14 |
Compiler Removal of Code to Clear Buffers |
|
Major |
Demonstrative_Examples, Description |
|
Minor |
None |
41 |
Improper Resolution of Path Equivalence |
|
Major |
Observed_Examples |
|
Minor |
None |
55 |
Path Equivalence: '/./' (Single Dot Directory) |
|
Major |
Observed_Examples |
|
Minor |
None |
79 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
|
Major |
Relationships |
|
Minor |
None |
89 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
90 |
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
94 |
Improper Control of Generation of Code ('Code Injection') |
|
Major |
Demonstrative_Examples, Potential_Mitigations, References |
|
Minor |
None |
95 |
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') |
|
Major |
Demonstrative_Examples, Potential_Mitigations, References |
|
Minor |
None |
102 |
Struts: Duplicate Validation Forms |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
111 |
Direct Use of Unsafe JNI |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
118 |
Incorrect Access of Indexable Resource ('Range Error') |
|
Major |
Mapping_Notes |
|
Minor |
None |
122 |
Heap-based Buffer Overflow |
|
Major |
Observed_Examples, Taxonomy_Mappings |
|
Minor |
None |
124 |
Buffer Underwrite ('Buffer Underflow') |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
130 |
Improper Handling of Length Parameter Inconsistency |
|
Major |
Observed_Examples |
|
Minor |
None |
138 |
Improper Neutralization of Special Elements |
|
Major |
Mapping_Notes |
|
Minor |
None |
166 |
Improper Handling of Missing Special Element |
|
Major |
Relationships |
|
Minor |
None |
167 |
Improper Handling of Additional Special Element |
|
Major |
Relationships |
|
Minor |
None |
168 |
Improper Handling of Inconsistent Special Elements |
|
Major |
Relationships |
|
Minor |
None |
176 |
Improper Handling of Unicode Encoding |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
188 |
Reliance on Data/Memory Layout |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
190 |
Integer Overflow or Wraparound |
|
Major |
Observed_Examples |
|
Minor |
None |
203 |
Observable Discrepancy |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
208 |
Observable Timing Discrepancy |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
211 |
Externally-Generated Error Message Containing Sensitive Information |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
212 |
Improper Removal of Sensitive Information Before Storage or Transfer |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
226 |
Sensitive Information in Resource Not Removed Before Reuse |
|
Major |
Demonstrative_Examples, Observed_Examples, References |
|
Minor |
None |
228 |
Improper Handling of Syntactically Invalid Structure |
|
Major |
Observed_Examples, Relationships |
|
Minor |
None |
234 |
Failure to Handle Missing Parameter |
|
Major |
Mapping_Notes |
|
Minor |
None |
240 |
Improper Handling of Inconsistent Structural Elements |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
242 |
Use of Inherently Dangerous Function |
|
Major |
Observed_Examples |
|
Minor |
None |
244 |
Improper Clearing of Heap Memory Before Release ('Heap Inspection') |
|
Major |
Observed_Examples |
|
Minor |
None |
246 |
J2EE Bad Practices: Direct Use of Sockets |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
248 |
Uncaught Exception |
|
Major |
Observed_Examples |
|
Minor |
None |
253 |
Incorrect Check of Function Return Value |
|
Major |
Observed_Examples |
|
Minor |
None |
256 |
Plaintext Storage of a Password |
|
Major |
Taxonomy_Mappings |
|
Minor |
None |
259 |
Use of Hard-coded Password |
|
Major |
Observed_Examples |
|
Minor |
None |
274 |
Improper Handling of Insufficient Privileges |
|
Major |
Mapping_Notes |
|
Minor |
None |
284 |
Improper Access Control |
|
Major |
Observed_Examples |
|
Minor |
None |
287 |
Improper Authentication |
|
Major |
Observed_Examples |
|
Minor |
None |
306 |
Missing Authentication for Critical Function |
|
Major |
Observed_Examples |
|
Minor |
None |
311 |
Missing Encryption of Sensitive Data |
|
Major |
Taxonomy_Mappings |
|
Minor |
None |
312 |
Cleartext Storage of Sensitive Information |
|
Major |
Taxonomy_Mappings |
|
Minor |
None |
316 |
Cleartext Storage of Sensitive Information in Memory |
|
Major |
Observed_Examples |
|
Minor |
None |
319 |
Cleartext Transmission of Sensitive Information |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
328 |
Use of Weak Hash |
|
Major |
Demonstrative_Examples, Description, References |
|
Minor |
None |
330 |
Use of Insufficiently Random Values |
|
Major |
Mapping_Notes |
|
Minor |
None |
332 |
Insufficient Entropy in PRNG |
|
Major |
Observed_Examples, References |
|
Minor |
None |
333 |
Improper Handling of Insufficient Entropy in TRNG |
|
Major |
Relationships |
|
Minor |
None |
340 |
Generation of Predictable Numbers or Identifiers |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
344 |
Use of Invariant Value in Dynamically Changing Context |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
345 |
Insufficient Verification of Data Authenticity |
|
Major |
Mapping_Notes |
|
Minor |
None |
346 |
Origin Validation Error |
|
Major |
Taxonomy_Mappings |
|
Minor |
None |
348 |
Use of Less Trusted Source |
|
Major |
Observed_Examples |
|
Minor |
None |
354 |
Improper Validation of Integrity Check Value |
|
Major |
Taxonomy_Mappings |
|
Minor |
None |
372 |
Incomplete Internal State Distinction |
|
Major |
Mapping_Notes |
|
Minor |
None |
382 |
J2EE Bad Practices: Use of System.exit() |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
385 |
Covert Timing Channel |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
390 |
Detection of Error Condition Without Action |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
391 |
Unchecked Error Condition |
|
Major |
Mapping_Notes |
|
Minor |
None |
392 |
Missing Report of Error Condition |
|
Major |
Observed_Examples, References |
|
Minor |
None |
395 |
Use of NullPointerException Catch to Detect NULL Pointer Dereference |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
397 |
Declaration of Throws for Generic Exception |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
405 |
Asymmetric Resource Consumption (Amplification) |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
408 |
Incorrect Behavior Order: Early Amplification |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
416 |
Use After Free |
|
Major |
Taxonomy_Mappings |
|
Minor |
None |
420 |
Unprotected Alternate Channel |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
424 |
Improper Protection of Alternate Path |
|
Major |
Observed_Examples |
|
Minor |
None |
434 |
Unrestricted Upload of File with Dangerous Type |
|
Major |
Observed_Examples |
|
Minor |
None |
435 |
Improper Interaction Between Multiple Correctly-Behaving Entities |
|
Major |
Demonstrative_Examples, References |
|
Minor |
None |
440 |
Expected Behavior Violation |
|
Major |
Demonstrative_Examples, References |
|
Minor |
None |
460 |
Improper Cleanup on Thrown Exception |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
480 |
Use of Incorrect Operator |
|
Major |
Demonstrative_Examples, References |
|
Minor |
None |
494 |
Download of Code Without Integrity Check |
|
Major |
Demonstrative_Examples, Relationships |
|
Minor |
None |
514 |
Covert Channel |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
536 |
Servlet Runtime Error Message Containing Sensitive Information |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
537 |
Java Runtime Error Message Containing Sensitive Information |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
547 |
Use of Hard-coded, Security-relevant Constants |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
561 |
Dead Code |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
562 |
Return of Stack Variable Address |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
563 |
Assignment to Variable without Use |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
566 |
Authorization Bypass Through User-Controlled SQL Primary Key |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
581 |
Object Model Violation: Just One of Equals and Hashcode Defined |
|
Major |
Type |
|
Minor |
None |
585 |
Empty Synchronized Block |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
587 |
Assignment of a Fixed Address to a Pointer |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
594 |
J2EE Framework: Saving Unserializable Objects to Disk |
|
Major |
Relationships |
|
Minor |
None |
601 |
URL Redirection to Untrusted Site ('Open Redirect') |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
610 |
Externally Controlled Reference to a Resource in Another Sphere |
|
Major |
Demonstrative_Examples, Mapping_Notes |
|
Minor |
None |
617 |
Reachable Assertion |
|
Major |
Observed_Examples |
|
Minor |
None |
639 |
Authorization Bypass Through User-Controlled Key |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
643 |
Improper Neutralization of Data within XPath Expressions ('XPath Injection') |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
653 |
Improper Isolation or Compartmentalization |
|
Major |
Type |
|
Minor |
None |
657 |
Violation of Secure Design Principles |
|
Major |
Mapping_Notes |
|
Minor |
None |
662 |
Improper Synchronization |
|
Major |
Mapping_Notes |
|
Minor |
None |
665 |
Improper Initialization |
|
Major |
Mapping_Notes |
|
Minor |
None |
666 |
Operation on Resource in Wrong Phase of Lifetime |
|
Major |
Mapping_Notes |
|
Minor |
None |
669 |
Incorrect Resource Transfer Between Spheres |
|
Major |
Demonstrative_Examples, Observed_Examples, Relationships |
|
Minor |
None |
671 |
Lack of Administrator Control over Security |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
674 |
Uncontrolled Recursion |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
680 |
Integer Overflow to Buffer Overflow |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
681 |
Incorrect Conversion between Numeric Types |
|
Major |
Observed_Examples |
|
Minor |
None |
691 |
Insufficient Control Flow Management |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
694 |
Use of Multiple Resources with Duplicate Identifier |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
695 |
Use of Low-Level Functionality |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
696 |
Incorrect Behavior Order |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
703 |
Improper Check or Handling of Exceptional Conditions |
|
Major |
Demonstrative_Examples, Observed_Examples, References, Relationships |
|
Minor |
None |
704 |
Incorrect Type Conversion or Cast |
|
Major |
Observed_Examples |
|
Minor |
None |
705 |
Incorrect Control Flow Scoping |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
710 |
Improper Adherence to Coding Standards |
|
Major |
Relationships |
|
Minor |
None |
733 |
Compiler Optimization Removal or Modification of Security-critical Code |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
754 |
Improper Check for Unusual or Exceptional Conditions |
|
Major |
Observed_Examples |
|
Minor |
None |
755 |
Improper Handling of Exceptional Conditions |
|
Major |
Demonstrative_Examples, Mapping_Notes, Observed_Examples, References, Relationships |
|
Minor |
None |
758 |
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
759 |
Use of a One-Way Hash without a Salt |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
766 |
Critical Data Element Declared Public |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
770 |
Allocation of Resources Without Limits or Throttling |
|
Major |
Taxonomy_Mappings |
|
Minor |
None |
786 |
Access of Memory Location Before Start of Buffer |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
787 |
Out-of-bounds Write |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
798 |
Use of Hard-coded Credentials |
|
Major |
Observed_Examples |
|
Minor |
None |
805 |
Buffer Access with Incorrect Length Value |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
834 |
Excessive Iteration |
|
Major |
Demonstrative_Examples, Mapping_Notes |
|
Minor |
None |
835 |
Loop with Unreachable Exit Condition ('Infinite Loop') |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
863 |
Incorrect Authorization |
|
Major |
Taxonomy_Mappings |
|
Minor |
None |
915 |
Improperly Controlled Modification of Dynamically-Determined Object Attributes |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
916 |
Use of Password Hash With Insufficient Computational Effort |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
923 |
Improper Restriction of Communication Channel to Intended Endpoints |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
942 |
Permissive Cross-domain Policy with Untrusted Domains |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
943 |
Improper Neutralization of Special Elements in Data Query Logic |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1003 |
Weaknesses for Simplified Mapping of Published Vulnerabilities |
|
Major |
Description |
|
Minor |
None |
1041 |
Use of Redundant Code |
|
Major |
Mapping_Notes |
|
Minor |
None |
1042 |
Static Member Data Element outside of a Singleton Class Element |
|
Major |
Mapping_Notes |
|
Minor |
None |
1043 |
Data Element Aggregating an Excessively Large Number of Non-Primitive Elements |
|
Major |
Mapping_Notes |
|
Minor |
None |
1044 |
Architecture with Number of Horizontal Layers Outside of Expected Range |
|
Major |
Mapping_Notes |
|
Minor |
None |
1047 |
Modules with Circular Dependencies |
|
Major |
Mapping_Notes |
|
Minor |
None |
1048 |
Invokable Control Element with Large Number of Outward Calls |
|
Major |
Mapping_Notes |
|
Minor |
None |
1051 |
Initialization with Hard-Coded Network Resource Configuration Data |
|
Major |
Mapping_Notes |
|
Minor |
None |
1053 |
Missing Documentation for Design |
|
Major |
Mapping_Notes |
|
Minor |
None |
1054 |
Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer |
|
Major |
Mapping_Notes |
|
Minor |
None |
1055 |
Multiple Inheritance from Concrete Classes |
|
Major |
Mapping_Notes |
|
Minor |
None |
1056 |
Invokable Control Element with Variadic Parameters |
|
Major |
Mapping_Notes |
|
Minor |
None |
1057 |
Data Access Operations Outside of Expected Data Manager Component |
|
Major |
Mapping_Notes |
|
Minor |
None |
1059 |
Insufficient Technical Documentation |
|
Major |
Mapping_Notes |
|
Minor |
None |
1060 |
Excessive Number of Inefficient Server-Side Data Accesses |
|
Major |
Mapping_Notes |
|
Minor |
None |
1061 |
Insufficient Encapsulation |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1062 |
Parent Class with References to Child Class |
|
Major |
Mapping_Notes |
|
Minor |
None |
1063 |
Creation of Class Instance within a Static Code Block |
|
Major |
Mapping_Notes |
|
Minor |
None |
1064 |
Invokable Control Element with Signature Containing an Excessive Number of Parameters |
|
Major |
Mapping_Notes |
|
Minor |
None |
1065 |
Runtime Resource Management Control Element in a Component Built to Run on Application Servers |
|
Major |
Mapping_Notes |
|
Minor |
None |
1066 |
Missing Serialization Control Element |
|
Major |
Mapping_Notes |
|
Minor |
None |
1068 |
Inconsistency Between Implementation and Documented Design |
|
Major |
Mapping_Notes |
|
Minor |
None |
1069 |
Empty Exception Block |
|
Major |
Demonstrative_Examples, Mapping_Notes |
|
Minor |
None |
1070 |
Serializable Data Element Containing non-Serializable Item Elements |
|
Major |
Mapping_Notes, Relationships |
|
Minor |
None |
1071 |
Empty Code Block |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1072 |
Data Resource Access without Use of Connection Pooling |
|
Major |
Mapping_Notes |
|
Minor |
None |
1073 |
Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses |
|
Major |
Mapping_Notes |
|
Minor |
None |
1074 |
Class with Excessively Deep Inheritance |
|
Major |
Mapping_Notes |
|
Minor |
None |
1076 |
Insufficient Adherence to Expected Conventions |
|
Major |
Mapping_Notes, Relationships |
|
Minor |
None |
1078 |
Inappropriate Source Code Style or Formatting |
|
Major |
Demonstrative_Examples, Mapping_Notes |
|
Minor |
None |
1080 |
Source Code File with Excessive Number of Lines of Code |
|
Major |
Mapping_Notes |
|
Minor |
None |
1082 |
Class Instance Self Destruction Control Element |
|
Major |
Mapping_Notes |
|
Minor |
None |
1083 |
Data Access from Outside Expected Data Manager Component |
|
Major |
Mapping_Notes |
|
Minor |
None |
1084 |
Invokable Control Element with Excessive File or Data Access Operations |
|
Major |
Mapping_Notes |
|
Minor |
None |
1085 |
Invokable Control Element with Excessive Volume of Commented-out Code |
|
Major |
Mapping_Notes |
|
Minor |
None |
1086 |
Class with Excessive Number of Child Classes |
|
Major |
Mapping_Notes |
|
Minor |
None |
1090 |
Method Containing Access of a Member Element from Another Class |
|
Major |
Mapping_Notes |
|
Minor |
None |
1092 |
Use of Same Invokable Control Element in Multiple Architectural Layers |
|
Major |
Mapping_Notes |
|
Minor |
None |
1094 |
Excessive Index Range Scan for a Data Resource |
|
Major |
Mapping_Notes |
|
Minor |
None |
1095 |
Loop Condition Value Update within the Loop |
|
Major |
Mapping_Notes |
|
Minor |
None |
1097 |
Persistent Storable Data Element without Associated Comparison Control Element |
|
Major |
Mapping_Notes |
|
Minor |
None |
1099 |
Inconsistent Naming Conventions for Identifiers |
|
Major |
Mapping_Notes |
|
Minor |
None |
1101 |
Reliance on Runtime Component in Generated Code |
|
Major |
Mapping_Notes |
|
Minor |
None |
1103 |
Use of Platform-Dependent Third Party Components |
|
Major |
Mapping_Notes |
|
Minor |
None |
1105 |
Insufficient Encapsulation of Machine-Dependent Functionality |
|
Major |
Demonstrative_Examples, Mapping_Notes |
|
Minor |
None |
1106 |
Insufficient Use of Symbolic Constants |
|
Major |
Mapping_Notes |
|
Minor |
None |
1107 |
Insufficient Isolation of Symbolic Constant Definitions |
|
Major |
Mapping_Notes |
|
Minor |
None |
1109 |
Use of Same Variable for Multiple Purposes |
|
Major |
Mapping_Notes |
|
Minor |
None |
1110 |
Incomplete Design Documentation |
|
Major |
Mapping_Notes |
|
Minor |
None |
1111 |
Incomplete I/O Documentation |
|
Major |
Mapping_Notes |
|
Minor |
None |
1112 |
Incomplete Documentation of Program Execution |
|
Major |
Mapping_Notes |
|
Minor |
None |
1113 |
Inappropriate Comment Style |
|
Major |
Mapping_Notes |
|
Minor |
None |
1114 |
Inappropriate Whitespace Style |
|
Major |
Mapping_Notes |
|
Minor |
None |
1115 |
Source Code Element without Standard Prologue |
|
Major |
Mapping_Notes |
|
Minor |
None |
1117 |
Callable with Insufficient Behavioral Summary |
|
Major |
Mapping_Notes |
|
Minor |
None |
1118 |
Insufficient Documentation of Error Handling Techniques |
|
Major |
Mapping_Notes |
|
Minor |
None |
1119 |
Excessive Use of Unconditional Branching |
|
Major |
Mapping_Notes |
|
Minor |
None |
1121 |
Excessive McCabe Cyclomatic Complexity |
|
Major |
Mapping_Notes |
|
Minor |
None |
1122 |
Excessive Halstead Complexity |
|
Major |
Mapping_Notes |
|
Minor |
None |
1124 |
Excessively Deep Nesting |
|
Major |
Mapping_Notes |
|
Minor |
None |
1125 |
Excessive Attack Surface |
|
Major |
Mapping_Notes |
|
Minor |
None |
1164 |
Irrelevant Code |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1177 |
Use of Prohibited Code |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
1192 |
Improper Identifier for IP Block used in System-On-Chip (SOC) |
|
Major |
Name |
|
Minor |
None |
1198 |
Privilege Separation and Access Control Issues |
|
Major |
Relationships |
|
Minor |
None |
1201 |
Core and Compute Issues |
|
Major |
Relationships |
|
Minor |
None |
1202 |
Memory and Storage Issues |
|
Major |
Relationships |
|
Minor |
None |
1221 |
Incorrect Register Defaults or Module Parameters |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1234 |
Hardware Internal or Debug Modes Allow Override of Locks |
|
Major |
Demonstrative_Examples, References |
|
Minor |
None |
1239 |
Improper Zeroization of Hardware Register |
|
Major |
Demonstrative_Examples, References |
|
Minor |
None |
1242 |
Inclusion of Undocumented Features or Chicken Bits |
|
Major |
Taxonomy_Mappings |
|
Minor |
None |
1244 |
Internal Asset Exposed to Unsafe Debug Access Level or State |
|
Major |
Demonstrative_Examples, References |
|
Minor |
None |
1255 |
Comparison Logic is Vulnerable to Power Side-Channel Attacks |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1274 |
Improper Access Control for Volatile Memory Containing Boot Code |
|
Major |
Detection_Factors |
|
Minor |
None |
1298 |
Hardware Logic Contains Race Conditions |
|
Major |
Demonstrative_Examples, References |
|
Minor |
None |
1299 |
Missing Protection Mechanism for Alternate Hardware Interface |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1302 |
Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC) |
|
Major |
Description, Name |
|
Minor |
None |
1310 |
Missing Ability to Patch ROM Code |
|
Major |
Demonstrative_Examples, References |
|
Minor |
None |
1317 |
Improper Access Control in Fabric Bridge |
|
Major |
Demonstrative_Examples, References |
|
Minor |
None |
1321 |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1329 |
Reliance on Component That is Not Updateable |
|
Major |
Demonstrative_Examples, References |
|
Minor |
None |
1339 |
Insufficient Precision or Accuracy of a Real Number |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1342 |
Information Exposure through Microarchitectural State after Transient Execution |
|
Major |
Description |
|
Minor |
None |
1390 |
Weak Authentication |
|
Major |
Observed_Examples |
|
Minor |
None |
1391 |
Use of Weak Credentials |
|
Major |
Observed_Examples, References |
|
Minor |
None |
1416 |
Comprehensive Categorization: Resource Lifecycle Management |
|
Major |
Relationships |
|
Minor |
None |