential_Mitigations, Research_Gaps |
|
Minor |
None |
453 |
Insecure Default Variable Initialization |
|
Major |
None |
|
Minor |
Applicable_Platforms |
454 |
External Initialization of Trusted Variables |
|
Major |
None |
|
Minor |
Applicable_Platforms |
457 |
Use of Uninitialized Variable |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
460 |
Improper Cleanup on Thrown Exception |
|
Major |
None |
|
Minor |
Common_Consequences |
463 |
Deletion of Data Structure Sentinel |
|
Major |
None |
|
Minor |
Common_Consequences |
464 |
Addition of Data Structure Sentinel |
|
Major |
None |
|
Minor |
Common_Consequences |
467 |
Use of sizeof() on a Pointer Type |
|
Major |
Demonstrative_Examples |
|
Minor |
Common_Consequences |
468 |
Incorrect Pointer Scaling |
|
Major |
None |
|
Minor |
Common_Consequences |
469 |
Use of Pointer Subtraction to Determine Size |
|
Major |
None |
|
Minor |
Common_Consequences |
470 |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
472 |
External Control of Assumed-Immutable Web Parameter |
|
Major |
None |
|
Minor |
Common_Consequences |
473 |
PHP External Variable Modification |
|
Major |
Other_Notes, Relationship_Notes |
|
Minor |
None |
474 |
Use of Function with Inconsistent Implementations |
|
Major |
None |
|
Minor |
Applicable_Platforms |
476 |
NULL Pointer Dereference |
|
Major |
Common_Consequences, Demonstrative_Examples, Other_Notes, Potential_Mitigations, Weakness_Ordinalities |
|
Minor |
None |
478 |
Missing Default Case in Switch Statement |
|
Major |
None |
|
Minor |
Common_Consequences |
479 |
Unsafe Function Call from a Signal Handler |
|
Major |
None |
|
Minor |
Common_Consequences |
480 |
Use of Incorrect Operator |
|
Major |
None |
|
Minor |
Applicable_Platforms |
482 |
Comparing instead of Assigning |
|
Major |
None |
|
Minor |
Common_Consequences |
483 |
Incorrect Block Delimitation |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
486 |
Comparison of Classes by Name |
|
Major |
None |
|
Minor |
Common_Consequences |
487 |
Reliance on Package-level Scope |
|
Major |
None |
|
Minor |
Common_Consequences |
489 |
Leftover Debug Code |
|
Major |
None |
|
Minor |
Common_Consequences |
492 |
Use of Inner Class Containing Sensitive Data |
|
Major |
Demonstrative_Examples, Potential_Mitigations |
|
Minor |
Common_Consequences |
493 |
Critical Public Variable Without Final Modifier |
|
Major |
None |
|
Minor |
Common_Consequences |
494 |
Download of Code Without Integrity Check |
|
Major |
None |
|
Minor |
Common_Consequences |
497 |
Exposure of System Data to an Unauthorized Control Sphere |
|
Major |
Description, Name |
|
Minor |
None |
498 |
Information Leak through Class Cloning |
|
Major |
None |
|
Minor |
Common_Consequences |
499 |
Serializable Class Containing Sensitive Data |
|
Major |
None |
|
Minor |
Common_Consequences |
500 |
Public Static Field Not Marked Final |
|
Major |
None |
|
Minor |
Common_Consequences |
502 |
Deserialization of Untrusted Data |
|
Major |
None |
|
Minor |
Common_Consequences |
515 |
Covert Storage Channel |
|
Major |
None |
|
Minor |
Common_Consequences |
525 |
Information Leak Through Browser Caching |
|
Major |
None |
|
Minor |
Common_Consequences |
527 |
Exposure of CVS Repository to an Unauthorized Control Sphere |
|
Major |
Description, Name |
|
Minor |
None |
528 |
Exposure of Core Dump File to an Unauthorized Control Sphere |
|
Major |
Description, Name |
|
Minor |
None |
529 |
Exposure of Access Control List Files to an Unauthorized Control Sphere |
|
Major |
Description, Name |
|
Minor |
None |
530 |
Exposure of Backup File to an Unauthorized Control Sphere |
|
Major |
Description, Name |
|
Minor |
Common_Consequences |
532 |
Information Leak Through Log Files |
|
Major |
None |
|
Minor |
Common_Consequences |
536 |
Information Leak Through Servlet Runtime Error Message |
|
Major |
None |
|
Minor |
Common_Consequences |
538 |
File and Directory Information Exposure |
|
Major |
Description, Maintenance_Notes, Name |
|
Minor |
None |
548 |
Information Leak Through Directory Listing |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
561 |
Dead Code |
|
Major |
None |
|
Minor |
Common_Consequences |
565 |
Reliance on Cookies without Validation and Integrity Checking |
|
Major |
None |
|
Minor |
Common_Consequences |
575 |
EJB Bad Practices: Use of AWT Swing |
|
Major |
Demonstrative_Examples, Potential_Mitigations |
|
Minor |
None |
576 |
EJB Bad Practices: Use of Java I/O |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
577 |
EJB Bad Practices: Use of Sockets |
|
Major |
Demonstrative_Examples, Potential_Mitigations |
|
Minor |
None |
578 |
EJB Bad Practices: Use of Class Loader |
|
Major |
Demonstrative_Examples, Potential_Mitigations |
|
Minor |
None |
581 |
Object Model Violation: Just One of Equals and Hashcode Defined |
|
Major |
None |
|
Minor |
Common_Consequences |
585 |
Empty Synchronized Block |
|
Major |
None |
|
Minor |
Common_Consequences |
587 |
Assignment of a Fixed Address to a Pointer |
|
Major |
None |
|
Minor |
Common_Consequences |
588 |
Attempt to Access Child of a Non-structure Pointer |
|
Major |
None |
|
Minor |
Common_Consequences |
590 |
Free of Memory not on the Heap |
|
Major |
None |
|
Minor |
Common_Consequences |
591 |
Sensitive Data Storage in Improperly Locked Memory |
|
Major |
None |
|
Minor |
Common_Consequences |
593 |
Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created |
|
Major |
None |
|
Minor |
Common_Consequences |
594 |
J2EE Framework: Saving Unserializable Objects to Disk |
|
Major |
None |
|
Minor |
Common_Consequences |
599 |
Trust of OpenSSL Certificate Without Validation |
|
Major |
None |
|
Minor |
Common_Consequences |
601 |
URL Redirection to Untrusted Site ('Open Redirect') |
|
Major |
Demonstrative_Examples, Detection_Factors, Likelihood_of_Exploit, Potential_Mitigations |
|
Minor |
None |
602 |
Client-Side Enforcement of Server-Side Security |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
605 |
Multiple Binds to the Same Port |
|
Major |
None |
|
Minor |
Common_Consequences |
620 |
Unverified Password Change |
|
Major |
Other_Notes, Weakness_Ordinalities |
|
Minor |
None |
622 |
Unvalidated Function Hook Arguments |
|
Major |
Other_Notes, Weakness_Ordinalities |
|
Minor |
None |
636 |
Not Failing Securely ('Failing Open') |
|
Major |
None |
|
Minor |
Common_Consequences |
638 |
Failure to Use Complete Mediation |
|
Major |
None |
|
Minor |
Common_Consequences |
639 |
Access Control Bypass Through User-Controlled Key |
|
Major |
None |
|
Minor |
Common_Consequences |
640 |
Weak Password Recovery Mechanism for Forgotten Password |
|
Major |
None |
|
Minor |
Common_Consequences |
641 |
Insufficient Filtering of File and Other Resource Names for Executable Content |
|
Major |
None |
|
Minor |
Common_Consequences |
642 |
External Control of Critical State Data |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
643 |
Failure to Sanitize Data within XPath Expressions ('XPath injection') |
|
Major |
None |
|
Minor |
Common_Consequences |
644 |
Improper Sanitization of HTTP Headers for Scripting Syntax |
|
Major |
None |
|
Minor |
Common_Consequences |
645 |
Overly Restrictive Account Lockout Mechanism |
|
Major |
None |
|
Minor |
Common_Consequences |
646 |
Reliance on File Name or Extension of Externally-Supplied File |
|
Major |
None |
|
Minor |
Common_Consequences |
647 |
Use of Non-Canonical URL Paths for Authorization Decisions |
|
Major |
None |
|
Minor |
Common_Consequences |
648 |
Incorrect Use of Privileged APIs |
|
Major |
None |
|
Minor |
Common_Consequences |
649 |
Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking |
|
Major |
None |
|
Minor |
Common_Consequences |
650 |
Trusting HTTP Permission Methods on the Server Side |
|
Major |
None |
|
Minor |
Common_Consequences |
651 |
Information Leak through WSDL File |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
652 |
Failure to Sanitize Data within XQuery Expressions ('XQuery Injection') |
|
Major |
None |
|
Minor |
Common_Consequences |
653 |
Insufficient Compartmentalization |
|
Major |
None |
|
Minor |
Common_Consequences |
654 |
Reliance on a Single Factor in a Security Decision |
|
Major |
None |
|
Minor |
Common_Consequences |
655 |
Insufficient Psychological Acceptability |
|
Major |
None |
|
Minor |
Common_Consequences |
656 |
Reliance on Security through Obscurity |
|
Major |
None |
|
Minor |
Common_Consequences |
665 |
Improper Initialization |
|
Major |
None |
|
Minor |
Common_Consequences |
667 |
Insufficient Locking |
|
Major |
None |
|
Minor |
Common_Consequences |
668 |
Exposure of Resource to Wrong Sphere |
|
Major |
Relationships |
|
Minor |
None |
674 |
Uncontrolled Recursion |
|
Major |
None |
|
Minor |
Common_Consequences |
681 |
Incorrect Conversion between Numeric Types |
|
Major |
Applicable_Platforms, Likelihood_of_Exploit, Potential_Mitigations |
|
Minor |
None |
682 |
Incorrect Calculation |
|
Major |
None |
|
Minor |
Common_Consequences |
690 |
Unchecked Return Value to NULL Pointer Dereference |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
704 |
Incorrect Type Conversion or Cast |
|
Major |
None |
|
Minor |
Applicable_Platforms |
712 |
OWASP Top Ten 2007 Category A1 - Cross Site Scripting (XSS) |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
714 |
OWASP Top Ten 2007 Category A3 - Malicious File Execution |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
716 |
OWASP Top Ten 2007 Category A5 - Cross Site Request Forgery (CSRF) |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
717 |
OWASP Top Ten 2007 Category A6 - Information Leakage and Improper Error Handling |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
718 |
OWASP Top Ten 2007 Category A7 - Broken Authentication and Session Management |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
719 |
OWASP Top Ten 2007 Category A8 - Insecure Cryptographic Storage |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
721 |
OWASP Top Ten 2007 Category A10 - Failure to Restrict URL Access |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
732 |
Incorrect Permission Assignment for Critical Resource |
|
Major |
Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Detection_Factors, Modes_of_Introduction, Observed_Examples, Potential_Mitigations, References |
|
Minor |
None |
733 |
Compiler Optimization Removal or Modification of Security-critical Code |
|
Major |
None |
|
Minor |
Applicable_Platforms |
749 |
Exposed Dangerous Method or Function |
|
Major |
Applicable_Platforms, Likelihood_of_Exploit |
|
Minor |
None |
754 |
Improper Check for Exceptional Conditions |
|
Major |
Applicable_Platforms, Likelihood_of_Exploit, Time_of_Introduction |
|
Minor |
None |
755 |
Improper Handling of Exceptional Conditions |
|
Major |
Applicable_Platforms, Likelihood_of_Exploit, Time_of_Introduction |
|
Minor |
None |
762 |
Mismatched Memory Management Routines |
|
Major |
Applicable_Platforms, Likelihood_of_Exploit |
|
Minor |
None |
766 |
Critical Variable Declared Public |
|
Major |
Demonstrative_Examples |
|
Minor |
Common_Consequences |
768 |
Incorrect Short Circuit Evaluation |
|
Major |
None |
|
Minor |
Common_Consequences |
770 |
Allocation of Resources Without Limits or Throttling |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Detection_Factors, Observed_Examples, References, Time_of_Introduction |
|
Minor |
Common_Consequences |
771 |
Missing Reference to Active Allocated Resource |
|
Major |
None |
|
Minor |
Common_Consequences |
772 |
Missing Release of Resource after Effective Lifetime |
|
Major |
None |
|
Minor |
Common_Consequences |
773 |
Missing Reference to Active File Descriptor or Handle |
|
Major |
None |
|
Minor |
Common_Consequences |
774 |
Allocation of File Descriptors or Handles Without Limits or Throttling |
|
Major |
None |
|
Minor |
Common_Consequences |
775 |
Missing Release of File Descriptor or Handle after Effective Lifetime |
|
Major |
Observed_Examples |
|
Minor |
Common_Consequences |
776 |
Unrestricted Recursive Entity References in DTDs ('XML Bomb') |
|
Major |
None |
|
Minor |
Common_Consequences |
777 |
Regular Expression without Anchors |
|
Major |
None |
|
Minor |
Common_Consequences |
778 |
Insufficient Logging |
|
Major |
None |
|
Minor |
Common_Consequences |
779 |
Logging of Excessive Data |
|
Major |
None |
|
Minor |
Common_Consequences |
780 |
Use of RSA Algorithm without OAEP |
|
Major |
None |
|
Minor |
Common_Consequences |
781 |
Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code |
|
Major |
Common_Consequences, Potential_Mitigations, References, Time_of_Introduction |
|
Minor |
Applicable_Platforms |
782 |
Exposed IOCTL with Insufficient Access Control |
|
Major |
Time_of_Introduction |
|
Minor |
Applicable_Platforms, Common_Consequences, Observed_Examples |
783 |
Operator Precedence Logic Error |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms, Common_Consequences |
784 |
Reliance on Cookies without Validation and Integrity Checking in a Security Decision |
|
Major |
None |
|
Minor |
Applicable_Platforms, Common_Consequences |
789 |
Uncontrolled Memory Allocation |
|
Major |
None |
|
Minor |
Common_Consequences |