5 |
J2EE Misconfiguration: Data Transmission Without Encryption |
|
Major |
Potential_Mitigations |
|
Minor |
None |
7 |
J2EE Misconfiguration: Missing Custom Error Page |
|
Major |
Description |
|
Minor |
None |
9 |
J2EE Misconfiguration: Weak Access Permissions for EJB Methods |
|
Major |
Description |
|
Minor |
None |
15 |
External Control of System or Configuration Setting |
|
Major |
Applicable_Platforms, Related_Attack_Patterns, Relationships |
|
Minor |
None |
22 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
Major |
Common_Consequences, Description, Detection_Factors |
|
Minor |
None |
23 |
Relative Path Traversal |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
24 |
Path Traversal: '../filedir' |
|
Major |
Description |
|
Minor |
None |
25 |
Path Traversal: '/../filedir' |
|
Major |
Description |
|
Minor |
None |
26 |
Path Traversal: '/dir/../filename' |
|
Major |
Description |
|
Minor |
None |
27 |
Path Traversal: 'dir/../../filename' |
|
Major |
Description |
|
Minor |
None |
28 |
Path Traversal: '..\filedir' |
|
Major |
Description |
|
Minor |
None |
29 |
Path Traversal: '\..\filename' |
|
Major |
Description |
|
Minor |
None |
30 |
Path Traversal: '\dir\..\filename' |
|
Major |
Description |
|
Minor |
None |
31 |
Path Traversal: 'dir\..\..\filename' |
|
Major |
Description |
|
Minor |
None |
32 |
Path Traversal: '...' (Triple Dot) |
|
Major |
Description |
|
Minor |
None |
33 |
Path Traversal: '....' (Multiple Dot) |
|
Major |
Description |
|
Minor |
None |
34 |
Path Traversal: '....//' |
|
Major |
Description |
|
Minor |
None |
35 |
Path Traversal: '.../...//' |
|
Major |
Description |
|
Minor |
None |
36 |
Absolute Path Traversal |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
37 |
Path Traversal: '/absolute/pathname/here' |
|
Major |
Description |
|
Minor |
None |
38 |
Path Traversal: '\absolute\pathname\here' |
|
Major |
Description |
|
Minor |
None |
39 |
Path Traversal: 'C:dirname' |
|
Major |
Description |
|
Minor |
None |
40 |
Path Traversal: '\\UNC\share\name\' (Windows UNC Share) |
|
Major |
Description |
|
Minor |
None |
41 |
Improper Resolution of Path Equivalence |
|
Major |
Description |
|
Minor |
None |
42 |
Path Equivalence: 'filename.' (Trailing Dot) |
|
Major |
Description |
|
Minor |
None |
43 |
Path Equivalence: 'filename....' (Multiple Trailing Dot) |
|
Major |
Description |
|
Minor |
None |
44 |
Path Equivalence: 'file.name' (Internal Dot) |
|
Major |
Description |
|
Minor |
None |
45 |
Path Equivalence: 'file...name' (Multiple Internal Dot) |
|
Major |
Description |
|
Minor |
None |
46 |
Path Equivalence: 'filename ' (Trailing Space) |
|
Major |
Description |
|
Minor |
None |
47 |
Path Equivalence: ' filename' (Leading Space) |
|
Major |
Description |
|
Minor |
None |
48 |
Path Equivalence: 'file name' (Internal Whitespace) |
|
Major |
Description |
|
Minor |
None |
49 |
Path Equivalence: 'filename/' (Trailing Slash) |
|
Major |
Description |
|
Minor |
None |
50 |
Path Equivalence: '//multiple/leading/slash' |
|
Major |
Description |
|
Minor |
None |
51 |
Path Equivalence: '/multiple//internal/slash' |
|
Major |
Description |
|
Minor |
None |
52 |
Path Equivalence: '/multiple/trailing/slash//' |
|
Major |
Description |
|
Minor |
None |
53 |
Path Equivalence: '\multiple\\internal\backslash' |
|
Major |
Description |
|
Minor |
None |
54 |
Path Equivalence: 'filedir\' (Trailing Backslash) |
|
Major |
Description |
|
Minor |
None |
55 |
Path Equivalence: '/./' (Single Dot Directory) |
|
Major |
Description |
|
Minor |
None |
56 |
Path Equivalence: 'filedir*' (Wildcard) |
|
Major |
Description |
|
Minor |
None |
57 |
Path Equivalence: 'fakedir/../realdir/filename' |
|
Major |
Description |
|
Minor |
None |
58 |
Path Equivalence: Windows 8.3 Filename |
|
Major |
Description |
|
Minor |
None |
59 |
Improper Link Resolution Before File Access ('Link Following') |
|
Major |
Description |
|
Minor |
None |
61 |
UNIX Symbolic Link (Symlink) Following |
|
Major |
Description |
|
Minor |
None |
62 |
UNIX Hard Link |
|
Major |
Description |
|
Minor |
None |
64 |
Windows Shortcut Following (.LNK) |
|
Major |
Description |
|
Minor |
None |
65 |
Windows Hard Link |
|
Major |
Description |
|
Minor |
None |
67 |
Improper Handling of Windows Device Names |
|
Major |
Description |
|
Minor |
None |
69 |
Improper Handling of Windows ::DATA Alternate Data Stream |
|
Major |
Description |
|
Minor |
None |
72 |
Improper Handling of Apple HFS+ Alternate Data Stream Path |
|
Major |
Description |
|
Minor |
None |
73 |
External Control of File Name or Path |
|
Major |
Description, Detection_Factors, Potential_Mitigations |
|
Minor |
None |
74 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
|
Major |
Description |
|
Minor |
None |
75 |
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) |
|
Major |
Description |
|
Minor |
None |
76 |
Improper Neutralization of Equivalent Special Elements |
|
Major |
Description |
|
Minor |
None |
77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
78 |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
79 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
|
Major |
Alternate_Terms, Demonstrative_Examples, Description |
|
Minor |
None |
80 |
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) |
|
Major |
Description |
|
Minor |
None |
81 |
Improper Neutralization of Script in an Error Message Web Page |
|
Major |
Description |
|
Minor |
None |
83 |
Improper Neutralization of Script in Attributes in a Web Page |
|
Major |
Description |
|
Minor |
None |
86 |
Improper Neutralization of Invalid Characters in Identifiers in Web Pages |
|
Major |
Description |
|
Minor |
None |
87 |
Improper Neutralization of Alternate XSS Syntax |
|
Major |
Description |
|
Minor |
None |
88 |
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
89 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
|
Major |
Demonstrative_Examples, Description |
|
Minor |
None |
90 |
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
|
Major |
Description |
|
Minor |
None |
91 |
XML Injection (aka Blind XPath Injection) |
|
Major |
Description |
|
Minor |
None |
93 |
Improper Neutralization of CRLF Sequences ('CRLF Injection') |
|
Major |
Description |
|
Minor |
None |
94 |
Improper Control of Generation of Code ('Code Injection') |
|
Major |
Demonstrative_Examples, Description, Potential_Mitigations, Relationships |
|
Minor |
None |
95 |
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') |
|
Major |
Demonstrative_Examples, Description |
|
Minor |
None |
96 |
Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') |
|
Major |
Description |
|
Minor |
None |
97 |
Improper Neutralization of Server-Side Includes (SSI) Within a Web Page |
|
Major |
Description |
|
Minor |
None |
98 |
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') |
|
Major |
Description, Detection_Factors |
|
Minor |
None |
99 |
Improper Control of Resource Identifiers ('Resource Injection') |
|
Major |
Description |
|
Minor |
None |
102 |
Struts: Duplicate Validation Forms |
|
Major |
Demonstrative_Examples, Description |
|
Minor |
None |
103 |
Struts: Incomplete validate() Method Definition |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
105 |
Struts: Form Field Without Validator |
|
Major |
Description, Modes_of_Introduction |
|
Minor |
None |
112 |
Missing XML Validation |
|
Major |
Description |
|
Minor |
None |
113 |
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') |
|
Major |
Description |
|
Minor |
None |
114 |
Process Control |
|
Major |
Description, Maintenance_Notes, Related_Attack_Patterns |
|
Minor |
None |
115 |
Misinterpretation of Input |
|
Major |
Description |
|
Minor |
None |
116 |
Improper Encoding or Escaping of Output |
|
Major |
Description |
|
Minor |
None |
117 |
Improper Output Neutralization for Logs |
|
Major |
Description |
|
Minor |
None |
118 |
Incorrect Access of Indexable Resource ('Range Error') |
|
Major |
Description |
|
Minor |
None |
119 |
Improper Restriction of Operations within the Bounds of a Memory Buffer |
|
Major |
Alternate_Terms, Description |
|
Minor |
None |
120 |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
124 |
Buffer Underwrite ('Buffer Underflow') |
|
Major |
Description |
|
Minor |
None |
125 |
Out-of-bounds Read |
|
Major |
Description |
|
Minor |
None |
126 |
Buffer Over-read |
|
Major |
Description |
|
Minor |
None |
127 |
Buffer Under-read |
|
Major |
Description |
|
Minor |
None |
130 |
Improper Handling of Length Parameter Inconsistency |
|
Major |
Description |
|
Minor |
None |
131 |
Incorrect Calculation of Buffer Size |
|
Major |
Description |
|
Minor |
None |
134 |
Use of Externally-Controlled Format String |
|
Major |
Description |
|
Minor |
None |
135 |
Incorrect Calculation of Multi-Byte String Length |
|
Major |
Description |
|
Minor |
None |
138 |
Improper Neutralization of Special Elements |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
140 |
Improper Neutralization of Delimiters |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
141 |
Improper Neutralization of Parameter/Argument Delimiters |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
142 |
Improper Neutralization of Value Delimiters |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
143 |
Improper Neutralization of Record Delimiters |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
144 |
Improper Neutralization of Line Delimiters |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
145 |
Improper Neutralization of Section Delimiters |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
146 |
Improper Neutralization of Expression/Command Delimiters |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
147 |
Improper Neutralization of Input Terminators |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
148 |
Improper Neutralization of Input Leaders |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
149 |
Improper Neutralization of Quoting Syntax |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
150 |
Improper Neutralization of Escape, Meta, or Control Sequences |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
151 |
Improper Neutralization of Comment Delimiters |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
152 |
Improper Neutralization of Macro Symbols |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
153 |
Improper Neutralization of Substitution Characters |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
154 |
Improper Neutralization of Variable Name Delimiters |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
155 |
Improper Neutralization of Wildcards or Matching Symbols |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
156 |
Improper Neutralization of Whitespace |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
157 |
Failure to Sanitize Paired Delimiters |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
158 |
Improper Neutralization of Null Byte or NUL Character |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
160 |
Improper Neutralization of Leading Special Elements |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
161 |
Improper Neutralization of Multiple Leading Special Elements |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
162 |
Improper Neutralization of Trailing Special Elements |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
163 |
Improper Neutralization of Multiple Trailing Special Elements |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
164 |
Improper Neutralization of Internal Special Elements |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
165 |
Improper Neutralization of Multiple Internal Special Elements |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
166 |
Improper Handling of Missing Special Element |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
167 |
Improper Handling of Additional Special Element |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
168 |
Improper Handling of Inconsistent Special Elements |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
170 |
Improper Null Termination |
|
Major |
Description |
|
Minor |
None |
172 |
Encoding Error |
|
Major |
Description |
|
Minor |
None |
173 |
Improper Handling of Alternate Encoding |
|
Major |
Description |
|
Minor |
None |
174 |
Double Decoding of the Same Data |
|
Major |
Description |
|
Minor |
None |
175 |
Improper Handling of Mixed Encoding |
|
Major |
Description |
|
Minor |
None |
176 |
Improper Handling of Unicode Encoding |
|
Major |
Description |
|
Minor |
None |
177 |
Improper Handling of URL Encoding (Hex Encoding) |
|
Major |
Description |
|
Minor |
None |
178 |
Improper Handling of Case Sensitivity |
|
Major |
Description |
|
Minor |
None |
179 |
Incorrect Behavior Order: Early Validation |
|
Major |
Description |
|
Minor |
None |
180 |
Incorrect Behavior Order: Validate Before Canonicalize |
|
Major |
Description |
|
Minor |
None |
181 |
Incorrect Behavior Order: Validate Before Filter |
|
Major |
Description |
|
Minor |
None |
182 |
Collapse of Data into Unsafe Value |
|
Major |
Description |
|
Minor |
None |
185 |
Incorrect Regular Expression |
|
Major |
Description |
|
Minor |
None |
187 |
Partial String Comparison |
|
Major |
Description |
|
Minor |
None |
188 |
Reliance on Data/Memory Layout |
|
Major |
Description |
|
Minor |
None |
190 |
Integer Overflow or Wraparound |
|
Major |
Description, Detection_Factors |
|
Minor |
None |
194 |
Unexpected Sign Extension |
|
Major |
Description |
|
Minor |
None |
195 |
Signed to Unsigned Conversion Error |
|
Major |
Description |
|
Minor |
None |
196 |
Unsigned to Signed Conversion Error |
|
Major |
Description |
|
Minor |
None |
198 |
Use of Incorrect Byte Ordering |
|
Major |
Description |
|
Minor |
None |
204 |
Observable Response Discrepancy |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
205 |
Observable Behavioral Discrepancy |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
208 |
Observable Timing Discrepancy |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
209 |
Generation of Error Message Containing Sensitive Information |
|
Major |
Description |
|
Minor |
None |
210 |
Self-generated Error Message Containing Sensitive Information |
|
Major |
Description |
|
Minor |
None |
211 |
Externally-Generated Error Message Containing Sensitive Information |
|
Major |
Description |
|
Minor |
None |
212 |
Improper Removal of Sensitive Information Before Storage or Transfer |
|
Major |
Description |
|
Minor |
None |
214 |
Invocation of Process Using Visible Sensitive Information |
|
Major |
Description, Observed_Examples, Relationships |
|
Minor |
None |
215 |
Insertion of Sensitive Information Into Debugging Code |
|
Major |
Description |
|
Minor |
None |
219 |
Storage of File with Sensitive Data Under Web Root |
|
Major |
Description |
|
Minor |
None |
220 |
Storage of File With Sensitive Data Under FTP Root |
|
Major |
Description |
|
Minor |
None |
221 |
Information Loss or Omission |
|
Major |
Description |
|
Minor |
None |
222 |
Truncation of Security-relevant Information |
|
Major |
Description |
|
Minor |
None |
223 |
Omission of Security-relevant Information |
|
Major |
Description |
|
Minor |
None |
224 |
Obscured Security-relevant Information by Alternate Name |
|
Major |
Description |
|
Minor |
None |
229 |
Improper Handling of Values |
|
Major |
Description |
|
Minor |
None |
230 |
Improper Handling of Missing Values |
|
Major |
Description |
|
Minor |
None |
231 |
Improper Handling of Extra Values |
|
Major |
Description |
|
Minor |
None |
232 |
Improper Handling of Undefined Values |
|
Major |
Description |
|
Minor |
None |
233 |
Improper Handling of Parameters |
|
Major |
Description |
|
Minor |
None |
235 |
Improper Handling of Extra Parameters |
|
Major |
Description |
|
Minor |
None |
236 |
Improper Handling of Undefined Parameters |
|
Major |
Description |
|
Minor |
None |
237 |
Improper Handling of Structural Elements |
|
Major |
Description |
|
Minor |
None |
238 |
Improper Handling of Incomplete Structural Elements |
|
Major |
Description |
|
Minor |
None |
239 |
Failure to Handle Incomplete Element |
|
Major |
Description |
|
Minor |
None |
240 |
Improper Handling of Inconsistent Structural Elements |
|
Major |
Description |
|
Minor |
None |
241 |
Improper Handling of Unexpected Data Type |
|
Major |
Description |
|
Minor |
None |
242 |
Use of Inherently Dangerous Function |
|
Major |
Description |
|
Minor |
None |
243 |
Creation of chroot Jail Without Changing Working Directory |
|
Major |
Description |
|
Minor |
None |
250 |
Execution with Unnecessary Privileges |
|
Major |
Description, Maintenance_Notes, Taxonomy_Mappings |
|
Minor |
None |
252 |
Unchecked Return Value |
|
Major |
Description |
|
Minor |
None |
253 |
Incorrect Check of Function Return Value |
|
Major |
Description |
|
Minor |
None |
256 |
Plaintext Storage of a Password |
|
Major |
Applicable_Platforms |
|
Minor |
None |
259 |
Use of Hard-coded Password |
|
Major |
Applicable_Platforms, Description |
|
Minor |
None |
260 |
Password in Configuration File |
|
Major |
Description |
|
Minor |
None |
261 |
Weak Encoding for Password |
|
Major |
Relationships |
|
Minor |
None |
269 |
Improper Privilege Management |
|
Major |
Description |
|
Minor |
None |
270 |
Privilege Context Switching Error |
|
Major |
Description |
|
Minor |
None |
271 |
Privilege Dropping / Lowering Errors |
|
Major |
Description |
|
Minor |
None |
273 |
Improper Check for Dropped Privileges |
|
Major |
Description |
|
Minor |
None |
274 |
Improper Handling of Insufficient Privileges |
|
Major |
Description, Relationships, Theoretical_Notes |
|
Minor |
None |
275 |
Permission Issues |
|
Major |
Terminology_Notes |
|
Minor |
None |
276 |
Incorrect Default Permissions |
|
Major |
Applicable_Platforms |
|
Minor |
None |
279 |
Incorrect Execution-Assigned Permissions |
|
Major |
Description |
|
Minor |
None |
280 |
Improper Handling of Insufficient Permissions or Privileges |
|
Major |
Description |
|
Minor |
None |
281 |
Improper Preservation of Permissions |
|
Major |
Description |
|
Minor |
None |
282 |
Improper Ownership Management |
|
Major |
Description |
|
Minor |
None |
283 |
Unverified Ownership |
|
Major |
Description |
|
Minor |
None |
284 |
Improper Access Control |
|
Major |
Applicable_Platforms, Description, Observed_Examples, Relationships |
|
Minor |
None |
285 |
Improper Authorization |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
286 |
Incorrect User Management |
|
Major |
Description |
|
Minor |
None |
287 |
Improper Authentication |
|
Major |
Description, Maintenance_Notes, Observed_Examples, Taxonomy_Mappings |
|
Minor |
None |
289 |
Authentication Bypass by Alternate Name |
|
Major |
Description, Type |
|
Minor |
None |
290 |
Authentication Bypass by Spoofing |
|
Major |
Description |
|
Minor |
None |
291 |
Reliance on IP Address for Authentication |
|
Major |
Description |
|
Minor |
None |
294 |
Authentication Bypass by Capture-replay |
|
Major |
Description, Related_Attack_Patterns |
|
Minor |
None |
295 |
Improper Certificate Validation |
|
Major |
Description, Modes_of_Introduction |
|
Minor |
None |
296 |
Improper Following of a Certificate's Chain of Trust |
|
Major |
Description, Modes_of_Introduction |
|
Minor |
None |
297 |
Improper Validation of Certificate with Host Mismatch |
|
Major |
Applicable_Platforms, Description, Detection_Factors, Modes_of_Introduction |
|
Minor |
None |
299 |
Improper Check for Certificate Revocation |
|
Major |
Demonstrative_Examples, Description, Modes_of_Introduction |
|
Minor |
None |
300 |
Channel Accessible by Non-Endpoint |
|
Major |
Relationships |
|
Minor |
None |
301 |
Reflection Attack in an Authentication Protocol |
|
Major |
Type |
|
Minor |
None |
302 |
Authentication Bypass by Assumed-Immutable Data |
|
Major |
Type |
|
Minor |
None |
303 |
Incorrect Implementation of Authentication Algorithm |
|
Major |
Description, Relationships |
|
Minor |
None |
304 |
Missing Critical Step in Authentication |
|
Major |
Description, Relationships |
|
Minor |
None |
306 |
Missing Authentication for Critical Function |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
311 |
Missing Encryption of Sensitive Data |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
312 |
Cleartext Storage of Sensitive Information |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, References, Relationships |
|
Minor |
None |
313 |
Cleartext Storage in a File or on Disk |
|
Major |
Description |
|
Minor |
None |
314 |
Cleartext Storage in the Registry |
|
Major |
Description |
|
Minor |
None |
315 |
Cleartext Storage of Sensitive Information in a Cookie |
|
Major |
Description |
|
Minor |
None |
316 |
Cleartext Storage of Sensitive Information in Memory |
|
Major |
Description |
|
Minor |
None |
317 |
Cleartext Storage of Sensitive Information in GUI |
|
Major |
Description |
|
Minor |
None |
318 |
Cleartext Storage of Sensitive Information in Executable |
|
Major |
Description |
|
Minor |
None |
319 |
Cleartext Transmission of Sensitive Information |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Potential_Mitigations, References, Relationships, Taxonomy_Mappings |
|
Minor |
None |
320 |
Key Management Errors |
|
Major |
Maintenance_Notes |
|
Minor |
None |
321 |
Use of Hard-coded Cryptographic Key |
|
Major |
Applicable_Platforms, Maintenance_Notes, Taxonomy_Mappings |
|
Minor |
None |
322 |
Key Exchange without Entity Authentication |
|
Major |
Description, Relationships |
|
Minor |
None |
326 |
Inadequate Encryption Strength |
|
Major |
Description, Relationships |
|
Minor |
None |
327 |
Use of a Broken or Risky Cryptographic Algorithm |
|
Major |
Applicable_Platforms, Background_Details, Demonstrative_Examples, Description, Maintenance_Notes, Modes_of_Introduction, Observed_Examples, Potential_Mitigations, References, Taxonomy_Mappings, Time_of_Introduction |
|
Minor |
None |
328 |
Use of Weak Hash |
|
Major |
Applicable_Platforms |
|
Minor |
None |
329 |
Generation of Predictable IV with CBC Mode |
|
Major |
Applicable_Platforms |
|
Minor |
None |
330 |
Use of Insufficiently Random Values |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
331 |
Insufficient Entropy |
|
Major |
Description |
|
Minor |
None |
335 |
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) |
|
Major |
Description |
|
Minor |
None |
343 |
Predictable Value Range from Previous Values |
|
Major |
Description |
|
Minor |
None |
345 |
Insufficient Verification of Data Authenticity |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Observed_Examples, References, Related_Attack_Patterns |
|
Minor |
None |
346 |
Origin Validation Error |
|
Major |
Description, Type |
|
Minor |
None |
347 |
Improper Verification of Cryptographic Signature |
|
Major |
Description |
|
Minor |
None |
348 |
Use of Less Trusted Source |
|
Major |
Description |
|
Minor |
None |
349 |
Acceptance of Extraneous Untrusted Data With Trusted Data |
|
Major |
Description |
|
Minor |
None |
350 |
Reliance on Reverse DNS Resolution for a Security-Critical Action |
|
Major |
Description |
|
Minor |
None |
351 |
Insufficient Type Distinction |
|
Major |
Description |
|
Minor |
None |
353 |
Missing Support for Integrity Check |
|
Major |
Description |
|
Minor |
None |
354 |
Improper Validation of Integrity Check Value |
|
Major |
Description |
|
Minor |
None |
356 |
Product UI does not Warn User of Unsafe Actions |
|
Major |
Description |
|
Minor |
None |
358 |
Improperly Implemented Security Check for Standard |
|
Major |
Description |
|
Minor |
None |
359 |
Exposure of Private Personal Information to an Unauthorized Actor |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
362 |
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
|
Major |
Applicable_Platforms, Common_Consequences, Description |
|
Minor |
None |
363 |
Race Condition Enabling Link Following |
|
Major |
Description |
|
Minor |
None |
364 |
Signal Handler Race Condition |
|
Major |
Description |
|
Minor |
None |
367 |
Time-of-check Time-of-use (TOCTOU) Race Condition |
|
Major |
Description |
|
Minor |
None |
370 |
Missing Check for Certificate Revocation after Initial Check |
|
Major |
Description |
|
Minor |
None |
372 |
Incomplete Internal State Distinction |
|
Major |
Description |
|
Minor |
None |
374 |
Passing Mutable Objects to an Untrusted Method |
|
Major |
Description |
|
Minor |
None |
377 |
Insecure Temporary File |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
379 |
Creation of Temporary File in Directory with Insecure Permissions |
|
Major |
Description |
|
Minor |
None |
390 |
Detection of Error Condition Without Action |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
392 |
Missing Report of Error Condition |
|
Major |
Description |
|
Minor |
None |
393 |
Return of Wrong Status Code |
|
Major |
Description |
|
Minor |
None |
394 |
Unexpected Status Code or Return Value |
|
Major |
Description |
|
Minor |
None |
400 |
Uncontrolled Resource Consumption |
|
Major |
Common_Consequences, Description, Detection_Factors, Maintenance_Notes, Related_Attack_Patterns, Taxonomy_Mappings |
|
Minor |
None |
401 |
Missing Release of Memory after Effective Lifetime |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
402 |
Transmission of Private Resources into a New Sphere ('Resource Leak') |
|
Major |
Description |
|
Minor |
None |
404 |
Improper Resource Shutdown or Release |
|
Major |
Description, Detection_Factors |
|
Minor |
None |
405 |
Asymmetric Resource Consumption (Amplification) |
|
Major |
Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Description, Observed_Examples, Potential_Mitigations, References, Time_of_Introduction |
|
Minor |
None |
406 |
Insufficient Control of Network Message Volume (Network Amplification) |
|
Major |
Description |
|
Minor |
None |
407 |
Inefficient Algorithmic Complexity |
|
Major |
Demonstrative_Examples, Observed_Examples, References |
|
Minor |
None |
408 |
Incorrect Behavior Order: Early Amplification |
|
Major |
Demonstrative_Examples, Description |
|
Minor |
None |
409 |
Improper Handling of Highly Compressed Data (Data Amplification) |
|
Major |
Description |
|
Minor |
None |
410 |
Insufficient Resource Pool |
|
Major |
Description |
|
Minor |
None |
412 |
Unrestricted Externally Accessible Lock |
|
Major |
Description |
|
Minor |
None |
413 |
Improper Resource Locking |
|
Major |
Description |
|
Minor |
None |
419 |
Unprotected Primary Channel |
|
Major |
Description |
|
Minor |
None |
420 |
Unprotected Alternate Channel |
|
Major |
Description |
|
Minor |
None |
422 |
Unprotected Windows Messaging Channel ('Shatter') |
|
Major |
Description |
|
Minor |
None |
425 |
Direct Request ('Forced Browsing') |
|
Major |
Observed_Examples, Related_Attack_Patterns |
|
Minor |
None |
426 |
Untrusted Search Path |
|
Major |
Description |
|
Minor |
None |
427 |
Uncontrolled Search Path Element |
|
Major |
Description, Observed_Examples, References |
|
Minor |
None |
432 |
Dangerous Signal Handler not Disabled During Sensitive Operations |
|
Major |
Description |
|
Minor |
None |
433 |
Unparsed Raw Web Content Delivery |
|
Major |
Description |
|
Minor |
None |
434 |
Unrestricted Upload of File with Dangerous Type |
|
Major |
Alternate_Terms, Description |
|
Minor |
None |
440 |
Expected Behavior Violation |
|
Major |
Applicable_Platforms, Relationships |
|
Minor |
None |
446 |
UI Discrepancy for Security Feature |
|
Major |
Description |
|
Minor |
None |
451 |
User Interface (UI) Misrepresentation of Critical Information |
|
Major |
Description, Related_Attack_Patterns |
|
Minor |
None |
453 |
Insecure Default Variable Initialization |
|
Major |
Description |
|
Minor |
None |
454 |
External Initialization of Trusted Variables or Data Stores |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
455 |
Non-exit on Failed Initialization |
|
Major |
Description |
|
Minor |
None |
456 |
Missing Initialization of a Variable |
|
Major |
Description |
|
Minor |
None |
459 |
Incomplete Cleanup |
|
Major |
Description |
|
Minor |
None |
469 |
Use of Pointer Subtraction to Determine Size |
|
Major |
Description |
|
Minor |
None |
470 |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |
|
Major |
Common_Consequences, Demonstrative_Examples, Description, Related_Attack_Patterns, Relationships |
|
Minor |
None |
471 |
Modification of Assumed-Immutable Data (MAID) |
|
Major |
Description |
|
Minor |
None |
479 |
Signal Handler Use of a Non-reentrant Function |
|
Major |
Description |
|
Minor |
None |
480 |
Use of Incorrect Operator |
|
Major |
Description, Observed_Examples |
|
Minor |
None |
484 |
Omitted Break Statement in Switch |
|
Major |
Description, Detection_Factors |
|
Minor |
None |
486 |
Comparison of Classes by Name |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
489 |
Active Debug Code |
|
Major |
Applicable_Platforms, Description, Relationships |
|
Minor |
None |
494 |
Download of Code Without Integrity Check |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
497 |
Exposure of Sensitive System Information to an Unauthorized Control Sphere |
|
Major |
Description, Relationships |
|
Minor |
None |
502 |
Deserialization of Untrusted Data |
|
Major |
Description |
|
Minor |
None |
506 |
Embedded Malicious Code |
|
Major |
Description, Related_Attack_Patterns |
|
Minor |
None |
507 |
Trojan Horse |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
508 |
Non-Replicating Malicious Code |
|
Major |
Description |
|
Minor |
None |
509 |
Replicating Malicious Code (Virus or Worm) |
|
Major |
Description |
|
Minor |
None |
511 |
Logic/Time Bomb |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
512 |
Spyware |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
522 |
Insufficiently Protected Credentials |
|
Major |
Applicable_Platforms, Observed_Examples, Relationships |
|
Minor |
None |
526 |
Cleartext Storage of Sensitive Information in an Environment Variable |
|
Major |
Description, Name, Observed_Examples, Potential_Mitigations, References, Relationships |
|
Minor |
None |
543 |
Use of Singleton Pattern Without Synchronization in a Multithreaded Context |
|
Major |
Description |
|
Minor |
None |
544 |
Missing Standardized Error Handling Mechanism |
|
Major |
Description |
|
Minor |
None |
547 |
Use of Hard-coded, Security-relevant Constants |
|
Major |
Description |
|
Minor |
None |
549 |
Missing Password Field Masking |
|
Major |
Description |
|
Minor |
None |
552 |
Files or Directories Accessible to External Parties |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Potential_Mitigations, References |
|
Minor |
None |
558 |
Use of getlogin() in Multithreaded Application |
|
Major |
Description |
|
Minor |
None |
561 |
Dead Code |
|
Major |
Description |
|
Minor |
None |
565 |
Reliance on Cookies without Validation and Integrity Checking |
|
Major |
Description |
|
Minor |
None |
566 |
Authorization Bypass Through User-Controlled SQL Primary Key |
|
Major |
Description |
|
Minor |
None |
568 |
finalize() Method Without super.finalize() |
|
Major |
Description |
|
Minor |
None |
570 |
Expression is Always False |
|
Major |
Description |
|
Minor |
None |
571 |
Expression is Always True |
|
Major |
Description |
|
Minor |
None |
572 |
Call to Thread run() instead of start() |
|
Major |
Description |
|
Minor |
None |
573 |
Improper Following of Specification by Caller |
|
Major |
Description |
|
Minor |
None |
574 |
EJB Bad Practices: Use of Synchronization Primitives |
|
Major |
Description |
|
Minor |
None |
575 |
EJB Bad Practices: Use of AWT Swing |
|
Major |
Description |
|
Minor |
None |
576 |
EJB Bad Practices: Use of Java I/O |
|
Major |
Description |
|
Minor |
None |
577 |
EJB Bad Practices: Use of Sockets |
|
Major |
Description |
|
Minor |
None |
578 |
EJB Bad Practices: Use of Class Loader |
|
Major |
Description |
|
Minor |
None |
579 |
J2EE Bad Practices: Non-serializable Object Stored in Session |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
580 |
clone() Method Without super.clone() |
|
Major |
Description |
|
Minor |
None |
581 |
Object Model Violation: Just One of Equals and Hashcode Defined |
|
Major |
Description |
|
Minor |
None |
582 |
Array Declared Public, Final, and Static |
|
Major |
Background_Details, Description |
|
Minor |
None |
583 |
finalize() Method Declared Public |
|
Major |
Demonstrative_Examples, Description |
|
Minor |
None |
585 |
Empty Synchronized Block |
|
Major |
Description |
|
Minor |
None |
586 |
Explicit Call to Finalize() |
|
Major |
Description |
|
Minor |
None |
587 |
Assignment of a Fixed Address to a Pointer |
|
Major |
Description |
|
Minor |
None |
589 |
Call to Non-ubiquitous API |
|
Major |
Description |
|
Minor |
None |
590 |
Free of Memory not on the Heap |
|
Major |
Description |
|
Minor |
None |
591 |
Sensitive Data Storage in Improperly Locked Memory |
|
Major |
Description |
|
Minor |
None |
593 |
Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created |
|
Major |
Description |
|
Minor |
None |
595 |
Comparison of Object References Instead of Object Contents |
|
Major |
Description |
|
Minor |
None |
599 |
Missing Validation of OpenSSL Certificate |
|
Major |
Description |
|
Minor |
None |
601 |
URL Redirection to Untrusted Site ('Open Redirect') |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
602 |
Client-Side Enforcement of Server-Side Security |
|
Major |
Applicable_Platforms, Relationships, Type |
|
Minor |
None |
603 |
Use of Client-Side Authentication |
|
Major |
Applicable_Platforms, Relationships |
|
Minor |
None |
609 |
Double-Checked Locking |
|
Major |
Description |
|
Minor |
None |
611 |
Improper Restriction of XML External Entity Reference |
|
Major |
Alternate_Terms, Common_Consequences, Description |
|
Minor |
None |
623 |
Unsafe ActiveX Control Marked Safe For Scripting |
|
Major |
Relationships |
|
Minor |
None |
636 |
Not Failing Securely ('Failing Open') |
|
Major |
Applicable_Platforms |
|
Minor |
None |
637 |
Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism') |
|
Major |
Description |
|
Minor |
None |
638 |
Not Using Complete Mediation |
|
Major |
Description, Relationships |
|
Minor |
None |
640 |
Weak Password Recovery Mechanism for Forgotten Password |
|
Major |
Description |
|
Minor |
None |
641 |
Improper Restriction of Names for Files and Other Resources |
|
Major |
Description |
|
Minor |
None |
642 |
External Control of Critical State Data |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
643 |
Improper Neutralization of Data within XPath Expressions ('XPath Injection') |
|
Major |
Description |
|
Minor |
None |
644 |
Improper Neutralization of HTTP Headers for Scripting Syntax |
|
Major |
Description |
|
Minor |
None |
645 |
Overly Restrictive Account Lockout Mechanism |
|
Major |
Description |
|
Minor |
None |
646 |
Reliance on File Name or Extension of Externally-Supplied File |
|
Major |
Description |
|
Minor |
None |
647 |
Use of Non-Canonical URL Paths for Authorization Decisions |
|
Major |
Description |
|
Minor |
None |
648 |
Incorrect Use of Privileged APIs |
|
Major |
Description |
|
Minor |
None |
649 |
Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
652 |
Improper Neutralization of Data within XQuery Expressions ('XQuery Injection') |
|
Major |
Description |
|
Minor |
None |
655 |
Insufficient Psychological Acceptability |
|
Major |
Description, Maintenance_Notes, Taxonomy_Mappings |
|
Minor |
None |
656 |
Reliance on Security Through Obscurity |
|
Major |
Description |
|
Minor |
None |
657 |
Violation of Secure Design Principles |
|
Major |
Maintenance_Notes, Relationships, Taxonomy_Mappings |
|
Minor |
None |
662 |
Improper Synchronization |
|
Major |
Description |
|
Minor |
None |
663 |
Use of a Non-reentrant Function in a Concurrent Context |
|
Major |
Description |
|
Minor |
None |
664 |
Improper Control of a Resource Through its Lifetime |
|
Major |
Description, Relationships |
|
Minor |
None |
665 |
Improper Initialization |
|
Major |
Description, Potential_Mitigations, Relationships |
|
Minor |
None |
666 |
Operation on Resource in Wrong Phase of Lifetime |
|
Major |
Description |
|
Minor |
None |
667 |
Improper Locking |
|
Major |
Description |
|
Minor |
None |
672 |
Operation on a Resource after Expiration or Release |
|
Major |
Description |
|
Minor |
None |
674 |
Uncontrolled Recursion |
|
Major |
Description, Relationships |
|
Minor |
None |
676 |
Use of Potentially Dangerous Function |
|
Major |
Description |
|
Minor |
None |
682 |
Incorrect Calculation |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
683 |
Function Call With Incorrect Order of Arguments |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
684 |
Incorrect Provision of Specified Functionality |
|
Major |
Description |
|
Minor |
None |
685 |
Function Call With Incorrect Number of Arguments |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
686 |
Function Call With Incorrect Argument Type |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
687 |
Function Call With Incorrectly Specified Argument Value |
|
Major |
Description |
|
Minor |
None |
688 |
Function Call With Incorrect Variable or Reference as Argument |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
691 |
Insufficient Control Flow Management |
|
Major |
Relationships |
|
Minor |
None |
693 |
Protection Mechanism Failure |
|
Major |
Applicable_Platforms, Relationships |
|
Minor |
None |
694 |
Use of Multiple Resources with Duplicate Identifier |
|
Major |
Description |
|
Minor |
None |
695 |
Use of Low-Level Functionality |
|
Major |
Description |
|
Minor |
None |
697 |
Incorrect Comparison |
|
Major |
Description, Observed_Examples |
|
Minor |
None |
703 |
Improper Check or Handling of Exceptional Conditions |
|
Major |
Description, Relationships |
|
Minor |
None |
704 |
Incorrect Type Conversion or Cast |
|
Major |
Description |
|
Minor |
None |
705 |
Incorrect Control Flow Scoping |
|
Major |
Description |
|
Minor |
None |
706 |
Use of Incorrectly-Resolved Name or Reference |
|
Major |
Description |
|
Minor |
None |
708 |
Incorrect Ownership Assignment |
|
Major |
Description |
|
Minor |
None |
710 |
Improper Adherence to Coding Standards |
|
Major |
Description |
|
Minor |
None |
732 |
Incorrect Permission Assignment for Critical Resource |
|
Major |
Applicable_Platforms, Description, References |
|
Minor |
None |
749 |
Exposed Dangerous Method or Function |
|
Major |
Description, Related_Attack_Patterns, Relationships |
|
Minor |
None |
754 |
Improper Check for Unusual or Exceptional Conditions |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
755 |
Improper Handling of Exceptional Conditions |
|
Major |
Description, Relationships |
|
Minor |
None |
756 |
Missing Custom Error Page |
|
Major |
Description |
|
Minor |
None |
757 |
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') |
|
Major |
Description |
|
Minor |
None |
758 |
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior |
|
Major |
Description |
|
Minor |
None |
759 |
Use of a One-Way Hash without a Salt |
|
Major |
Description |
|
Minor |
None |
760 |
Use of a One-Way Hash with a Predictable Salt |
|
Major |
Description |
|
Minor |
None |
761 |
Free of Pointer not at Start of Buffer |
|
Major |
Description |
|
Minor |
None |
762 |
Mismatched Memory Management Routines |
|
Major |
Description |
|
Minor |
None |
763 |
Release of Invalid Pointer or Reference |
|
Major |
Description |
|
Minor |
None |
764 |
Multiple Locks of a Critical Resource |
|
Major |
Description |
|
Minor |
None |
765 |
Multiple Unlocks of a Critical Resource |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
766 |
Critical Data Element Declared Public |
|
Major |
Description |
|
Minor |
None |
767 |
Access to Critical Private Variable via Public Method |
|
Major |
Description |
|
Minor |
None |
768 |
Incorrect Short Circuit Evaluation |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
770 |
Allocation of Resources Without Limits or Throttling |
|
Major |
Description, Detection_Factors |
|
Minor |
None |
771 |
Missing Reference to Active Allocated Resource |
|
Major |
Description |
|
Minor |
None |
772 |
Missing Release of Resource after Effective Lifetime |
|
Major |
Description |
|
Minor |
None |
773 |
Missing Reference to Active File Descriptor or Handle |
|
Major |
Description |
|
Minor |
None |
774 |
Allocation of File Descriptors or Handles Without Limits or Throttling |
|
Major |
Description |
|
Minor |
None |
775 |
Missing Release of File Descriptor or Handle after Effective Lifetime |
|
Major |
Description |
|
Minor |
None |
776 |
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') |
|
Major |
Description |
|
Minor |
None |
777 |
Regular Expression without Anchors |
|
Major |
Description |
|
Minor |
None |
778 |
Insufficient Logging |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Potential_Mitigations, References |
|
Minor |
None |
779 |
Logging of Excessive Data |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
780 |
Use of RSA Algorithm without OAEP |
|
Major |
Description |
|
Minor |
None |
781 |
Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code |
|
Major |
Description |
|
Minor |
None |
782 |
Exposed IOCTL with Insufficient Access Control |
|
Major |
Description |
|
Minor |
None |
783 |
Operator Precedence Logic Error |
|
Major |
Description |
|
Minor |
None |
784 |
Reliance on Cookies without Validation and Integrity Checking in a Security Decision |
|
Major |
Description |
|
Minor |
None |
785 |
Use of Path Manipulation Function without Maximum-sized Buffer |
|
Major |
Description |
|
Minor |
None |
786 |
Access of Memory Location Before Start of Buffer |
|
Major |
Description |
|
Minor |
None |
787 |
Out-of-bounds Write |
|
Major |
Alternate_Terms, Demonstrative_Examples, Description |
|
Minor |
None |
788 |
Access of Memory Location After End of Buffer |
|
Major |
Description |
|
Minor |
None |
790 |
Improper Filtering of Special Elements |
|
Major |
Description |
|
Minor |
None |
791 |
Incomplete Filtering of Special Elements |
|
Major |
Description |
|
Minor |
None |
792 |
Incomplete Filtering of One or More Instances of Special Elements |
|
Major |
Description |
|
Minor |
None |
793 |
Only Filtering One Instance of a Special Element |
|
Major |
Description |
|
Minor |
None |
794 |
Incomplete Filtering of Multiple Instances of Special Elements |
|
Major |
Description |
|
Minor |
None |
795 |
Only Filtering Special Elements at a Specified Location |
|
Major |
Description |
|
Minor |
None |
796 |
Only Filtering Special Elements Relative to a Marker |
|
Major |
Description |
|
Minor |
None |
797 |
Only Filtering Special Elements at an Absolute Position |
|
Major |
Description |
|
Minor |
None |
798 |
Use of Hard-coded Credentials |
|
Major |
Description, Detection_Factors, Maintenance_Notes, Potential_Mitigations, Taxonomy_Mappings |
|
Minor |
None |
799 |
Improper Control of Interaction Frequency |
|
Major |
Description |
|
Minor |
None |
804 |
Guessable CAPTCHA |
|
Major |
Description |
|
Minor |
None |
805 |
Buffer Access with Incorrect Length Value |
|
Major |
Description, Detection_Factors, Potential_Mitigations |
|
Minor |
None |
806 |
Buffer Access Using Size of Source Buffer |
|
Major |
Description |
|
Minor |
None |
807 |
Reliance on Untrusted Inputs in a Security Decision |
|
Major |
Description |
|
Minor |
None |
820 |
Missing Synchronization |
|
Major |
Description |
|
Minor |
None |
821 |
Incorrect Synchronization |
|
Major |
Description |
|
Minor |
None |
822 |
Untrusted Pointer Dereference |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
823 |
Use of Out-of-range Pointer Offset |
|
Major |
Description |
|
Minor |
None |
824 |
Access of Uninitialized Pointer |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
825 |
Expired Pointer Dereference |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
826 |
Premature Release of Resource During Expected Lifetime |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
827 |
Improper Control of Document Type Definition |
|
Major |
Description |
|
Minor |
None |
828 |
Signal Handler with Functionality that is not Asynchronous-Safe |
|
Major |
Common_Consequences, Description, Potential_Mitigations |
|
Minor |
None |
829 |
Inclusion of Functionality from Untrusted Control Sphere |
|
Major |
Description, Related_Attack_Patterns |
|
Minor |
None |
830 |
Inclusion of Web Functionality from an Untrusted Source |
|
Major |
Description |
|
Minor |
None |
831 |
Signal Handler Function Associated with Multiple Signals |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
832 |
Unlock of a Resource that is not Locked |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
833 |
Deadlock |
|
Major |
Description |
|
Minor |
None |
834 |
Excessive Iteration |
|
Major |
Common_Consequences, Description, Relationships |
|
Minor |
None |
835 |
Loop with Unreachable Exit Condition ('Infinite Loop') |
|
Major |
Description, Observed_Examples |
|
Minor |
None |
836 |
Use of Password Hash Instead of Password for Authentication |
|
Major |
Description |
|
Minor |
None |
837 |
Improper Enforcement of a Single, Unique Action |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
838 |
Inappropriate Encoding for Output Context |
|
Major |
Description |
|
Minor |
None |
839 |
Numeric Range Comparison Without Minimum Check |
|
Major |
Alternate_Terms, Description |
|
Minor |
None |
841 |
Improper Enforcement of Behavioral Workflow |
|
Major |
Common_Consequences, Description |
|
Minor |
None |
842 |
Placement of User into Incorrect Group |
|
Major |
Description |
|
Minor |
None |
843 |
Access of Resource Using Incompatible Type ('Type Confusion') |
|
Major |
Description |
|
Minor |
None |
862 |
Missing Authorization |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
863 |
Incorrect Authorization |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
908 |
Use of Uninitialized Resource |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
909 |
Missing Initialization of Resource |
|
Major |
Description, Potential_Mitigations, Relationships |
|
Minor |
None |
910 |
Use of Expired File Descriptor |
|
Major |
Description |
|
Minor |
None |
911 |
Improper Update of Reference Count |
|
Major |
Description |
|
Minor |
None |
912 |
Hidden Functionality |
|
Major |
Applicable_Platforms, Description, Potential_Mitigations |
|
Minor |
None |
913 |
Improper Control of Dynamically-Managed Code Resources |
|
Major |
Description |
|
Minor |
None |
914 |
Improper Control of Dynamically-Identified Variables |
|
Major |
Description |
|
Minor |
None |
915 |
Improperly Controlled Modification of Dynamically-Determined Object Attributes |
|
Major |
Description, Observed_Examples |
|
Minor |
None |
916 |
Use of Password Hash With Insufficient Computational Effort |
|
Major |
Description |
|
Minor |
None |
917 |
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') |
|
Major |
Description |
|
Minor |
None |
920 |
Improper Restriction of Power Consumption |
|
Major |
Description |
|
Minor |
None |
921 |
Storage of Sensitive Data in a Mechanism without Access Control |
|
Major |
Description |
|
Minor |
None |
922 |
Insecure Storage of Sensitive Information |
|
Major |
Description |
|
Minor |
None |
923 |
Improper Restriction of Communication Channel to Intended Endpoints |
|
Major |
Description, Related_Attack_Patterns, Relationships |
|
Minor |
None |
924 |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel |
|
Major |
Description |
|
Minor |
None |
939 |
Improper Authorization in Handler for Custom URL Scheme |
|
Major |
Description |
|
Minor |
None |
940 |
Improper Verification of Source of a Communication Channel |
|
Major |
Description, Related_Attack_Patterns |
|
Minor |
None |
941 |
Incorrectly Specified Destination in a Communication Channel |
|
Major |
Description |
|
Minor |
None |
942 |
Permissive Cross-domain Policy with Untrusted Domains |
|
Major |
Description, Relationships |
|
Minor |
None |
943 |
Improper Neutralization of Special Elements in Data Query Logic |
|
Major |
Description |
|
Minor |
None |
1004 |
Sensitive Cookie Without 'HttpOnly' Flag |
|
Major |
Description |
|
Minor |
None |
1007 |
Insufficient Visual Distinction of Homoglyphs Presented to User |
|
Major |
Demonstrative_Examples, Description, Related_Attack_Patterns |
|
Minor |
None |
1021 |
Improper Restriction of Rendered UI Layers or Frames |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1023 |
Incomplete Comparison with Missing Factors |
|
Major |
Description |
|
Minor |
None |
1024 |
Comparison of Incompatible Types |
|
Major |
Description |
|
Minor |
None |
1041 |
Use of Redundant Code |
|
Major |
Description |
|
Minor |
None |
1042 |
Static Member Data Element outside of a Singleton Class Element |
|
Major |
Description |
|
Minor |
None |
1043 |
Data Element Aggregating an Excessively Large Number of Non-Primitive Elements |
|
Major |
Description |
|
Minor |
None |
1044 |
Architecture with Number of Horizontal Layers Outside of Expected Range |
|
Major |
Description |
|
Minor |
None |
1045 |
Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor |
|
Major |
Description |
|
Minor |
None |
1046 |
Creation of Immutable Text Using String Concatenation |
|
Major |
Description |
|
Minor |
None |
1047 |
Modules with Circular Dependencies |
|
Major |
Description |
|
Minor |
None |
1048 |
Invokable Control Element with Large Number of Outward Calls |
|
Major |
Description |
|
Minor |
None |
1049 |
Excessive Data Query Operations in a Large Data Table |
|
Major |
Description |
|
Minor |
None |
1050 |
Excessive Platform Resource Consumption within a Loop |
|
Major |
Description |
|
Minor |
None |
1051 |
Initialization with Hard-Coded Network Resource Configuration Data |
|
Major |
Description |
|
Minor |
None |
1052 |
Excessive Use of Hard-Coded Literals in Initialization |
|
Major |
Description |
|
Minor |
None |
1054 |
Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer |
|
Major |
Description |
|
Minor |
None |
1055 |
Multiple Inheritance from Concrete Classes |
|
Major |
Description |
|
Minor |
None |
1056 |
Invokable Control Element with Variadic Parameters |
|
Major |
Description |
|
Minor |
None |
1057 |
Data Access Operations Outside of Expected Data Manager Component |
|
Major |
Description |
|
Minor |
None |
1058 |
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element |
|
Major |
Description |
|
Minor |
None |
1059 |
Insufficient Technical Documentation |
|
Major |
Applicable_Platforms, Relationships |
|
Minor |
None |
1060 |
Excessive Number of Inefficient Server-Side Data Accesses |
|
Major |
Description |
|
Minor |
None |
1061 |
Insufficient Encapsulation |
|
Major |
Description |
|
Minor |
None |
1062 |
Parent Class with References to Child Class |
|
Major |
Description |
|
Minor |
None |
1063 |
Creation of Class Instance within a Static Code Block |
|
Major |
Description |
|
Minor |
None |
1064 |
Invokable Control Element with Signature Containing an Excessive Number of Parameters |
|
Major |
Description |
|
Minor |
None |
1065 |
Runtime Resource Management Control Element in a Component Built to Run on Application Servers |
|
Major |
Description |
|
Minor |
None |
1066 |
Missing Serialization Control Element |
|
Major |
Description |
|
Minor |
None |
1067 |
Excessive Execution of Sequential Searches of Data Resource |
|
Major |
Description |
|
Minor |
None |
1068 |
Inconsistency Between Implementation and Documented Design |
|
Major |
Applicable_Platforms, Description, Relationships |
|
Minor |
None |
1069 |
Empty Exception Block |
|
Major |
Description |
|
Minor |
None |
1070 |
Serializable Data Element Containing non-Serializable Item Elements |
|
Major |
Description |
|
Minor |
None |
1072 |
Data Resource Access without Use of Connection Pooling |
|
Major |
Description |
|
Minor |
None |
1073 |
Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses |
|
Major |
Description |
|
Minor |
None |
1074 |
Class with Excessively Deep Inheritance |
|
Major |
Description |
|
Minor |
None |
1075 |
Unconditional Control Flow Transfer outside of Switch Block |
|
Major |
Description |
|
Minor |
None |
1076 |
Insufficient Adherence to Expected Conventions |
|
Major |
Description |
|
Minor |
None |
1077 |
Floating Point Comparison with Incorrect Operator |
|
Major |
Description |
|
Minor |
None |
1079 |
Parent Class without Virtual Destructor Method |
|
Major |
Description |
|
Minor |
None |
1080 |
Source Code File with Excessive Number of Lines of Code |
|
Major |
Description |
|
Minor |
None |
1082 |
Class Instance Self Destruction Control Element |
|
Major |
Description |
|
Minor |
None |
1083 |
Data Access from Outside Expected Data Manager Component |
|
Major |
Description |
|
Minor |
None |
1084 |
Invokable Control Element with Excessive File or Data Access Operations |
|
Major |
Description |
|
Minor |
None |
1085 |
Invokable Control Element with Excessive Volume of Commented-out Code |
|
Major |
Description |
|
Minor |
None |
1087 |
Class with Virtual Method without a Virtual Destructor |
|
Major |
Description |
|
Minor |
None |
1088 |
Synchronous Access of Remote Resource without Timeout |
|
Major |
Description |
|
Minor |
None |
1089 |
Large Data Table with Excessive Number of Indices |
|
Major |
Description |
|
Minor |
None |
1090 |
Method Containing Access of a Member Element from Another Class |
|
Major |
Description |
|
Minor |
None |
1091 |
Use of Object without Invoking Destructor Method |
|
Major |
Description |
|
Minor |
None |
1092 |
Use of Same Invokable Control Element in Multiple Architectural Layers |
|
Major |
Description |
|
Minor |
None |
1093 |
Excessively Complex Data Representation |
|
Major |
Description |
|
Minor |
None |
1094 |
Excessive Index Range Scan for a Data Resource |
|
Major |
Description |
|
Minor |
None |
1095 |
Loop Condition Value Update within the Loop |
|
Major |
Description |
|
Minor |
None |
1096 |
Singleton Class Instance Creation without Proper Locking or Synchronization |
|
Major |
Description |
|
Minor |
None |
1097 |
Persistent Storable Data Element without Associated Comparison Control Element |
|
Major |
Description |
|
Minor |
None |
1098 |
Data Element containing Pointer Item without Proper Copy Control Element |
|
Major |
Description |
|
Minor |
None |
1099 |
Inconsistent Naming Conventions for Identifiers |
|
Major |
Description |
|
Minor |
None |
1100 |
Insufficient Isolation of System-Dependent Functions |
|
Major |
Description |
|
Minor |
None |
1101 |
Reliance on Runtime Component in Generated Code |
|
Major |
Description |
|
Minor |
None |
1102 |
Reliance on Machine-Dependent Data Representation |
|
Major |
Description |
|
Minor |
None |
1103 |
Use of Platform-Dependent Third Party Components |
|
Major |
Description |
|
Minor |
None |
1104 |
Use of Unmaintained Third Party Components |
|
Major |
Applicable_Platforms, Description, Relationships |
|
Minor |
None |
1105 |
Insufficient Encapsulation of Machine-Dependent Functionality |
|
Major |
Description |
|
Minor |
None |
1106 |
Insufficient Use of Symbolic Constants |
|
Major |
Description |
|
Minor |
None |
1107 |
Insufficient Isolation of Symbolic Constant Definitions |
|
Major |
Description |
|
Minor |
None |
1108 |
Excessive Reliance on Global Variables |
|
Major |
Description |
|
Minor |
None |
1109 |
Use of Same Variable for Multiple Purposes |
|
Major |
Description |
|
Minor |
None |
1110 |
Incomplete Design Documentation |
|
Major |
Applicable_Platforms, Relationships |
|
Minor |
None |
1113 |
Inappropriate Comment Style |
|
Major |
Description |
|
Minor |
None |
1114 |
Inappropriate Whitespace Style |
|
Major |
Description |
|
Minor |
None |
1115 |
Source Code Element without Standard Prologue |
|
Major |
Description |
|
Minor |
None |
1116 |
Inaccurate Comments |
|
Major |
Description |
|
Minor |
None |
1117 |
Callable with Insufficient Behavioral Summary |
|
Major |
Description |
|
Minor |
None |
1119 |
Excessive Use of Unconditional Branching |
|
Major |
Description |
|
Minor |
None |
1120 |
Excessive Code Complexity |
|
Major |
Description |
|
Minor |
None |
1121 |
Excessive McCabe Cyclomatic Complexity |
|
Major |
Description |
|
Minor |
None |
1122 |
Excessive Halstead Complexity |
|
Major |
Description |
|
Minor |
None |
1123 |
Excessive Use of Self-Modifying Code |
|
Major |
Description |
|
Minor |
None |
1124 |
Excessively Deep Nesting |
|
Major |
Description |
|
Minor |
None |
1126 |
Declaration of Variable with Unnecessarily Wide Scope |
|
Major |
Description |
|
Minor |
None |
1127 |
Compilation with Insufficient Warnings or Errors |
|
Major |
Description |
|
Minor |
None |
1164 |
Irrelevant Code |
|
Major |
Description |
|
Minor |
None |
1173 |
Improper Use of Validation Framework |
|
Major |
Description |
|
Minor |
None |
1176 |
Inefficient CPU Computation |
|
Major |
Description |
|
Minor |
None |
1177 |
Use of Prohibited Code |
|
Major |
Description |
|
Minor |
None |
1188 |
Insecure Default Initialization of Resource |
|
Major |
Description |
|
Minor |
None |
1198 |
Privilege Separation and Access Control Issues |
|
Major |
Relationships |
|
Minor |
None |
1199 |
General Circuit and Logic Design Concerns |
|
Major |
Relationships |
|
Minor |
None |
1206 |
Power, Clock, Thermal, and Reset Concerns |
|
Major |
Relationships |
|
Minor |
None |
1207 |
Debug and Test Problems |
|
Major |
Relationships |
|
Minor |
None |
1208 |
Cross-Cutting Problems |
|
Major |
Relationships |
|
Minor |
None |
1209 |
Failure to Disable Reserved Bits |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1222 |
Insufficient Granularity of Address Regions Protected by Register Locks |
|
Major |
Relationships |
|
Minor |
None |
1236 |
Improper Neutralization of Formula Elements in a CSV File |
|
Major |
Description |
|
Minor |
None |
1242 |
Inclusion of Undocumented Features or Chicken Bits |
|
Major |
Applicable_Platforms |
|
Minor |
None |
1247 |
Improper Protection Against Voltage and Clock Glitches |
|
Major |
Applicable_Platforms, Related_Attack_Patterns, Relationships |
|
Minor |
None |
1248 |
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
None |
1249 |
Application-Level Admin Tool with Inconsistent View of Underlying Operating System |
|
Major |
Description |
|
Minor |
None |
1250 |
Improper Preservation of Consistency Between Independent Representations of Shared State |
|
Major |
Relationships |
|
Minor |
None |
1256 |
Improper Restriction of Software Interfaces to Hardware Features |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1259 |
Improper Restriction of Security Token Assignment |
|
Major |
Description |
|
Minor |
None |
1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1265 |
Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls |
|
Major |
Description |
|
Minor |
None |
1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1268 |
Policy Privileges are not Assigned Consistently Between Control and Data Agents |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1271 |
Uninitialized Value on Reset for Registers Holding Security Settings |
|
Major |
Relationships |
|
Minor |
None |
1274 |
Improper Access Control for Volatile Memory Containing Boot Code |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1275 |
Sensitive Cookie with Improper SameSite Attribute |
|
Major |
Relationships |
|
Minor |
None |
1278 |
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1282 |
Assumed-Immutable Data is Stored in Writable Memory |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1290 |
Incorrect Decoding of Security Identifiers |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1293 |
Missing Source Correlation of Multiple Independent Data |
|
Major |
Description |
|
Minor |
None |
1296 |
Incorrect Chaining or Granularity of Debug Components |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1297 |
Unprotected Confidential Information on Device is Accessible by OSAT Vendors |
|
Major |
Maintenance_Notes |
|
Minor |
None |
1299 |
Missing Protection Mechanism for Alternate Hardware Interface |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1300 |
Improper Protection of Physical Side Channels |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1312 |
Missing Protection for Mirrored Regions in On-Chip Fabric Firewall |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1316 |
Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1319 |
Improper Protection against Electromagnetic Fault Injection (EM-FI) |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1321 |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |
|
Major |
Description |
|
Minor |
None |
1324 |
DEPRECATED: Sensitive Information Accessible by Physical Probing of JTAG Interface |
|
Major |
Applicable_Platforms, Common_Consequences, Demonstrative_Examples, Description, Modes_of_Introduction, Name, Potential_Mitigations, Related_Attack_Patterns, Relationships, Time_of_Introduction, Type |
|
Minor |
None |
1329 |
Reliance on Component That is Not Updateable |
|
Major |
Applicable_Platforms, Relationships |
|
Minor |
Description |
1332 |
Improper Handling of Faults that Lead to Instruction Skips |
|
Major |
Potential_Mitigations, Related_Attack_Patterns |
|
Minor |
None |
1333 |
Inefficient Regular Expression Complexity |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
1334 |
Unauthorized Error Injection Can Degrade Hardware Redundancy |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1338 |
Improper Protections Against Hardware Overheating |
|
Major |
Applicable_Platforms, Related_Attack_Patterns |
|
Minor |
None |
1339 |
Insufficient Precision or Accuracy of a Real Number |
|
Major |
Common_Consequences, Description, Potential_Mitigations |
|
Minor |
None |
1351 |
Improper Handling of Hardware Behavior in Exceptionally Cold Environments |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
1357 |
Reliance on Insufficiently Trustworthy Component |
|
Major |
Applicable_Platforms, Description, Maintenance_Notes, Modes_of_Introduction, Name, Potential_Mitigations, Relationships |
|
Minor |
None |
1358 |
Weaknesses in SEI ETF Categories of Security Vulnerabilities in ICS |
|
Major |
Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1359 |
ICS Communications |
|
Major |
Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1360 |
ICS Dependencies (& Architecture) |
|
Major |
Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1361 |
ICS Supply Chain |
|
Major |
Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1362 |
ICS Engineering (Constructions/Deployment) |
|
Major |
Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1363 |
ICS Operations (& Maintenance) |
|
Major |
Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1364 |
ICS Communications: Zone Boundary Failures |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1365 |
ICS Communications: Unreliability |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1366 |
ICS Communications: Frail Security in Protocols |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1367 |
ICS Dependencies (& Architecture): External Physical Systems |
|
Major |
Description, Maintenance_Notes, Relationship_Notes, Relationships |
|
Minor |
None |
1368 |
ICS Dependencies (& Architecture): External Digital Systems |
|
Major |
Description, Maintenance_Notes, Relationship_Notes, Relationships |
|
Minor |
None |
1369 |
ICS Supply Chain: IT/OT Convergence/Expansion |
|
Major |
Description, Maintenance_Notes, Relationship_Notes, Relationships |
|
Minor |
None |
1370 |
ICS Supply Chain: Common Mode Frailties |
|
Major |
Description, Maintenance_Notes, Relationship_Notes, Relationships |
|
Minor |
None |
1371 |
ICS Supply Chain: Poorly Documented or Undocumented Features |
|
Major |
Description, Maintenance_Notes, Relationship_Notes, Relationships |
|
Minor |
None |
1372 |
ICS Supply Chain: OT Counterfeit and Malicious Corruption |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1373 |
ICS Engineering (Construction/Deployment): Trust Model Problems |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1374 |
ICS Engineering (Construction/Deployment): Maker Breaker Blindness |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1375 |
ICS Engineering (Construction/Deployment): Gaps in Details/Data |
|
Major |
Description, Maintenance_Notes, Relationship_Notes, Relationships |
|
Minor |
None |
1376 |
ICS Engineering (Construction/Deployment): Security Gaps in Commissioning |
|
Major |
Description, Maintenance_Notes, Relationship_Notes, Relationships |
|
Minor |
None |
1377 |
ICS Engineering (Construction/Deployment): Inherent Predictability in Design |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1378 |
ICS Operations (& Maintenance): Gaps in obligations and training |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1379 |
ICS Operations (& Maintenance): Human factors in ICS environments |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1380 |
ICS Operations (& Maintenance): Post-analysis changes |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1381 |
ICS Operations (& Maintenance): Exploitable Standard Operational Procedures |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1382 |
ICS Operations (& Maintenance): Emerging Energy Technologies |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1383 |
ICS Operations (& Maintenance): Compliance/Conformance with Regulatory Requirements |
|
Major |
Description, Maintenance_Notes, Relationship_Notes |
|
Minor |
None |
1384 |
Improper Handling of Physical or Environmental Conditions |
|
Major |
Applicable_Platforms, Relationships |
|
Minor |
None |
1385 |
Missing Origin Validation in WebSockets |
|
Major |
Description |
|
Minor |
None |
1386 |
Insecure Operation on Windows Junction / Mount Point |
|
Major |
Description, Potential_Mitigations |
|
Minor |
None |
1390 |
Weak Authentication |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples, References, Relationships |
|
Minor |
None |
1391 |
Use of Weak Credentials |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples, References |
|
Minor |
None |
1392 |
Use of Default Credentials |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples, References |
|
Minor |
None |
1393 |
Use of Default Password |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples, References, Relationships |
|
Minor |
None |