@mitre/hdf-converters 2.5.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/LICENSE.md +9 -0
- package/README.md +4 -0
- package/lib/data/U_CCI_List.xml +38403 -0
- package/lib/data/aws-config-mapping.csv +107 -0
- package/lib/data/cwe-nist-mapping.csv +203 -0
- package/lib/data/nessus-plugins-nist-mapping.csv +108 -0
- package/lib/data/nikto-nist-mapping.csv +8942 -0
- package/lib/data/owasp-nist-mapping.csv +11 -0
- package/lib/data/scoutsuite-nist-mapping.csv +140 -0
- package/lib/index.d.ts +12 -0
- package/lib/index.js +25 -0
- package/lib/index.js.map +1 -0
- package/lib/package.json +45 -0
- package/lib/src/base-converter.d.ts +39 -0
- package/lib/src/base-converter.js +216 -0
- package/lib/src/base-converter.js.map +1 -0
- package/lib/src/burpsuite-mapper.d.ts +7 -0
- package/lib/src/burpsuite-mapper.js +157 -0
- package/lib/src/burpsuite-mapper.js.map +1 -0
- package/lib/src/dbprotect-mapper.d.ts +7 -0
- package/lib/src/dbprotect-mapper.js +165 -0
- package/lib/src/dbprotect-mapper.js.map +1 -0
- package/lib/src/fortify-mapper.d.ts +8 -0
- package/lib/src/fortify-mapper.js +180 -0
- package/lib/src/fortify-mapper.js.map +1 -0
- package/lib/src/jfrog-xray-mapper.d.ts +7 -0
- package/lib/src/jfrog-xray-mapper.js +169 -0
- package/lib/src/jfrog-xray-mapper.js.map +1 -0
- package/lib/src/mappings/CciNistMapping.d.ts +6 -0
- package/lib/src/mappings/CciNistMapping.js +60 -0
- package/lib/src/mappings/CciNistMapping.js.map +1 -0
- package/lib/src/mappings/CciNistMappingItem.d.ts +5 -0
- package/lib/src/mappings/CciNistMappingItem.js +11 -0
- package/lib/src/mappings/CciNistMappingItem.js.map +1 -0
- package/lib/src/mappings/CweNistMapping.d.ts +6 -0
- package/lib/src/mappings/CweNistMapping.js +74 -0
- package/lib/src/mappings/CweNistMapping.js.map +1 -0
- package/lib/src/mappings/CweNistMappingItem.d.ts +8 -0
- package/lib/src/mappings/CweNistMappingItem.js +34 -0
- package/lib/src/mappings/CweNistMappingItem.js.map +1 -0
- package/lib/src/mappings/NessusPluginsNistMapping.d.ts +6 -0
- package/lib/src/mappings/NessusPluginsNistMapping.js +48 -0
- package/lib/src/mappings/NessusPluginsNistMapping.js.map +1 -0
- package/lib/src/mappings/NessusPluginsNistMappingItem.d.ts +7 -0
- package/lib/src/mappings/NessusPluginsNistMappingItem.js +23 -0
- package/lib/src/mappings/NessusPluginsNistMappingItem.js.map +1 -0
- package/lib/src/mappings/NiktoNistMapping.d.ts +6 -0
- package/lib/src/mappings/NiktoNistMapping.js +40 -0
- package/lib/src/mappings/NiktoNistMapping.js.map +1 -0
- package/lib/src/mappings/NiktoNistMappingItem.d.ts +7 -0
- package/lib/src/mappings/NiktoNistMappingItem.js +28 -0
- package/lib/src/mappings/NiktoNistMappingItem.js.map +1 -0
- package/lib/src/mappings/OwaspNistMapping.d.ts +6 -0
- package/lib/src/mappings/OwaspNistMapping.js +55 -0
- package/lib/src/mappings/OwaspNistMapping.js.map +1 -0
- package/lib/src/mappings/OwaspNistMappingItem.d.ts +8 -0
- package/lib/src/mappings/OwaspNistMappingItem.js +34 -0
- package/lib/src/mappings/OwaspNistMappingItem.js.map +1 -0
- package/lib/src/mappings/ScoutsuiteNistMapping.d.ts +6 -0
- package/lib/src/mappings/ScoutsuiteNistMapping.js +39 -0
- package/lib/src/mappings/ScoutsuiteNistMapping.js.map +1 -0
- package/lib/src/mappings/ScoutsuiteNistMappingItem.d.ts +5 -0
- package/lib/src/mappings/ScoutsuiteNistMappingItem.js +21 -0
- package/lib/src/mappings/ScoutsuiteNistMappingItem.js.map +1 -0
- package/lib/src/nessus-mapper.d.ts +13 -0
- package/lib/src/nessus-mapper.js +303 -0
- package/lib/src/nessus-mapper.js.map +1 -0
- package/lib/src/netsparker-mapper.d.ts +7 -0
- package/lib/src/netsparker-mapper.js +221 -0
- package/lib/src/netsparker-mapper.js.map +1 -0
- package/lib/src/nikto-mapper.d.ts +7 -0
- package/lib/src/nikto-mapper.js +96 -0
- package/lib/src/nikto-mapper.js.map +1 -0
- package/lib/src/sarif-mapper.d.ts +7 -0
- package/lib/src/sarif-mapper.js +143 -0
- package/lib/src/sarif-mapper.js.map +1 -0
- package/lib/src/scoutsuite-mapper.d.ts +7 -0
- package/lib/src/scoutsuite-mapper.js +258 -0
- package/lib/src/scoutsuite-mapper.js.map +1 -0
- package/lib/src/snyk-mapper.d.ts +14 -0
- package/lib/src/snyk-mapper.js +165 -0
- package/lib/src/snyk-mapper.js.map +1 -0
- package/lib/src/xccdf-results-mapper.d.ts +6 -0
- package/lib/src/xccdf-results-mapper.js +206 -0
- package/lib/src/xccdf-results-mapper.js.map +1 -0
- package/lib/src/zap-mapper.d.ts +8 -0
- package/lib/src/zap-mapper.js +177 -0
- package/lib/src/zap-mapper.js.map +1 -0
- package/package.json +45 -0
|
@@ -0,0 +1,107 @@
|
|
|
1
|
+
AwsConfigRuleSourceIdentifier,AwsConfigRuleName,NIST-ID,Rev
|
|
2
|
+
SECRETSMANAGER_SCHEDULED_ROTATION_SUCCESS_CHECK,secretsmanager-scheduled-rotation-success-check,AC-2(1)|AC-2(j),4
|
|
3
|
+
IAM_USER_GROUP_MEMBERSHIP_CHECK,iam-user-group-membership-check,AC-2(1)|AC-2(j)|AC-3|AC-6,4
|
|
4
|
+
IAM_PASSWORD_POLICY,iam-password-policy,AC-2(1)|AC-2(f)|AC-2(j)|IA-2|IA-5(1)(a)(d)(e)|IA-5(4),4
|
|
5
|
+
ACCESS_KEYS_ROTATED,access-keys-rotated,AC-2(1)|AC-2(j),4
|
|
6
|
+
IAM_USER_UNUSED_CREDENTIALS_CHECK,iam-user-unused-credentials-check,AC-2(1)|AC-2(3)|AC-2(f)|AC-3|AC-6,4
|
|
7
|
+
SECURITYHUB_ENABLED,securityhub-enabled,AC-2(1)|AC-2(4)|AC-2(12)(a)|AC-2(g)|AC-17(1)|AU-6(1)(3)|CA-7(a)(b)|SA-10|SI-4(2)|SI-4(4)|SI-4(5)|SI-4(16)|SI-4(a)(b)(c),4
|
|
8
|
+
GUARDDUTY_ENABLED_CENTRALIZED,guardduty-enabled-centralized,AC-2(1)|AC-2(4)|AC-2(12)(a)|AC-2(g)|AC-17(1)|AU-6(1)(3)|CA-7(a)(b)|RA-5|SA-10|SI-4(1)|SI-4(2)|SI-4(4)|SI-4(5)|SI-4(16)|SI-4(a)(b)(c),4
|
|
9
|
+
CLOUD_TRAIL_CLOUD_WATCH_LOGS_ENABLED,cloud-trail-cloud-watch-logs-enabled,AC-2(4)|AC-2(g)|AU-2(a)(d)|AU-3|AU-6(1)(3)|AU-7(1)|AU-12(a)(c)|CA-7(a)(b)|SI-4(2)|SI-4(4)|SI-4(5)|SI-4(a)(b)(c),4
|
|
10
|
+
CLOUD_TRAIL_ENABLED,cloudtrail-enabled,AC-2(4)|AC-2(g)|AU-2(a)(d)|AU-3|AU-12(a)(c),4
|
|
11
|
+
MULTI_REGION_CLOUD_TRAIL_ENABLED,multi-region-cloudtrail-enabled,AC-2(4)|AU-2(a)(d)|AU-3|AU-12(a)(c),4
|
|
12
|
+
RDS_LOGGING_ENABLED,rds-logging-enabled,AC-2(4)|AC-2(g)|AU-2(a)(d)|AU-3|AU-12(a)(c),4
|
|
13
|
+
CLOUDWATCH_ALARM_ACTION_CHECK,cloudwatch-alarm-action-check,AC-2(4)|AU-6(1)(3)|AU-7(1)|CA-7(a)(b)|IR-4(1)|SI-4(2)|SI-4(4)|SI-4(5)|SI-4(a)(b)(c),4
|
|
14
|
+
REDSHIFT_CLUSTER_CONFIGURATION_CHECK,redshift-cluster-configuration-check,AC-2(4)|AC-2(g)|AU-2(a)(d)|AU-3|AU-12(a)(c)|SC-13|SC-28,4
|
|
15
|
+
IAM_ROOT_ACCESS_KEY_CHECK,iam-root-access-key-check,AC-2(f)|AC-2(j)|AC-3|AC-6|AC-6(10),4
|
|
16
|
+
S3_BUCKET_LOGGING_ENABLED,s3-bucket-logging-enabled,AC-2(g)|AU-2(a)(d)|AU-3|AU-12(a)(c),4
|
|
17
|
+
CLOUDTRAIL_S3_DATAEVENTS_ENABLED,cloudtrail-s3-dataevents-enabled,AC-2(g)|AU-2(a)(d)|AU-3|AU-12(a)(c),4
|
|
18
|
+
ROOT_ACCOUNT_MFA_ENABLED,root-account-mfa-enabled,AC-2(j)|IA-2(1)(11),4
|
|
19
|
+
EMR_KERBEROS_ENABLED,emr-kerberos-enabled,AC-2(j)|AC-3|AC-5(c)|AC-6,4
|
|
20
|
+
IAM_GROUP_HAS_USERS_CHECK,iam-group-has-users-check,AC-2(j)|AC-3|AC-5(c)|AC-6|SC-2,4
|
|
21
|
+
IAM_POLICY_NO_STATEMENTS_WITH_ADMIN_ACCESS,iam-policy-no-statements-with-admin-access,AC-2(j)|AC-3|AC-5(c)|AC-6|SC-2,4
|
|
22
|
+
IAM_USER_NO_POLICIES_CHECK,iam-user-no-policies-check,AC-2(j)|AC-3|AC-5(c)|AC-6,4
|
|
23
|
+
S3_BUCKET_PUBLIC_WRITE_PROHIBITED,s3-bucket-public-write-prohibited,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
|
|
24
|
+
LAMBDA_FUNCTION_PUBLIC_ACCESS_PROHIBITED,lambda-function-public-access-prohibited,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
|
|
25
|
+
RDS_SNAPSHOTS_PUBLIC_PROHIBITED,rds-snapshots-public-prohibited,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
|
|
26
|
+
REDSHIFT_CLUSTER_PUBLIC_ACCESS_CHECK,redshift-cluster-public-access-check,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
|
|
27
|
+
S3_BUCKET_POLICY_GRANTEE_CHECK,s3-bucket-policy-grantee-check,AC-3|AC-6|SC-7|SC-7(3),4
|
|
28
|
+
S3_BUCKET_PUBLIC_READ_PROHIBITED,s3-bucket-public-read-prohibited,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
|
|
29
|
+
S3_ACCOUNT_LEVEL_PUBLIC_ACCESS_BLOCKS,s3-account-level-public-access-blocks,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
|
|
30
|
+
DMS_REPLICATION_NOT_PUBLIC,dms-replication-not-public,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
|
|
31
|
+
EBS_SNAPSHOT_PUBLIC_RESTORABLE_CHECK,ebs-snapshot-public-restorable-check,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
|
|
32
|
+
SAGEMAKER_NOTEBOOK_NO_DIRECT_INTERNET_ACCESS,sagemaker-notebook-no-direct-internet-access,AC-3|AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
|
|
33
|
+
RDS_INSTANCE_PUBLIC_ACCESS_CHECK,rds-instance-public-access-check,AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
|
|
34
|
+
LAMBDA_INSIDE_VPC,lambda-inside-vpc,AC-4|SC-7|SC-7(3),4
|
|
35
|
+
INSTANCES_IN_VPC,ec2-instances-in-vpc,AC-4|SC-7|SC-7(3),4
|
|
36
|
+
RESTRICTED_INCOMING_TRAFFIC,restricted-common-ports,AC-4|CM-2|SC-7|SC-7(3),4
|
|
37
|
+
INCOMING_SSH_DISABLED,restricted-ssh,AC-4|SC-7|SC-7(3),4
|
|
38
|
+
VPC_DEFAULT_SECURITY_GROUP_CLOSED,vpc-default-security-group-closed,AC-4|SC-7|SC-7(3),4
|
|
39
|
+
VPC_SG_OPEN_ONLY_TO_AUTHORIZED_PORTS,vpc-sg-open-only-to-authorized-ports,AC-4|SC-7|SC-7(3),4
|
|
40
|
+
ACM_CERTIFICATE_EXPIRATION_CHECK,acm-certificate-expiration-check,AC-4|AC-17(2)|SC-12,4
|
|
41
|
+
EC2_INSTANCE_NO_PUBLIC_IP,ec2-instance-no-public-ip,AC-4|AC-6|AC-21(b)|SC-7|SC-7(3),4
|
|
42
|
+
ELASTICSEARCH_IN_VPC_ONLY,elasticsearch-in-vpc-only,AC-4|SC-7|SC-7(3),4
|
|
43
|
+
EMR_MASTER_NO_PUBLIC_IP,emr-master-no-public-ip,AC-4|AC-21(b)|SC-7|SC-7(3),4
|
|
44
|
+
INTERNET_GATEWAY_AUTHORIZED_VPC_ONLY,internet-gateway-authorized-vpc-only,AC-4|AC-17(3)|SC-7|SC-7(3),4
|
|
45
|
+
CODEBUILD_PROJECT_ENVVAR_AWSCRED_CHECK,codebuild-project-envvar-awscred-check,AC-6|IA-5(7)|SA-3(a),4
|
|
46
|
+
EC2_IMDSV2_CHECK,ec2-imdsv2-check,AC-6,4
|
|
47
|
+
IAM_NO_INLINE_POLICY_CHECK,iam-no-inline-policy-check,AC-6,4
|
|
48
|
+
ALB_HTTP_TO_HTTPS_REDIRECTION_CHECK,alb-http-to-https-redirection-check,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-13|SC-23,4
|
|
49
|
+
REDSHIFT_REQUIRE_TLS_SSL,redshift-require-tls-ssl,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-13,4
|
|
50
|
+
S3_BUCKET_SSL_REQUESTS_ONLY,s3-bucket-ssl-requests-only,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-13,4
|
|
51
|
+
ELB_ACM_CERTIFICATE_REQUIRED,elb-acm-certificate-required,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-13,4
|
|
52
|
+
ALB_HTTP_DROP_INVALID_HEADER_ENABLED,alb-http-drop-invalid-header-enabled,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-23,4
|
|
53
|
+
ELB_TLS_HTTPS_LISTENERS_ONLY,elb-tls-https-listeners-only,AC-17(2)|SC-7|SC-8|SC-8(1)|SC-23,4
|
|
54
|
+
API_GW_EXECUTION_LOGGING_ENABLED,api-gw-execution-logging-enabled,AU-2(a)(d)|AU-3|AU-12(a)(c),4
|
|
55
|
+
ELB_LOGGING_ENABLED,elb-logging-enabled,AU-2(a)(d)|AU-3|AU-12(a)(c),4
|
|
56
|
+
VPC_FLOW_LOGS_ENABLED,vpc-flow-logs-enabled,AU-2(a)(d)|AU-3|AU-12(a)(c),4
|
|
57
|
+
WAFV2_LOGGING_ENABLED,wafv2-logging-enabled,AU-2(a)(d)|AU-3|AU-12(a)(c)|SC-7|SI-4(a)(b)(c),4
|
|
58
|
+
CLOUD_TRAIL_ENCRYPTION_ENABLED,cloud-trail-encryption-enabled,AU-9|SC-13|SC-28,4
|
|
59
|
+
CLOUDWATCH_LOG_GROUP_ENCRYPTED,cloudwatch-log-group-encrypted,AU-9|SC-13|SC-28,4
|
|
60
|
+
S3_BUCKET_REPLICATION_ENABLED,s3-bucket-replication-enabled,AU-9(2)|CP-9(b)|CP-10|SC-5|SC-36,4
|
|
61
|
+
CW_LOGGROUP_RETENTION_PERIOD_CHECK,cw-loggroup-retention-period-check,AU-11|SI-12,4
|
|
62
|
+
EC2_INSTANCE_DETAILED_MONITORING_ENABLED,ec2-instance-detailed-monitoring-enabled,CA-7(a)(b)|SI-4(2)|SI-4(a)(b)(c),4
|
|
63
|
+
RDS_ENHANCED_MONITORING_ENABLED,rds-enhanced-monitoring-enabled,CA-7(a)(b),4
|
|
64
|
+
EC2_INSTANCE_MANAGED_BY_SSM,ec2-instance-managed-by-systems-manager,CM-2|CM-7(a)|CM-8(1)|CM-8(3)(a)|SA-3(a)|SA-10|SI-2(2)|SI-7(1),4
|
|
65
|
+
EC2_MANAGEDINSTANCE_ASSOCIATION_COMPLIANCE_STATUS_CHECK,ec2-managedinstance-association-compliance-status-check,CM-2|CM-7(a)|CM-8(3)(a)|SI-2(2),4
|
|
66
|
+
EC2_STOPPED_INSTANCE,ec2-stopped-instance,CM-2,4
|
|
67
|
+
EC2_VOLUME_INUSE_CHECK,ec2-volume-inuse-check,CM-2|SC-4,4
|
|
68
|
+
ELB_DELETION_PROTECTION_ENABLED,elb-deletion-protection-enabled,CM-2|CP-10,4
|
|
69
|
+
CLOUDTRAIL_SECURITY_TRAIL_ENABLED,cloudtrail-security-trail-enabled,CM-2,4
|
|
70
|
+
EC2_MANAGEDINSTANCE_PATCH_COMPLIANCE_STATUS_CHECK,ec2-managedinstance-patch-compliance-status-check,CM-8(3)(a)|SI-2(2)|SI-7(1),4
|
|
71
|
+
DB_INSTANCE_BACKUP_ENABLED,db-instance-backup-enabled,CP-9(b)|CP-10|SI-12,4
|
|
72
|
+
DYNAMODB_PITR_ENABLED,dynamodb-pitr-enabled,CP-9(b)|CP-10|SI-12,4
|
|
73
|
+
ELASTICACHE_REDIS_CLUSTER_AUTOMATIC_BACKUP_CHECK,elasticache-redis-cluster-automatic-backup-check,CP-9(b)|CP-10|SI-12,4
|
|
74
|
+
DYNAMODB_IN_BACKUP_PLAN,dynamodb-in-backup-plan,CP-9(b)|CP-10|SI-12,4
|
|
75
|
+
EBS_IN_BACKUP_PLAN,ebs-in-backup-plan,CP-9(b)|CP-10|SI-12,4
|
|
76
|
+
EFS_IN_BACKUP_PLAN,efs-in-backup-plan,CP-9(b)|CP-10|SI-12,4
|
|
77
|
+
RDS_IN_BACKUP_PLAN,rds-in-backup-plan,CP-9(b)|CP-10|SI-12,4
|
|
78
|
+
DYNAMODB_AUTOSCALING_ENABLED,dynamodb-autoscaling-enabled,CP-10|SC-5,4
|
|
79
|
+
RDS_MULTI_AZ_SUPPORT,rds-multi-az-support,CP-10|SC-5|SC-36,4
|
|
80
|
+
S3_BUCKET_VERSIONING_ENABLED,s3-bucket-versioning-enabled,CP-10|SI-12,4
|
|
81
|
+
VPC_VPN_2_TUNNELS_UP,vpc-vpn-2-tunnels-up,CP-10,4
|
|
82
|
+
ELB_CROSS_ZONE_LOAD_BALANCING_ENABLED,elb-cross-zone-load-balancing-enabled,CP-10|SC-5,4
|
|
83
|
+
ROOT_ACCOUNT_HARDWARE_MFA_ENABLED,root-account-hardware-mfa-enabled,IA-2(1)(11),4
|
|
84
|
+
MFA_ENABLED_FOR_IAM_CONSOLE_ACCESS,mfa-enabled-for-iam-console-access,IA-2(1)(2)(11),4
|
|
85
|
+
IAM_USER_MFA_ENABLED,iam-user-mfa-enabled,IA-2(1)(2)(11),4
|
|
86
|
+
GUARDDUTY_NON_ARCHIVED_FINDINGS,guardduty-non-archived-findings,IR-4(1)|IR-6(1)|IR-7(1)|RA-5|SA-10|SI-4(a)(b)(c),4
|
|
87
|
+
CODEBUILD_PROJECT_SOURCE_REPO_URL_CHECK,codebuild-project-source-repo-url-check,SA-3(a),4
|
|
88
|
+
AUTOSCALING_GROUP_ELB_HEALTHCHECK_REQUIRED,autoscaling-group-elb-healthcheck-required,SC-5,4
|
|
89
|
+
RDS_INSTANCE_DELETION_PROTECTION_ENABLED,rds-instance-deletion-protection-enabled,SC-5,4
|
|
90
|
+
ALB_WAF_ENABLED,alb-waf-enabled,SC-7|SI-4(a)(b)(c),4
|
|
91
|
+
ELASTICSEARCH_NODE_TO_NODE_ENCRYPTION_CHECK,elasticsearch-node-to-node-encryption-check,SC-7|SC-8|SC-8(1),4
|
|
92
|
+
CMK_BACKING_KEY_ROTATION_ENABLED,cmk-backing-key-rotation-enabled,SC-12,4
|
|
93
|
+
KMS_CMK_NOT_SCHEDULED_FOR_DELETION,kms-cmk-not-scheduled-for-deletion,SC-12|SC-28,4
|
|
94
|
+
API_GW_CACHE_ENABLED_AND_ENCRYPTED,api-gw-cache-enabled-and-encrypted,SC-13|SC-28,4
|
|
95
|
+
EFS_ENCRYPTED_CHECK,efs-encrypted-check,SC-13|SC-28,4
|
|
96
|
+
ELASTICSEARCH_ENCRYPTED_AT_REST,elasticsearch-encrypted-at-rest,SC-13|SC-28,4
|
|
97
|
+
ENCRYPTED_VOLUMES,encrypted-volumes,SC-13|SC-28,4
|
|
98
|
+
RDS_STORAGE_ENCRYPTED,rds-storage-encrypted,SC-13|SC-28,4
|
|
99
|
+
S3_BUCKET_SERVER_SIDE_ENCRYPTION_ENABLED,s3-bucket-server-side-encryption-enabled,SC-13|SC-28,4
|
|
100
|
+
SAGEMAKER_ENDPOINT_CONFIGURATION_KMS_KEY_CONFIGURED,sagemaker-endpoint-configuration-kms-key-configured,SC-13|SC-28,4
|
|
101
|
+
SAGEMAKER_NOTEBOOK_INSTANCE_KMS_KEY_CONFIGURED,sagemaker-notebook-instance-kms-key-configured,SC-13|SC-28,4
|
|
102
|
+
SNS_ENCRYPTED_KMS,sns-encrypted-kms,SC-13|SC-28,4
|
|
103
|
+
DYNAMODB_TABLE_ENCRYPTED_KMS,dynamodb-table-encrypted-kms,SC-13,4
|
|
104
|
+
S3_BUCKET_DEFAULT_LOCK_ENABLED,s3-bucket-default-lock-enabled,SC-28,4
|
|
105
|
+
EC2_EBS_ENCRYPTION_BY_DEFAULT,ec2-ebs-encryption-by-default,SC-28,4
|
|
106
|
+
RDS_SNAPSHOT_ENCRYPTED,rds-snapshot-encrypted,SC-28,4
|
|
107
|
+
CLOUD_TRAIL_LOG_FILE_VALIDATION_ENABLED,cloud-trail-log-file-validation-enabled,SI-7|SI-7(1),4
|
|
@@ -0,0 +1,203 @@
|
|
|
1
|
+
CWE-ID,CWE Name,NIST-ID,Rev,NIST Name
|
|
2
|
+
5, J2EE Misconfiguration: Data Transmission Without Encryption,SC-8,4,Transmission Confidentiality and Integrity
|
|
3
|
+
6, J2EE Misconfiguration: Insufficient Session-ID Length,SC-23,4,Session Authenticity
|
|
4
|
+
7, J2EE Misconfiguration: Missing Custom Error Page,SI-11,4,Error Handling
|
|
5
|
+
8, J2EE Misconfiguration: Entity Bean Declared Remote,AC-3,4,Access Enforcement
|
|
6
|
+
9, J2EE Misconfiguration: Weak Access Permissions for EJB Methods,AC-3,4,Access Enforcement
|
|
7
|
+
11, ASP.NET Misconfiguration: Creating Debug Binary,SI-11,4,Error Handling
|
|
8
|
+
14, Compiler Removal of Code to Clear Buffers,SI-16,4,Memory Protection
|
|
9
|
+
15, External Control of System or Configuration Setting,SI-10,4,Information Input Validation
|
|
10
|
+
20, Improper Input Validation,SI-10,4,Information Input Validation
|
|
11
|
+
22, Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'),SI-10,4,Information Input Validation
|
|
12
|
+
23, Relative Path Traversal,SI-10,4,Information Input Validation
|
|
13
|
+
36, Absolute Path Traversal,SI-10,4,Information Input Validation
|
|
14
|
+
73, External Control of File Name or Path,SI-10,4,Information Input Validation
|
|
15
|
+
77, Improper Neutralization of Special Elements used in a Command ('Command Injection'),SI-10,4,Information Input Validation
|
|
16
|
+
78, Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection'),SI-10,4,Information Input Validation
|
|
17
|
+
79, Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'),SI-10,4,Information Input Validation
|
|
18
|
+
89, Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'),SI-10,4,Information Input Validation
|
|
19
|
+
90, Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection'),SI-10,4,Information Input Validation
|
|
20
|
+
91, XML Injection (aka Blind XPath Injection),SI-10,4,Information Input Validation
|
|
21
|
+
94, Improper Control of Generation of Code ('Code Injection'),SI-10,4,Information Input Validation
|
|
22
|
+
95, Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection'),SI-10,4,Information Input Validation
|
|
23
|
+
99, Improper Control of Resource Identifiers ('Resource Injection'),SI-10,4,Information Input Validation
|
|
24
|
+
101, Struts Validation Problems,SI-10,4,Information Input Validation
|
|
25
|
+
102, Struts: Duplicate Validation Forms,SI-10,4,Information Input Validation
|
|
26
|
+
103, Struts: Incomplete validate() Method Definition,SI-10,4,Information Input Validation
|
|
27
|
+
104, Struts: Form Bean Does Not Extend Validation Class,SI-10,4,Information Input Validation
|
|
28
|
+
105, Struts: Form Field Without Validator,SI-10,4,Information Input Validation
|
|
29
|
+
106, Struts: Plug-in Framework not in Use,SI-10,4,Information Input Validation
|
|
30
|
+
107, Struts: Unused Validation Form,SI-10,4,Information Input Validation
|
|
31
|
+
108, Struts: Unvalidated Action Form,SI-10,4,Information Input Validation
|
|
32
|
+
109, Struts: Validator Turned Off,SI-10,4,Information Input Validation
|
|
33
|
+
110, Struts: Validator Without Form Field,SI-10,4,Information Input Validation
|
|
34
|
+
111, Direct Use of Unsafe JNI,SI-10,4,Information Input Validation
|
|
35
|
+
112, Missing XML Validation,SI-10,4,Information Input Validation
|
|
36
|
+
113, Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Response Splitting'),SI-10,4,Information Input Validation
|
|
37
|
+
114, Process Control,SI-10,4,Information Input Validation
|
|
38
|
+
117, Improper Output Neutralization for Logs,SI-10,4,Information Input Validation
|
|
39
|
+
119, Improper Restriction of Operations within the Bounds of a Memory Buffer,SI-10,4,Information Input Validation
|
|
40
|
+
120, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'),SI-10,4,Information Input Validation
|
|
41
|
+
125, Out-of-bounds Read,SI-10,4,Information Input Validation
|
|
42
|
+
126, Buffer Over-read,SI-10,4,Information Input Validation
|
|
43
|
+
129, Improper Validation of Array Index,,4,
|
|
44
|
+
131, Incorrect Calculation of Buffer Size,SI-10,4,Information Input Validation
|
|
45
|
+
134, Uncontrolled Format String,SI-10,4,Information Input Validation
|
|
46
|
+
170, Improper Null Termination,SI-10,4,Information Input Validation
|
|
47
|
+
176, Improper Handling of Unicode Encoding,,4,
|
|
48
|
+
185, Incorrect Regular Expression,,4,
|
|
49
|
+
189, Numeric Errors,SA-11,4,Developer Security Testing and Evaluation
|
|
50
|
+
190, Integer Overflow or Wraparound,SI-10,4,Information Input Validation
|
|
51
|
+
195, Signed to Unsigned Conversion Error,,4,
|
|
52
|
+
200, Information Exposure,SC-8,4,Transmission Confidentiality and Integrity
|
|
53
|
+
209, Information Exposure Through an Error Message,,4,
|
|
54
|
+
215, Information Exposure Through Debug Information,SI-11,4,Error Handling
|
|
55
|
+
226, Sensitive Information Uncleared Before Release,SC-4,4,Information in Shared Resources
|
|
56
|
+
235, Improper Handling of Extra Parameters,SI-10,4,Information Input Validation
|
|
57
|
+
242, Use of Inherently Dangerous Function,,4,
|
|
58
|
+
243, Creation of chroot Jail Without Changing Working Directory,AC-3,4,Access Enforcement
|
|
59
|
+
244, Improper Cleaning of Heap Memory,SC-4,4,Information in Shared Resources
|
|
60
|
+
245, J2EE Bad Practices: Direct Management of Connections,,4,
|
|
61
|
+
246, J2EE Bad Practices: Direct Use of Sockets,,4,
|
|
62
|
+
248, Uncaught Exception,,4,
|
|
63
|
+
250, Execution with Unnecessary Privileges,AC-6,4,Least Privilege: Privilege Levels for Code Execution
|
|
64
|
+
251, Often Misused: String Management,,4,
|
|
65
|
+
252, Unchecked Return Value,,4,
|
|
66
|
+
256, Plaintext Storage of a Password,SC-28,4,Protection of Information at Rest
|
|
67
|
+
257, Storing Passwords in a Recoverable Format,IA-5,4,Authenticator Management
|
|
68
|
+
258, Empty Password in Configuration File,SC-28,4,Protection of Information at Rest
|
|
69
|
+
259, Use of Hard-coded Password,,4,
|
|
70
|
+
260, Password in Configuration File,SC-28,4,Protection of Information at Rest
|
|
71
|
+
261, Weak Cryptography for Passwords,SC-13,4,Cryptographic Protection
|
|
72
|
+
262, Not Using Password Aging,IA-5,4,Authenticator Management
|
|
73
|
+
263, Password Aging with Long Expiration,IA-5,4,Authenticator Management
|
|
74
|
+
265, Privilege / Sandbox Issues,AC-6,4,Least Privilege
|
|
75
|
+
269, Improper Privilege Management,AC-4,4,Information Flow Enforcement
|
|
76
|
+
272, Least Privilege Violation,AC-6,4,Least Privilege: Privilege Levels for Code Execution -8
|
|
77
|
+
275, Permission Issues,AC-3,4,Access Enforcement
|
|
78
|
+
284, Improper Access Control,AC-3,4,Access Enforcement
|
|
79
|
+
285, Improper Authorization,AC-3,4,Access Enforcement
|
|
80
|
+
288, Authentication Bypass Using an Alternate Path or Channel,IA-8,4,Identification and Authentication (Non-Organizational Users)
|
|
81
|
+
297, Improper Validation of Certificate with Host Mismatch,SC-8,4,Transmission Confidentiality and Integrity
|
|
82
|
+
302, Authentication Bypass by Assumed-Immutable Data,SC-23,4,Session Authenticity
|
|
83
|
+
305, Authentication Bypass by Primary Weakness,IA-8,4,Identification and Authentication (Non-Organizational Users)
|
|
84
|
+
306, Missing Authentication for Critical Function,AC-3,4,Access Enforcement
|
|
85
|
+
307, Improper Restriction of Excessive Authentication Attempts,AC-7,4,Unsuccessful Logon Attempts
|
|
86
|
+
310, Cryptographic Issues,SC-13,4,Cryptographic Protection
|
|
87
|
+
311, Missing Encryption of Sensitive Data,SC-8,4,Transmission Confidentiality and Integrity
|
|
88
|
+
321, Use of Hard-coded Cryptographic Key,SC-12,4,Cryptographic Key Establishment and Management
|
|
89
|
+
325, Missing Required Cryptographic Step,SC-13,4,Cryptographic Protection
|
|
90
|
+
326, Inadequate Encryption Strength,SC-12,4,Cryptographic Key Establishment and Management
|
|
91
|
+
327, Use of a Broken or Risky Cryptographic Algorithm,SC-13,4,Cryptographic Protection
|
|
92
|
+
328, Reversible One-Way Hash,SC-13,4,Cryptographic Protection
|
|
93
|
+
329, Not Using a Random IV with CBC Mode,SC-12,4,Cryptographic Key Establishment and Management
|
|
94
|
+
330, Use of Insufficiently Random Values,SC-13,4,Cryptographic Protection
|
|
95
|
+
331, Insufficient Entropy,SC-13,4,Cryptographic Protection
|
|
96
|
+
335, PRNG Seed Error,SC-13,4,Cryptographic Protection
|
|
97
|
+
336, Same Seed in PRNG,SC-13,4,Cryptographic Protection
|
|
98
|
+
338, Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG),SC-13,4,Cryptographic Protection
|
|
99
|
+
345, Insufficient Verification of Data Authenticity,SC-8,4,Transmission Confidentiality and Integrity
|
|
100
|
+
350, Reliance on Reverse DNS Resolution for a Security-Critical Function,SI-10,4,Information Input Validation
|
|
101
|
+
352, Cross-Site Request Forgery (CSRF),AC-3,4,Access Enforcement
|
|
102
|
+
358, Improperly Implemented Security Check for Standard,AC-3,4,Access Enforcement
|
|
103
|
+
359, Exposure of Private Information ('Privacy Violation'),SC-28,4,Protection of Information at Rest
|
|
104
|
+
362, Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'),SC-4,4,Information in Shared Resources
|
|
105
|
+
364, Signal Handler Race Condition,,4,
|
|
106
|
+
369, Divide by Zero,,4,
|
|
107
|
+
377, Insecure Temporary File,SC-4,4,Information in Shared Resources (P1)
|
|
108
|
+
382, J2EE Bad Practices: Use of System.exit(),,4,
|
|
109
|
+
383, J2EE Bad Practices: Direct Use of Threads,,4,
|
|
110
|
+
384, Session Fixation,SC-23,4,Session Authenticity
|
|
111
|
+
388, Error Handling,SI-11,4,Error Handling
|
|
112
|
+
391, Unchecked Error Condition,SI-11,4,Error Handling
|
|
113
|
+
395, Use of NullPointerException Catch to Detect NULL Pointer Dereference,SI-11,4,Error Handling
|
|
114
|
+
396, Declaration of Catch for Generic Exception,SI-11,4,Error Handling
|
|
115
|
+
397, Declaration of Throws for Generic Exception,SI-11,4,Error Handling
|
|
116
|
+
398, Indicator of Poor Code Quality,,4,
|
|
117
|
+
400, Uncontrolled Resource Consumption ('Resource Exhaustion'),SI-10,4,Information Input Validation
|
|
118
|
+
401, Improper Release of Memory Before Removing Last Reference,,4,
|
|
119
|
+
404, Improper Resource Shutdown or Release,,4,
|
|
120
|
+
415, Double Free,,4,
|
|
121
|
+
416, Use after Free,SC-4,4,Information in Shared Resources
|
|
122
|
+
434, Unrestricted Upload of File with Dangerous Type,AC-6,4,Least Privilege: Privilege Levels for Code Execution
|
|
123
|
+
444, Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling'),SI-10,4,Information Input Validation
|
|
124
|
+
457, Use of Uninitialized Variable,,4,
|
|
125
|
+
466, Return of Pointer Value Outside of Expected Range,,4,
|
|
126
|
+
470, Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection'),SI-10,4,Information Input Validation
|
|
127
|
+
471, Modification of Assumed-Immutable DATA (MAID),AC-3,4,Access Enforcement
|
|
128
|
+
474, Use of Function with Inconsistent Implementations,,4,
|
|
129
|
+
475, Undefined Behavior for Input to API,,4,
|
|
130
|
+
476, NULL Pointer Dereference,SI-10,4,Information Input Validation
|
|
131
|
+
477, Use of Obsolete Functions,,4,
|
|
132
|
+
478, Missing Default Case in Switch Statement,,4,
|
|
133
|
+
492, Use of Inner Class Containing Sensitive Data,AC-3,4,Access Enforcement
|
|
134
|
+
493, Critical Public Variable Without Final Modifier,SI-11,4,Error Handling
|
|
135
|
+
494, Download of Code Without Integrity Check,SI-10,4,Information Input Validation
|
|
136
|
+
495, Private Array-Typed Field Returned From A Public Method,AC-3,4,Access Enforcement
|
|
137
|
+
497, Exposure of System Data to an Unauthorized Control Sphere,SI-11,4,Error Handling
|
|
138
|
+
501, Trust Boundary Violation,SI-10,4,Information Input Validation
|
|
139
|
+
502, Deserialization of Untrusted Data,SI-10,4,Information Input Validation
|
|
140
|
+
521, Weak Password Requirements,IA-5,4,Authenticator Management : -1 Password-based Authentication
|
|
141
|
+
522, Insufficiently Protected Credentials,SC-8,4,Transmission Confidentiality and Integrity
|
|
142
|
+
539, Information Exposure Through Persistent Cookies,SC-23,4,Session Authenticity
|
|
143
|
+
546, Suspicious Comment,,4,
|
|
144
|
+
557, Concurrency Issues,,4,
|
|
145
|
+
560, Use of umask() with chmod-style Argument,,4,
|
|
146
|
+
561, Dead Code,,4,
|
|
147
|
+
562, Return of Stack Variable Address,,4,
|
|
148
|
+
563, Assigntment to Variable without Use,,4,
|
|
149
|
+
564, SQL Injection: Hibernate,SI-10,4,Information Input Validation
|
|
150
|
+
566, Authorization Bypass Through User-Controlled SQL Primary Key,AC-3,4,Access Enforcement
|
|
151
|
+
568, finalize() Method without super.finalize(),,4,
|
|
152
|
+
574, EJB Bad Practices: Use of Synchronization Primitives,,4,
|
|
153
|
+
575, EJB Bad Practices: Use of AWT Swing,,4,
|
|
154
|
+
576, EJB Bad Practices: Use of java I/O,,4,
|
|
155
|
+
577, EJB Bad Practices: Use of Sockets,,4,
|
|
156
|
+
578, EJB Bad Practices: Use of Class Loader,,4,
|
|
157
|
+
579, J2EE Bad Practices: Non-serializable Object Stored in Session,,4,
|
|
158
|
+
580, clone() Method Without super.clone(),,4,
|
|
159
|
+
581, Object Model Violation: Just One of Equals and Hashcode Defined,,4,
|
|
160
|
+
582, Array Declared Public,AC-3,4,Access Enforcement
|
|
161
|
+
583, finalize() Method Declared Public,AC-3,4,Access Enforcement
|
|
162
|
+
584, Return Inside Finally Block,SI-11,4,Error Handling
|
|
163
|
+
586, Explicit Call to Finalize(),,4,
|
|
164
|
+
590, Free of Memory not on the Heap,,4,
|
|
165
|
+
591, Sensitive Data Storage in Improperly Locked Memory,SC-4,4,Information in Shared Resources
|
|
166
|
+
601, URL Redirection to Untrusted Site ('Open Redirect'),SI-10,4,Information Input Validation
|
|
167
|
+
607, Public Static Final Field References Mutable Object,,4,
|
|
168
|
+
609, Double-Checked Locking,,4,
|
|
169
|
+
611, Improper Restriction of XML External Entity Reference ('XXE'),SI-10,4,Information Input Validation
|
|
170
|
+
613, Insufficient Session Expiration,AC-12,4,Session Termination
|
|
171
|
+
614, Sensitive Cookie in HTTPS Session Without 'Secure' Attribute,SC-8,4,Transmission Confidentiality and Integrity
|
|
172
|
+
615, Information Exposure Through Comments,AC-3,4,Access Enforcement : -5 Security-Relevant Information
|
|
173
|
+
639, Authorization Bypass Through User-Controlled Key,AC-3,4,Access Enforcement
|
|
174
|
+
642, External Control of Critical State Data,,4,
|
|
175
|
+
643, Improper Neutralization of Data within XPath Expressions ('XPath Injection'),SI-10,4,Information Input Validation
|
|
176
|
+
651, Information Exposure Through WSDL File,,4,
|
|
177
|
+
652, Improper Neutralization of Data within XQuery Expressions ('XQuery Injection'),SI-10,4,Information Input Validation
|
|
178
|
+
662, Improper Synchonization,,4,
|
|
179
|
+
667, Improper Locking,,4,
|
|
180
|
+
676, Use of Potentially Dangerous Function,,4,
|
|
181
|
+
690, Unchecked Return Value to NULL Pointer Dereference,,4,
|
|
182
|
+
691, Insufficient Control Flow Management,SI-11,4,Error Handling
|
|
183
|
+
693, Protection Mechanism Failure,IA-5,4,Authenticator Management
|
|
184
|
+
694, Use of Multiple Resources with Duplicate Identifier,,4,
|
|
185
|
+
732, Incorrect Permission Assignment for Critical Resource,AC-3,4,Access Enforcement
|
|
186
|
+
733, Compiler Optimization Removal or Modification of Security-critical Code,,4,
|
|
187
|
+
759, Use of a One-Way Hash without a Salt,SC-13,4,Cryptographic Protection
|
|
188
|
+
760, Use of a One-Way Hash with a Predictable Salt,SC-13,4,Cryptographic Protection
|
|
189
|
+
776, Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion'),,4,
|
|
190
|
+
780, Use of RSA Algorithm without OAEP,SC-13,4,Cryptographic Protection
|
|
191
|
+
785, Use of Path Manipulation Function without Maximum-sized Buffer,SI-10,4,Information Input Validation
|
|
192
|
+
787, Out-of-bounds Write,SI-10,4,Information Input Validation
|
|
193
|
+
798, Use of Hard-coded Credentials,,4,
|
|
194
|
+
805, Buffer Access with Incorrect Length Value,SI-10,4,Information Input Validation
|
|
195
|
+
807, Reliance on Untrusted Inputs in a Security Decision,SC-23,4,Session Authenticity
|
|
196
|
+
820, Missing Synchronization,,4,
|
|
197
|
+
821, Incorrect Synchronization,,4,
|
|
198
|
+
829, Inclusion of Functionality from Untrusted Control Sphere,,4,
|
|
199
|
+
862, Missing Authorization,AC-3,4,Access Enforcement
|
|
200
|
+
863, Incorrect Authorization,AC-3,4,Access Enforcement
|
|
201
|
+
915, Improperly Controlled Modification of Dynamically-Determined Object Attributes,SI-10,4,Information Input Validation
|
|
202
|
+
916, Use of Password Hash With Insufficient Computational Effort,SC-13,4,Cryptographic Protection
|
|
203
|
+
918, Server-Side Request Forgery (SSRF),SI-10,4,Information Input Validation
|
|
@@ -0,0 +1,108 @@
|
|
|
1
|
+
pluginFamily,pluginID,NIST-ID,Rev
|
|
2
|
+
AIX Local Security Checks,*,SI-2|RA-5,4
|
|
3
|
+
Amazon Linux Local Security Checks,*,SI-2|RA-5,4
|
|
4
|
+
CentOS Local Security Checks,*,SI-2|RA-5,4
|
|
5
|
+
Debian Local Security Checks,*,SI-2|RA-5,4
|
|
6
|
+
F5 Networks Local Security Checks,*,SI-2|RA-5,4
|
|
7
|
+
Fedora Local Security Checks,*,SI-2|RA-5,4
|
|
8
|
+
FreeBSD Local Security Checks,*,SI-2|RA-5,4
|
|
9
|
+
Gentoo Local Security Checks,*,SI-2|RA-5,4
|
|
10
|
+
HP-UX Local Security Checks,*,SI-2|RA-5,4
|
|
11
|
+
Huawei Local Security Checks,*,SI-2|RA-5,4
|
|
12
|
+
Junos Local Security Checks,*,SI-2|RA-5,4
|
|
13
|
+
MacOS X Local Security Checks,*,SI-2|RA-5,4
|
|
14
|
+
Mandriva Local Security Checks,*,SI-2|RA-5,4
|
|
15
|
+
NewStart CGSL Local Security Checks,*,SI-2|RA-5,4
|
|
16
|
+
Oracle Linux Local Security Checks,*,SI-2|RA-5,4
|
|
17
|
+
OracleVM Local Security Checks,*,SI-2|RA-5,4
|
|
18
|
+
Palo Alto Local Security Checks,*,SI-2|RA-5,4
|
|
19
|
+
PhotonOS Local Security Checks,*,SI-2|RA-5,4
|
|
20
|
+
Red Hat Local Security Checks,*,SI-2|RA-5,4
|
|
21
|
+
Scientific Linux Local Security Checks,*,SI-2|RA-5,4
|
|
22
|
+
Slackware Local Security Checks,*,SI-2|RA-5,4
|
|
23
|
+
Solaris Local Security Checks,*,SI-2|RA-5,4
|
|
24
|
+
SuSE Local Security Checks,*,SI-2|RA-5,4
|
|
25
|
+
Ubuntu Local Security Checks,*,SI-2|RA-5,4
|
|
26
|
+
VMware ESX Local Security Checks,*,SI-2|RA-5,4
|
|
27
|
+
Virtuozzo Local Security Checks,*,SI-2|RA-5,4
|
|
28
|
+
Backdoors,,,
|
|
29
|
+
Brute force attacks,,,
|
|
30
|
+
CGI abuses,,,
|
|
31
|
+
CGI abuses : XSS,,,
|
|
32
|
+
CISCO,,,
|
|
33
|
+
DNS,,,
|
|
34
|
+
Databases,,,
|
|
35
|
+
Default Unix Accounts,,,
|
|
36
|
+
Denial of Service,,,
|
|
37
|
+
FTP,,,
|
|
38
|
+
Firewalls,56310,SC-7,4
|
|
39
|
+
Gain a shell remotely,,,
|
|
40
|
+
General,133964,AC-3(4),4
|
|
41
|
+
General,117530,UM-1,4
|
|
42
|
+
General,110483,CM-7,4
|
|
43
|
+
General,95928,AC-2,4
|
|
44
|
+
General,90191,CM-8,4
|
|
45
|
+
General,86420,CM-8,4
|
|
46
|
+
General,70544,AC-17(2)|SC-13,4
|
|
47
|
+
General,66334,SI-2|RA-5,4
|
|
48
|
+
General,64582,CM-8,4
|
|
49
|
+
General,57582,SC-12,4
|
|
50
|
+
General,57041,AC-17(2)|SC-13,4
|
|
51
|
+
General,56984,AC-17(2)|SC-13,4
|
|
52
|
+
General,56468,CM-8,4
|
|
53
|
+
General,55472,CM-8,4
|
|
54
|
+
General,54615,CM-8,4
|
|
55
|
+
General,51192,SC-12,4
|
|
56
|
+
General,45590,CM-8,4
|
|
57
|
+
General,45432,CM-8,4
|
|
58
|
+
General,45410,SC-12,4
|
|
59
|
+
General,39520,SI-2|RA-5,4
|
|
60
|
+
General,35351,CM-8,4
|
|
61
|
+
General,34098,CM-8,4
|
|
62
|
+
General,33276,CM-8,4
|
|
63
|
+
General,25220,SC-8,4
|
|
64
|
+
General,25203,CM-8,4
|
|
65
|
+
General,25202,CM-8,4
|
|
66
|
+
General,22869,CM-8,4
|
|
67
|
+
General,21643,AC-17(2)|SC-13,4
|
|
68
|
+
General,12053,CM-8,4
|
|
69
|
+
General,11936,CM-8,4
|
|
70
|
+
General,10881,AC-17(2)|SC-13,4
|
|
71
|
+
General,10863,SC-12,4
|
|
72
|
+
General,10287,CM-8,4
|
|
73
|
+
General,10114,CM-6,4
|
|
74
|
+
Misc.,118237,CM-8,4
|
|
75
|
+
Misc.,97993,CM-8,4
|
|
76
|
+
Misc.,90707,CM-8,4
|
|
77
|
+
Misc.,84821,AC-17(2)|SC-13,4
|
|
78
|
+
Misc.,83875,AC-17(2)|SC-13,4
|
|
79
|
+
Misc.,70657,AC-17(2)|SC-13,4
|
|
80
|
+
Misc.,58651,AC-17,4
|
|
81
|
+
Mobile Devices,,,
|
|
82
|
+
Netware,,,
|
|
83
|
+
Peer-To-Peer File Sharing,,,
|
|
84
|
+
Policy Compliance,,,
|
|
85
|
+
Port scanners,14272,CM-8,4
|
|
86
|
+
RPC,53335,CM-8,4
|
|
87
|
+
RPC,10223,CM-8,4
|
|
88
|
+
SCADA,,,
|
|
89
|
+
SMTP problems,,,
|
|
90
|
+
SNMP,,,
|
|
91
|
+
Service detection,121010,AC-17(2)|SC-13,4
|
|
92
|
+
Service detection,104743,AC-17(2)|SC-13,4
|
|
93
|
+
Service detection,25221,CM-8,4
|
|
94
|
+
Service detection,22964,CM-8,4
|
|
95
|
+
Service detection,11111,CM-8,4
|
|
96
|
+
Service detection,10884,AU-8(1),4
|
|
97
|
+
Service detection,10267,AC-17(2),4
|
|
98
|
+
Settings,117887,UM-1,4
|
|
99
|
+
Settings,110095,UM-1,4
|
|
100
|
+
Settings,19506,UM-1,4
|
|
101
|
+
Web Servers,85805,SC-8|SC-13,4
|
|
102
|
+
Web Servers,84502,AC-17(2)|SC-13,4
|
|
103
|
+
Web Servers,43111,CM-8,4
|
|
104
|
+
Web Servers,24260,CM-8,4
|
|
105
|
+
Web Servers,10107,CM-8,4
|
|
106
|
+
Windows,,,
|
|
107
|
+
Windows : Microsoft Bulletins,,,
|
|
108
|
+
Windows : User management,,,
|