20 |
Improper Input Validation |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
22 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
Major |
Relationships |
|
Minor |
None |
41 |
Improper Resolution of Path Equivalence |
|
Major |
None |
|
Minor |
Observed_Examples |
42 |
Path Equivalence: 'filename.' (Trailing Dot) |
|
Major |
None |
|
Minor |
Observed_Examples |
77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
|
Major |
Description, Observed_Examples, Relationships |
|
Minor |
None |
78 |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
|
Major |
Observed_Examples, Relationships |
|
Minor |
None |
79 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
|
Major |
Relationships |
|
Minor |
None |
89 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
|
Major |
Relationships |
|
Minor |
None |
94 |
Improper Control of Generation of Code ('Code Injection') |
|
Major |
Relationships |
|
Minor |
None |
103 |
Struts: Incomplete validate() Method Definition |
|
Major |
Background_Details, Description |
|
Minor |
None |
104 |
Struts: Form Bean Does Not Extend Validation Class |
|
Major |
Background_Details |
|
Minor |
None |
105 |
Struts: Form Field Without Validator |
|
Major |
Potential_Mitigations |
|
Minor |
None |
106 |
Struts: Plug-in Framework not in Use |
|
Major |
Potential_Mitigations |
|
Minor |
None |
119 |
Improper Restriction of Operations within the Bounds of a Memory Buffer |
|
Major |
Demonstrative_Examples, Observed_Examples, Potential_Mitigations, Relationships |
|
Minor |
None |
120 |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
|
Major |
Potential_Mitigations |
|
Minor |
None |
121 |
Stack-based Buffer Overflow |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
122 |
Heap-based Buffer Overflow |
|
Major |
Observed_Examples |
|
Minor |
None |
125 |
Out-of-bounds Read |
|
Major |
Observed_Examples, Relationships |
|
Minor |
None |
132 |
DEPRECATED: Miscalculated Null Termination |
|
Major |
Name |
|
Minor |
None |
171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
|
Major |
References |
|
Minor |
None |
189 |
Numeric Errors |
|
Major |
Relationships |
|
Minor |
None |
190 |
Integer Overflow or Wraparound |
|
Major |
Relationships |
|
Minor |
None |
200 |
Exposure of Sensitive Information to an Unauthorized Actor |
|
Major |
Relationships |
|
Minor |
None |
203 |
Observable Discrepancy |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
209 |
Generation of Error Message Containing Sensitive Information |
|
Major |
Relationships |
|
Minor |
None |
218 |
DEPRECATED: Failure to provide confidentiality for stored data |
|
Major |
Name |
|
Minor |
None |
225 |
DEPRECATED: General Information Management Problems |
|
Major |
Name |
|
Minor |
None |
247 |
DEPRECATED: Reliance on DNS Lookups in a Security Decision |
|
Major |
Name, References |
|
Minor |
None |
252 |
Unchecked Return Value |
|
Major |
Observed_Examples |
|
Minor |
None |
256 |
Plaintext Storage of a Password |
|
Major |
Description, Name, Relationships |
|
Minor |
None |
276 |
Incorrect Default Permissions |
|
Major |
Relationships |
|
Minor |
None |
284 |
Improper Access Control |
|
Major |
Observed_Examples |
|
Minor |
None |
285 |
Improper Authorization |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
287 |
Improper Authentication |
|
Major |
Relationships |
|
Minor |
None |
288 |
Authentication Bypass Using an Alternate Path or Channel |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
290 |
Authentication Bypass by Spoofing |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
292 |
DEPRECATED: Trusting Self-reported DNS Name |
|
Major |
Name |
|
Minor |
None |
295 |
Improper Certificate Validation |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
296 |
Improper Following of a Certificate's Chain of Trust |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
300 |
Channel Accessible by Non-Endpoint |
|
Major |
Alternate_Terms, Observed_Examples |
|
Minor |
None |
306 |
Missing Authentication for Critical Function |
|
Major |
Observed_Examples, Relationships |
|
Minor |
None |
318 |
Cleartext Storage of Sensitive Information in Executable |
|
Major |
Observed_Examples |
|
Minor |
None |
329 |
Generation of Predictable IV with CBC Mode |
|
Major |
Description, Maintenance_Notes, Name, References |
|
Minor |
None |
330 |
Use of Insufficiently Random Values |
|
Major |
Demonstrative_Examples, Maintenance_Notes, Observed_Examples |
|
Minor |
None |
331 |
Insufficient Entropy |
|
Major |
Maintenance_Notes, Observed_Examples |
|
Minor |
None |
332 |
Insufficient Entropy in PRNG |
|
Major |
Maintenance_Notes |
|
Minor |
None |
333 |
Improper Handling of Insufficient Entropy in TRNG |
|
Major |
Maintenance_Notes |
|
Minor |
None |
334 |
Small Space of Random Values |
|
Major |
Maintenance_Notes |
|
Minor |
None |
335 |
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) |
|
Major |
Description, Maintenance_Notes, Observed_Examples |
|
Minor |
Common_Consequences |
336 |
Same Seed in Pseudo-Random Number Generator (PRNG) |
|
Major |
Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Potential_Mitigations, References |
|
Minor |
None |
337 |
Predictable Seed in Pseudo-Random Number Generator (PRNG) |
|
Major |
Maintenance_Notes, Observed_Examples, Potential_Mitigations, References |
|
Minor |
None |
338 |
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) |
|
Major |
Maintenance_Notes |
|
Minor |
None |
339 |
Small Seed Space in PRNG |
|
Major |
Demonstrative_Examples, Description, Maintenance_Notes, Observed_Examples, Potential_Mitigations, References |
|
Minor |
None |
340 |
Generation of Predictable Numbers or Identifiers |
|
Major |
Maintenance_Notes |
|
Minor |
None |
341 |
Predictable from Observable State |
|
Major |
Maintenance_Notes |
|
Minor |
None |
342 |
Predictable Exact Value from Previous Values |
|
Major |
Maintenance_Notes |
|
Minor |
None |
343 |
Predictable Value Range from Previous Values |
|
Major |
Maintenance_Notes |
|
Minor |
None |
345 |
Insufficient Verification of Data Authenticity |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
352 |
Cross-Site Request Forgery (CSRF) |
|
Major |
Relationships |
|
Minor |
None |
353 |
Missing Support for Integrity Check |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
391 |
Unchecked Error Condition |
|
Major |
Relationships |
|
Minor |
None |
393 |
Return of Wrong Status Code |
|
Major |
Observed_Examples |
|
Minor |
None |
404 |
Improper Resource Shutdown or Release |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
407 |
Inefficient Algorithmic Complexity |
|
Major |
References |
|
Minor |
None |
416 |
Use After Free |
|
Major |
Relationships |
|
Minor |
None |
423 |
DEPRECATED: Proxied Trusted Channel |
|
Major |
Name |
|
Minor |
None |
425 |
Direct Request ('Forced Browsing') |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
434 |
Unrestricted Upload of File with Dangerous Type |
|
Major |
Relationships |
|
Minor |
None |
443 |
DEPRECATED: HTTP response splitting |
|
Major |
Name |
|
Minor |
None |
457 |
Use of Uninitialized Variable |
|
Major |
Observed_Examples |
|
Minor |
None |
476 |
NULL Pointer Dereference |
|
Major |
Relationships |
|
Minor |
None |
489 |
Active Debug Code |
|
Major |
Alternate_Terms |
|
Minor |
None |
494 |
Download of Code Without Integrity Check |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
502 |
Deserialization of Untrusted Data |
|
Major |
Relationships |
|
Minor |
None |
516 |
DEPRECATED: Covert Timing Channel |
|
Major |
Name |
|
Minor |
None |
522 |
Insufficiently Protected Credentials |
|
Major |
Relationships |
|
Minor |
None |
560 |
Use of umask() with chmod-style Argument |
|
Major |
Other_Notes |
|
Minor |
None |
561 |
Dead Code |
|
Major |
Observed_Examples |
|
Minor |
None |
598 |
Use of GET Request Method With Sensitive Query Strings |
|
Major |
Description |
|
Minor |
None |
611 |
Improper Restriction of XML External Entity Reference |
|
Major |
Relationships |
|
Minor |
None |
682 |
Incorrect Calculation |
|
Major |
Relationships |
|
Minor |
None |
693 |
Protection Mechanism Failure |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
703 |
Improper Check or Handling of Exceptional Conditions |
|
Major |
Relationships |
|
Minor |
None |
705 |
Incorrect Control Flow Scoping |
|
Major |
Observed_Examples |
|
Minor |
None |
732 |
Incorrect Permission Assignment for Critical Resource |
|
Major |
Observed_Examples, Relationships |
|
Minor |
None |
754 |
Improper Check for Unusual or Exceptional Conditions |
|
Major |
Relationships |
|
Minor |
None |
757 |
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') |
|
Major |
Observed_Examples |
|
Minor |
None |
760 |
Use of a One-Way Hash with a Predictable Salt |
|
Major |
Maintenance_Notes |
|
Minor |
None |
770 |
Allocation of Resources Without Limits or Throttling |
|
Major |
Observed_Examples |
|
Minor |
None |
787 |
Out-of-bounds Write |
|
Major |
Demonstrative_Examples, Potential_Mitigations, Relationships |
|
Minor |
None |
788 |
Access of Memory Location After End of Buffer |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
798 |
Use of Hard-coded Credentials |
|
Major |
Relationships |
|
Minor |
None |
805 |
Buffer Access with Incorrect Length Value |
|
Major |
Demonstrative_Examples, Potential_Mitigations |
|
Minor |
None |
806 |
Buffer Access Using Size of Source Buffer |
|
Major |
Potential_Mitigations |
|
Minor |
None |
833 |
Deadlock |
|
Major |
Observed_Examples |
|
Minor |
None |
834 |
Excessive Iteration |
|
Major |
Observed_Examples, Relationships |
|
Minor |
None |
835 |
Loop with Unreachable Exit Condition ('Infinite Loop') |
|
Major |
Observed_Examples |
|
Minor |
None |
862 |
Missing Authorization |
|
Major |
Observed_Examples, Related_Attack_Patterns, Relationships |
|
Minor |
None |
863 |
Incorrect Authorization |
|
Major |
Observed_Examples |
|
Minor |
None |
917 |
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') |
|
Major |
References |
|
Minor |
None |
918 |
Server-Side Request Forgery (SSRF) |
|
Major |
References, Related_Attack_Patterns, Relationships |
|
Minor |
None |
940 |
Improper Verification of Source of a Communication Channel |
|
Major |
Potential_Mitigations |
|
Minor |
None |
1022 |
Use of Web Link to Untrusted Target with window.opener Access |
|
Major |
Potential_Mitigations |
|
Minor |
None |
1188 |
Insecure Default Initialization of Resource |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1189 |
Improper Isolation of Shared Resources on System-on-a-Chip (SoC) |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1204 |
Generation of Weak Initialization Vector (IV) |
|
Major |
Maintenance_Notes, Observed_Examples, References |
|
Minor |
None |
1205 |
Security Primitives and Cryptography Issues |
|
Major |
Relationships |
|
Minor |
None |
1220 |
Insufficient Granularity of Access Control |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1221 |
Incorrect Register Defaults or Module Parameters |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1240 |
Use of a Risky Cryptographic Primitive |
|
Major |
Maintenance_Notes, Research_Gaps |
|
Minor |
None |
1241 |
Use of Predictable Algorithm in Random Number Generator |
|
Major |
Maintenance_Notes |
|
Minor |
None |
1243 |
Sensitive Non-Volatile Information Not Protected During Debug |
|
Major |
Relationships |
|
Minor |
None |
1246 |
Improper Write Handling in Limited-write Non-Volatile Memories |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1253 |
Incorrect Selection of Fuse Values |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1254 |
Incorrect Comparison Logic Granularity |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1255 |
Comparison Logic is Vulnerable to Power Side-Channel Attacks |
|
Major |
Demonstrative_Examples, Modes_of_Introduction, Observed_Examples, Potential_Mitigations, References, Related_Attack_Patterns |
|
Minor |
None |
1256 |
Hardware Features Enable Physical Attacks from Software |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
1263 |
Improper Physical Access Control |
|
Major |
Relationships |
|
Minor |
None |
1264 |
Hardware Logic with Insecure De-Synchronization between Control and Data Channels |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1267 |
Policy Uses Obsolete Encoding |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1270 |
Generation of Incorrect Security Tokens |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1277 |
Firmware Not Updateable |
|
Major |
Demonstrative_Examples, Maintenance_Notes |
|
Minor |
None |
1281 |
Sequence of Processor Instructions Leads to Unexpected Behavior |
|
Major |
Name, Observed_Examples |
|
Minor |
None |
1282 |
Assumed-Immutable Data is Stored in Writable Memory |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1290 |
Incorrect Decoding of Security Identifiers |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1292 |
Incorrect Conversion of Security Identifiers |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1294 |
Insecure Security Identifier Mechanism |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1295 |
Debug Messages Revealing Unnecessary Information |
|
Major |
Observed_Examples, Related_Attack_Patterns, Relationships |
|
Minor |
None |
1296 |
Incorrect Chaining or Granularity of Debug Components |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1297 |
Unprotected Confidential Information on Device is Accessible by OSAT Vendors |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1298 |
Hardware Logic Contains Race Conditions |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1299 |
Missing Protection Mechanism for Alternate Hardware Interface |
|
Major |
Observed_Examples, Related_Attack_Patterns |
|
Minor |
None |
1300 |
Improper Protection Against Physical Side Channels |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1301 |
Insufficient or Incomplete Data Removal within Hardware Component |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1302 |
Missing Security Identifier |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1304 |
Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1310 |
Missing Ability to Patch ROM Code |
|
Major |
Demonstrative_Examples, Maintenance_Notes |
|
Minor |
None |
1325 |
Improperly Controlled Sequential Memory Allocation |
|
Major |
Observed_Examples |
|
Minor |
None |
1328 |
Security Version Number Mutable to Older Versions |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1329 |
Reliance on Component That is Not Updateable |
|
Major |
Demonstrative_Examples, Description, References |
|
Minor |
None |
1333 |
Inefficient Regular Expression Complexity |
|
Major |
References |
|
Minor |
None |