2 |
7PK - Environment |
|
Major |
Relationships |
|
Minor |
None |
15 |
External Control of System or Configuration Setting |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
16 |
Configuration |
|
Major |
Relationships |
|
Minor |
None |
17 |
DEPRECATED: Code |
|
Major |
Description, Maintenance_Notes, Name, Relationships, Type |
|
Minor |
None |
18 |
DEPRECATED: Source Code |
|
Major |
Description, Maintenance_Notes, Name, Relationships, Taxonomy_Mappings, Type |
|
Minor |
None |
19 |
Data Processing Errors |
|
Major |
Relationships |
|
Minor |
None |
20 |
Improper Input Validation |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
21 |
Pathname Traversal and Equivalence Errors |
|
Major |
Relationships |
|
Minor |
None |
22 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
Major |
Related_Attack_Patterns, Relationships, Type |
|
Minor |
None |
23 |
Relative Path Traversal |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
41 |
Improper Resolution of Path Equivalence |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
46 |
Path Equivalence: 'filename ' (Trailing Space) |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
59 |
Improper Link Resolution Before File Access ('Link Following') |
|
Major |
Relationships |
|
Minor |
None |
64 |
Windows Shortcut Following (.LNK) |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
74 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
78 |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
|
Major |
Relationships |
|
Minor |
None |
83 |
Improper Neutralization of Script in Attributes in a Web Page |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
84 |
Improper Neutralization of Encoded URI Schemes in a Web Page |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
88 |
Argument Injection or Modification |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
89 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
|
Major |
Relationships |
|
Minor |
None |
90 |
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
|
Major |
Relationships |
|
Minor |
None |
91 |
XML Injection (aka Blind XPath Injection) |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
93 |
Improper Neutralization of CRLF Sequences ('CRLF Injection') |
|
Major |
Relationships |
|
Minor |
None |
94 |
Improper Control of Generation of Code ('Code Injection') |
|
Major |
Related_Attack_Patterns, Type |
|
Minor |
None |
95 |
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') |
|
Major |
Type |
|
Minor |
None |
98 |
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') |
|
Major |
Type |
|
Minor |
None |
99 |
Improper Control of Resource Identifiers ('Resource Injection') |
|
Major |
Relationships |
|
Minor |
None |
113 |
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting') |
|
Major |
Relationships |
|
Minor |
None |
116 |
Improper Encoding or Escaping of Output |
|
Major |
Relationships |
|
Minor |
None |
117 |
Improper Output Neutralization for Logs |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
118 |
Incorrect Access of Indexable Resource ('Range Error') |
|
Major |
Relationships |
|
Minor |
None |
119 |
Improper Restriction of Operations within the Bounds of a Memory Buffer |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
120 |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
|
Major |
Relationships |
|
Minor |
None |
123 |
Write-what-where Condition |
|
Major |
Relationships |
|
Minor |
None |
125 |
Out-of-bounds Read |
|
Major |
Description, Related_Attack_Patterns |
|
Minor |
None |
131 |
Incorrect Calculation of Buffer Size |
|
Major |
Relationships |
|
Minor |
None |
134 |
Use of Externally-Controlled Format String |
|
Major |
Relationships |
|
Minor |
None |
137 |
Representation Errors |
|
Major |
Relationships |
|
Minor |
None |
150 |
Improper Neutralization of Escape, Meta, or Control Sequences |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
171 |
Cleansing, Canonicalization, and Comparison Errors |
|
Major |
Relationships |
|
Minor |
None |
172 |
Encoding Error |
|
Major |
Relationships |
|
Minor |
None |
173 |
Improper Handling of Alternate Encoding |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
178 |
Improper Handling of Case Sensitivity |
|
Major |
Relationships |
|
Minor |
None |
180 |
Incorrect Behavior Order: Validate Before Canonicalize |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
183 |
Permissive Whitelist |
|
Major |
Relationships |
|
Minor |
None |
184 |
Incomplete Blacklist |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
185 |
Incorrect Regular Expression |
|
Major |
Related_Attack_Patterns, Relationships, Type |
|
Minor |
None |
189 |
Numeric Errors |
|
Major |
Relationships |
|
Minor |
None |
193 |
Off-by-one Error |
|
Major |
Demonstrative_Examples, Relationships |
|
Minor |
None |
200 |
Information Exposure |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
203 |
Information Exposure Through Discrepancy |
|
Major |
Relationships, Type |
|
Minor |
None |
209 |
Information Exposure Through an Error Message |
|
Major |
Relationships |
|
Minor |
None |
212 |
Improper Cross-boundary Removal of Sensitive Data |
|
Major |
Relationships |
|
Minor |
None |
216 |
Containment Errors (Container Errors) |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
220 |
Sensitive Data Under FTP Root |
|
Major |
Relationships |
|
Minor |
None |
248 |
Uncaught Exception |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
252 |
Unchecked Return Value |
|
Major |
Relationships |
|
Minor |
None |
254 |
7PK - Security Features |
|
Major |
Relationships |
|
Minor |
None |
255 |
Credentials Management |
|
Major |
Relationships |
|
Minor |
None |
256 |
Unprotected Storage of Credentials |
|
Major |
Type |
|
Minor |
None |
259 |
Use of Hard-coded Password |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
264 |
Permissions, Privileges, and Access Controls |
|
Major |
Relationships |
|
Minor |
None |
269 |
Improper Privilege Management |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
273 |
Improper Check for Dropped Privileges |
|
Major |
Relationships |
|
Minor |
None |
276 |
Incorrect Default Permissions |
|
Major |
Relationships, Type |
|
Minor |
None |
280 |
Improper Handling of Insufficient Permissions or Privileges |
|
Major |
Relationships |
|
Minor |
None |
281 |
Improper Preservation of Permissions |
|
Major |
Relationships |
|
Minor |
None |
284 |
Improper Access Control |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
285 |
Improper Authorization |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
287 |
Improper Authentication |
|
Major |
Demonstrative_Examples, Related_Attack_Patterns, Relationships |
|
Minor |
None |
290 |
Authentication Bypass by Spoofing |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
294 |
Authentication Bypass by Capture-replay |
|
Major |
Relationships |
|
Minor |
None |
295 |
Improper Certificate Validation |
|
Major |
Relationships |
|
Minor |
None |
297 |
Improper Validation of Certificate with Host Mismatch |
|
Major |
Relationships |
|
Minor |
None |
300 |
Channel Accessible by Non-Endpoint ('Man-in-the-Middle') |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
304 |
Missing Critical Step in Authentication |
|
Major |
Relationships |
|
Minor |
None |
306 |
Missing Authentication for Critical Function |
|
Major |
Related_Attack_Patterns, Type |
|
Minor |
None |
307 |
Improper Restriction of Excessive Authentication Attempts |
|
Major |
Demonstrative_Examples, Relationships |
|
Minor |
None |
310 |
Cryptographic Issues |
|
Major |
Relationships |
|
Minor |
None |
311 |
Missing Encryption of Sensitive Data |
|
Major |
Related_Attack_Patterns, Relationships, Type |
|
Minor |
None |
312 |
Cleartext Storage of Sensitive Information |
|
Major |
Relationships, Type |
|
Minor |
None |
319 |
Cleartext Transmission of Sensitive Information |
|
Major |
Relationships, Type |
|
Minor |
None |
320 |
Key Management Errors |
|
Major |
Relationships |
|
Minor |
None |
323 |
Reusing a Nonce, Key Pair in Encryption |
|
Major |
Type |
|
Minor |
None |
326 |
Inadequate Encryption Strength |
|
Major |
Relationships |
|
Minor |
None |
327 |
Use of a Broken or Risky Cryptographic Algorithm |
|
Major |
Related_Attack_Patterns, Relationships, Type |
|
Minor |
None |
329 |
Not Using a Random IV with CBC Mode |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
330 |
Use of Insufficiently Random Values |
|
Major |
Relationships |
|
Minor |
None |
331 |
Insufficient Entropy |
|
Major |
Relationships |
|
Minor |
None |
332 |
Insufficient Entropy in PRNG |
|
Major |
Relationships |
|
Minor |
None |
335 |
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) |
|
Major |
Relationships |
|
Minor |
None |
336 |
Same Seed in Pseudo-Random Number Generator (PRNG) |
|
Major |
Type |
|
Minor |
None |
337 |
Predictable Seed in Pseudo-Random Number Generator (PRNG) |
|
Major |
Type |
|
Minor |
None |
339 |
Small Seed Space in PRNG |
|
Major |
Type |
|
Minor |
None |
345 |
Insufficient Verification of Data Authenticity |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
346 |
Origin Validation Error |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
353 |
Missing Support for Integrity Check |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
354 |
Improper Validation of Integrity Check Value |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
358 |
Improperly Implemented Security Check for Standard |
|
Major |
Relationships |
|
Minor |
None |
361 |
7PK - Time and State |
|
Major |
Relationships |
|
Minor |
None |
362 |
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
|
Major |
Relationships |
|
Minor |
None |
367 |
Time-of-check Time-of-use (TOCTOU) Race Condition |
|
Major |
Relationships |
|
Minor |
None |
371 |
State Issues |
|
Major |
Relationships |
|
Minor |
None |
372 |
Incomplete Internal State Distinction |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
377 |
Insecure Temporary File |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
379 |
Creation of Temporary File in Directory with Incorrect Permissions |
|
Major |
Type |
|
Minor |
None |
384 |
Session Fixation |
|
Major |
Relationships |
|
Minor |
None |
389 |
Error Conditions, Return Values, Status Codes |
|
Major |
Relationships |
|
Minor |
None |
391 |
Unchecked Error Condition |
|
Major |
Description, Maintenance_Notes |
|
Minor |
None |
398 |
7PK - Code Quality |
|
Major |
Relationships |
|
Minor |
None |
399 |
Resource Management Errors |
|
Major |
Relationships |
|
Minor |
None |
400 |
Uncontrolled Resource Consumption |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
401 |
Missing Release of Memory after Effective Lifetime |
|
Major |
Description, Name |
|
Minor |
None |
404 |
Improper Resource Shutdown or Release |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
405 |
Asymmetric Resource Consumption (Amplification) |
|
Major |
Relationships |
|
Minor |
None |
406 |
Insufficient Control of Network Message Volume (Network Amplification) |
|
Major |
Type |
|
Minor |
None |
407 |
Inefficient Algorithmic Complexity |
|
Major |
Name, Relationships, Type |
|
Minor |
None |
415 |
Double Free |
|
Major |
Relationships |
|
Minor |
None |
416 |
Use After Free |
|
Major |
Relationships, Type |
|
Minor |
None |
417 |
Channel and Path Errors |
|
Major |
Relationships |
|
Minor |
None |
424 |
Improper Protection of Alternate Path |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
425 |
Direct Request ('Forced Browsing') |
|
Major |
Relationships |
|
Minor |
None |
426 |
Untrusted Search Path |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
427 |
Uncontrolled Search Path Element |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
428 |
Unquoted Search Path or Element |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
430 |
Deployment of Wrong Handler |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
434 |
Unrestricted Upload of File with Dangerous Type |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
435 |
Improper Interaction Between Multiple Correctly-Behaving Entities |
|
Major |
Relationships |
|
Minor |
None |
436 |
Interpretation Conflict |
|
Major |
Relationships, Type |
|
Minor |
None |
441 |
Unintended Proxy or Intermediary ('Confused Deputy') |
|
Major |
Relationships |
|
Minor |
None |
452 |
Initialization and Cleanup Errors |
|
Major |
Relationships |
|
Minor |
None |
453 |
Insecure Default Variable Initialization |
|
Major |
Relationships, Type |
|
Minor |
None |
456 |
Missing Initialization of a Variable |
|
Major |
Relationships, Type |
|
Minor |
None |
457 |
Use of Uninitialized Variable |
|
Major |
Relationships, Type |
|
Minor |
None |
459 |
Incomplete Cleanup |
|
Major |
Relationships |
|
Minor |
None |
470 |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |
|
Major |
Relationships |
|
Minor |
None |
472 |
External Control of Assumed-Immutable Web Parameter |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
476 |
NULL Pointer Dereference |
|
Major |
Relationships |
|
Minor |
None |
485 |
7PK - Encapsulation |
|
Major |
Relationships |
|
Minor |
None |
489 |
Leftover Debug Code |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
494 |
Download of Code Without Integrity Check |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
497 |
Exposure of System Data to an Unauthorized Control Sphere |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
502 |
Deserialization of Untrusted Data |
|
Major |
Type |
|
Minor |
None |
521 |
Weak Password Requirements |
|
Major |
Relationships |
|
Minor |
None |
522 |
Insufficiently Protected Credentials |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
532 |
Inclusion of Sensitive Information in Log Files |
|
Major |
Name, Relationships |
|
Minor |
None |
538 |
File and Directory Information Exposure |
|
Major |
Relationships |
|
Minor |
None |
552 |
Files or Directories Accessible to External Parties |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
561 |
Dead Code |
|
Major |
Type |
|
Minor |
None |
565 |
Reliance on Cookies without Validation and Integrity Checking |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
601 |
URL Redirection to Untrusted Site ('Open Redirect') |
|
Major |
Relationships, Type |
|
Minor |
None |
602 |
Client-Side Enforcement of Server-Side Security |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
610 |
Externally Controlled Reference to a Resource in Another Sphere |
|
Major |
Relationships |
|
Minor |
None |
611 |
Improper Restriction of XML External Entity Reference |
|
Major |
Name, Type |
|
Minor |
None |
613 |
Insufficient Session Expiration |
|
Major |
Relationships |
|
Minor |
None |
617 |
Reachable Assertion |
|
Major |
Relationships, Type |
|
Minor |
None |
639 |
Authorization Bypass Through User-Controlled Key |
|
Major |
Relationships |
|
Minor |
None |
640 |
Weak Password Recovery Mechanism for Forgotten Password |
|
Major |
Relationships |
|
Minor |
None |
645 |
Overly Restrictive Account Lockout Mechanism |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
656 |
Reliance on Security Through Obscurity |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
662 |
Improper Synchronization |
|
Major |
Type |
|
Minor |
None |
664 |
Improper Control of a Resource Through its Lifetime |
|
Major |
Relationships |
|
Minor |
None |
665 |
Improper Initialization |
|
Major |
Relationships |
|
Minor |
None |
666 |
Operation on Resource in Wrong Phase of Lifetime |
|
Major |
Type |
|
Minor |
None |
668 |
Exposure of Resource to Wrong Sphere |
|
Major |
Relationships |
|
Minor |
None |
669 |
Incorrect Resource Transfer Between Spheres |
|
Major |
Relationships |
|
Minor |
None |
670 |
Always-Incorrect Control Flow Implementation |
|
Major |
Relationships |
|
Minor |
None |
672 |
Operation on a Resource after Expiration or Release |
|
Major |
Relationships, Type |
|
Minor |
None |
674 |
Uncontrolled Recursion |
|
Major |
Related_Attack_Patterns, Relationships, Type |
|
Minor |
None |
681 |
Incorrect Conversion between Numeric Types |
|
Major |
Relationships, Type |
|
Minor |
None |
682 |
Incorrect Calculation |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
693 |
Protection Mechanism Failure |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
694 |
Use of Multiple Resources with Duplicate Identifier |
|
Major |
Relationships |
|
Minor |
None |
697 |
Incorrect Comparison |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
703 |
Improper Check or Handling of Exceptional Conditions |
|
Major |
Relationships |
|
Minor |
None |
704 |
Incorrect Type Conversion or Cast |
|
Major |
Relationships |
|
Minor |
None |
706 |
Use of Incorrectly-Resolved Name or Reference |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
707 |
Improper Enforcement of Message or Data Structure |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
732 |
Incorrect Permission Assignment for Critical Resource |
|
Major |
Relationships |
|
Minor |
None |
749 |
Exposed Dangerous Method or Function |
|
Major |
Relationships |
|
Minor |
None |
750 |
Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors |
|
Major |
References |
|
Minor |
None |
751 |
2009 Top 25 - Insecure Interaction Between Components |
|
Major |
References |
|
Minor |
None |
752 |
2009 Top 25 - Risky Resource Management |
|
Major |
References |
|
Minor |
None |
753 |
2009 Top 25 - Porous Defenses |
|
Major |
References |
|
Minor |
None |
754 |
Improper Check for Unusual or Exceptional Conditions |
|
Major |
Description, Relationships |
|
Minor |
None |
755 |
Improper Handling of Exceptional Conditions |
|
Major |
Relationships |
|
Minor |
None |
757 |
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') |
|
Major |
Type |
|
Minor |
None |
759 |
Use of a One-Way Hash without a Salt |
|
Major |
Type |
|
Minor |
None |
760 |
Use of a One-Way Hash with a Predictable Salt |
|
Major |
Type |
|
Minor |
None |
763 |
Release of Invalid Pointer or Reference |
|
Major |
Relationships |
|
Minor |
None |
765 |
Multiple Unlocks of a Critical Resource |
|
Major |
Type |
|
Minor |
None |
770 |
Allocation of Resources Without Limits or Throttling |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
772 |
Missing Release of Resource after Effective Lifetime |
|
Major |
Relationships |
|
Minor |
None |
774 |
Allocation of File Descriptors or Handles Without Limits or Throttling |
|
Major |
Relationships |
|
Minor |
None |
775 |
Missing Release of File Descriptor or Handle after Effective Lifetime |
|
Major |
Relationships |
|
Minor |
None |
776 |
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') |
|
Major |
Relationships, Type |
|
Minor |
None |
783 |
Operator Precedence Logic Error |
|
Major |
Type |
|
Minor |
None |
789 |
Uncontrolled Memory Allocation |
|
Major |
Relationships |
|
Minor |
None |
798 |
Use of Hard-coded Credentials |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
800 |
Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors |
|
Major |
References |
|
Minor |
None |
801 |
2010 Top 25 - Insecure Interaction Between Components |
|
Major |
References |
|
Minor |
None |
802 |
2010 Top 25 - Risky Resource Management |
|
Major |
References |
|
Minor |
None |
803 |
2010 Top 25 - Porous Defenses |
|
Major |
References |
|
Minor |
None |
805 |
Buffer Access with Incorrect Length Value |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
808 |
2010 Top 25 - Weaknesses On the Cusp |
|
Major |
References |
|
Minor |
None |
822 |
Untrusted Pointer Dereference |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
823 |
Use of Out-of-range Pointer Offset |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
827 |
Improper Control of Document Type Definition |
|
Major |
Type |
|
Minor |
None |
829 |
Inclusion of Functionality from Untrusted Control Sphere |
|
Major |
Related_Attack_Patterns, Relationships, Type |
|
Minor |
None |
830 |
Inclusion of Web Functionality from an Untrusted Source |
|
Major |
Type |
|
Minor |
None |
834 |
Excessive Iteration |
|
Major |
Relationships, Type |
|
Minor |
None |
835 |
Loop with Unreachable Exit Condition ('Infinite Loop') |
|
Major |
Relationships |
|
Minor |
None |
838 |
Inappropriate Encoding for Output Context |
|
Major |
Relationships |
|
Minor |
None |
843 |
Access of Resource Using Incompatible Type ('Type Confusion') |
|
Major |
Relationships |
|
Minor |
None |
862 |
Missing Authorization |
|
Major |
Relationships |
|
Minor |
None |
863 |
Incorrect Authorization |
|
Major |
Relationships |
|
Minor |
None |
864 |
2011 Top 25 - Insecure Interaction Between Components |
|
Major |
References |
|
Minor |
None |
865 |
2011 Top 25 - Risky Resource Management |
|
Major |
References |
|
Minor |
None |
866 |
2011 Top 25 - Porous Defenses |
|
Major |
References |
|
Minor |
None |
867 |
2011 Top 25 - Weaknesses On the Cusp |
|
Major |
References |
|
Minor |
None |
900 |
Weaknesses in the 2011 CWE/SANS Top 25 Most Dangerous Software Errors |
|
Major |
References |
|
Minor |
None |
909 |
Missing Initialization of Resource |
|
Major |
Relationships |
|
Minor |
None |
911 |
Improper Update of Reference Count |
|
Major |
Type |
|
Minor |
None |
912 |
Hidden Functionality |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
913 |
Improper Control of Dynamically-Managed Code Resources |
|
Major |
Relationships |
|
Minor |
None |
915 |
Improperly Controlled Modification of Dynamically-Determined Object Attributes |
|
Major |
Relationships |
|
Minor |
None |
916 |
Use of Password Hash With Insufficient Computational Effort |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
918 |
Server-Side Request Forgery (SSRF) |
|
Major |
Relationships |
|
Minor |
None |
920 |
Improper Restriction of Power Consumption |
|
Major |
Relationships |
|
Minor |
None |
922 |
Insecure Storage of Sensitive Information |
|
Major |
Relationships |
|
Minor |
None |
924 |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel |
|
Major |
Relationships, Type |
|
Minor |
None |
940 |
Improper Verification of Source of a Communication Channel |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
942 |
Overly Permissive Cross-domain Whitelist |
|
Major |
Relationships |
|
Minor |
None |
943 |
Improper Neutralization of Special Elements in Data Query Logic |
|
Major |
Relationships |
|
Minor |
None |
1003 |
Weaknesses for Simplified Mapping of Published Vulnerabilities |
|
Major |
Relationships |
|
Minor |
None |
1021 |
Improper Restriction of Rendered UI Layers or Frames |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
1039 |
Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations |
|
Major |
References |
|
Minor |
None |
1153 |
SEI CERT Oracle Secure Coding Standard for Java - Guidelines 50. Android (DRD) |
|
Major |
Description |
|
Minor |
None |
1175 |
SEI CERT Oracle Secure Coding Standard for Java - Guidelines 18. Concurrency (CON) |
|
Major |
Description |
|
Minor |
None |