txt2stix 1.1.8__py3-none-any.whl → 1.1.10__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- txt2stix/includes/extractions/ai/config.yaml +20 -0
- txt2stix/includes/extractions/lookup/config.yaml +33 -15
- txt2stix/includes/lookups/_generate_lookups.py +39 -30
- txt2stix/includes/lookups/{disarm_id_v1_5.txt → disarm_id_v1_6.txt} +95 -32
- txt2stix/includes/lookups/{disarm_name_v1_5.txt → disarm_name_v1_6.txt} +380 -317
- txt2stix/includes/lookups/{mitre_atlas_id_v4_5_2.txt → mitre_atlas_id_v4_9_0.txt} +41 -1
- txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt +157 -0
- txt2stix/includes/lookups/{mitre_attack_enterprise_aliases_v16_0.txt → mitre_attack_enterprise_aliases_v18_0.txt} +679 -531
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt +4293 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt +4295 -0
- txt2stix/includes/lookups/{mitre_attack_ics_aliases_v16_0.txt → mitre_attack_ics_aliases_v18_0.txt} +7 -3
- txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt +410 -0
- txt2stix/includes/lookups/{mitre_attack_ics_name_v16_0.txt → mitre_attack_ics_name_v18_0.txt} +172 -53
- txt2stix/includes/lookups/{mitre_attack_mobile_aliases_v16_0.txt → mitre_attack_mobile_aliases_v18_0.txt} +33 -0
- txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt +643 -0
- txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt +645 -0
- txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +522 -522
- txt2stix/includes/lookups/{mitre_cwe_id_v4_15.txt → mitre_cwe_id_v4_18.txt} +5 -0
- txt2stix/includes/lookups/{mitre_cwe_name_v4_15.txt → mitre_cwe_name_v4_18.txt} +889 -884
- txt2stix/includes/lookups/sector_aliases_v1_0.txt +751 -0
- txt2stix/includes/tests/test_cases.yaml +8 -0
- txt2stix/retriever.py +6 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/METADATA +2 -10
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/RECORD +27 -26
- txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +0 -117
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +0 -1656
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +0 -1765
- txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +0 -254
- txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +0 -277
- txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +0 -296
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/WHEEL +0 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/entry_points.txt +0 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/licenses/LICENSE +0 -0
|
@@ -1,939 +1,944 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
|
|
1
|
+
Reliance on Machine-Dependent Data Representation
|
|
2
|
+
Path Traversal: '../filedir'
|
|
3
|
+
Improper Access Control Applied to Mirrored or Aliased Memory Regions
|
|
4
|
+
Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution
|
|
5
|
+
Unchecked Error Condition
|
|
6
|
+
Spyware
|
|
7
|
+
Duplicate Key in Associative List (Alist)
|
|
8
|
+
Empty Password in Configuration File
|
|
9
|
+
Function Call With Incorrect Order of Arguments
|
|
9
10
|
Struts: Incomplete validate() Method Definition
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
11
|
+
Incorrect Control Flow Scoping
|
|
12
|
+
Covert Channel
|
|
13
|
+
Exposure of Backup File to an Unauthorized Control Sphere
|
|
14
|
+
Improper Clearing of Heap Memory Before Release ('Heap Inspection')
|
|
15
|
+
Reflection Attack in an Authentication Protocol
|
|
16
|
+
Use of Hard-coded Cryptographic Key
|
|
17
|
+
Off-by-one Error
|
|
18
|
+
Use of Less Trusted Source
|
|
19
|
+
Use of Wrong Operator in String Comparison
|
|
20
|
+
ASP.NET Misconfiguration: Improper Model Validation
|
|
21
|
+
Improper Handling of Length Parameter Inconsistency
|
|
22
|
+
Expired Pointer Dereference
|
|
23
|
+
Null Byte Interaction Error (Poison Null Byte)
|
|
24
|
+
Improper Verification of Cryptographic Signature
|
|
25
|
+
Missing Critical Step in Authentication
|
|
26
|
+
Improper Neutralization of Value Delimiters
|
|
27
|
+
Insufficient Isolation of Symbolic Constant Definitions
|
|
28
|
+
Improper Handling of Overlap Between Protected Memory Ranges
|
|
29
|
+
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
|
|
30
|
+
Path Traversal: '/../filedir'
|
|
31
|
+
Improper Neutralization of Leading Special Elements
|
|
32
|
+
Improper Null Termination
|
|
33
|
+
Privilege Dropping / Lowering Errors
|
|
34
|
+
Path Traversal: '...' (Triple Dot)
|
|
35
|
+
Reliance on Cookies without Validation and Integrity Checking
|
|
36
|
+
Missing Release of File Descriptor or Handle after Effective Lifetime
|
|
37
|
+
Reliance on HTTP instead of HTTPS
|
|
38
|
+
Improper Neutralization of Data within XPath Expressions ('XPath Injection')
|
|
39
|
+
Improper Restriction of Write-Once Bit Fields
|
|
40
|
+
Use of Inherently Dangerous Function
|
|
41
|
+
Improper Verification of Source of a Communication Channel
|
|
19
42
|
Creation of Immutable Text Using String Concatenation
|
|
20
43
|
Modules with Circular Dependencies
|
|
21
|
-
|
|
22
|
-
Excessive Data Query Operations in a Large Data Table
|
|
23
|
-
Struts: Form Field Without Validator
|
|
24
|
-
Excessive Platform Resource Consumption within a Loop
|
|
25
|
-
Initialization with Hard-Coded Network Resource Configuration Data
|
|
26
|
-
Excessive Use of Hard-Coded Literals in Initialization
|
|
27
|
-
Missing Documentation for Design
|
|
28
|
-
Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer
|
|
29
|
-
Multiple Inheritance from Concrete Classes
|
|
30
|
-
Invokable Control Element with Variadic Parameters
|
|
31
|
-
Data Access Operations Outside of Expected Data Manager Component
|
|
32
|
-
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element
|
|
33
|
-
Insufficient Technical Documentation
|
|
34
|
-
Struts: Plug-in Framework not in Use
|
|
35
|
-
Excessive Number of Inefficient Server-Side Data Accesses
|
|
36
|
-
Insufficient Encapsulation
|
|
37
|
-
Parent Class with References to Child Class
|
|
38
|
-
Creation of Class Instance within a Static Code Block
|
|
39
|
-
Invokable Control Element with Signature Containing an Excessive Number of Parameters
|
|
40
|
-
Runtime Resource Management Control Element in a Component Built to Run on Application Servers
|
|
41
|
-
Missing Serialization Control Element
|
|
42
|
-
Excessive Execution of Sequential Searches of Data Resource
|
|
43
|
-
Inconsistency Between Implementation and Documented Design
|
|
44
|
-
Empty Exception Block
|
|
45
|
-
Struts: Unused Validation Form
|
|
46
|
-
Serializable Data Element Containing non-Serializable Item Elements
|
|
47
|
-
Empty Code Block
|
|
48
|
-
Data Resource Access without Use of Connection Pooling
|
|
49
|
-
Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses
|
|
50
|
-
Class with Excessively Deep Inheritance
|
|
51
|
-
Unconditional Control Flow Transfer outside of Switch Block
|
|
52
|
-
Insufficient Adherence to Expected Conventions
|
|
53
|
-
Floating Point Comparison with Incorrect Operator
|
|
54
|
-
Inappropriate Source Code Style or Formatting
|
|
55
|
-
Parent Class without Virtual Destructor Method
|
|
56
|
-
Struts: Unvalidated Action Form
|
|
57
|
-
Source Code File with Excessive Number of Lines of Code
|
|
58
|
-
Class Instance Self Destruction Control Element
|
|
59
|
-
Data Access from Outside Expected Data Manager Component
|
|
60
|
-
Invokable Control Element with Excessive File or Data Access Operations
|
|
61
|
-
Invokable Control Element with Excessive Volume of Commented-out Code
|
|
62
|
-
Class with Excessive Number of Child Classes
|
|
63
|
-
Class with Virtual Method without a Virtual Destructor
|
|
64
|
-
Synchronous Access of Remote Resource without Timeout
|
|
65
|
-
Large Data Table with Excessive Number of Indices
|
|
66
|
-
Struts: Validator Turned Off
|
|
67
|
-
Method Containing Access of a Member Element from Another Class
|
|
68
|
-
Use of Object without Invoking Destructor Method
|
|
69
|
-
Use of Same Invokable Control Element in Multiple Architectural Layers
|
|
70
|
-
Excessively Complex Data Representation
|
|
71
|
-
Excessive Index Range Scan for a Data Resource
|
|
72
|
-
Loop Condition Value Update within the Loop
|
|
73
|
-
Singleton Class Instance Creation without Proper Locking or Synchronization
|
|
74
|
-
Persistent Storable Data Element without Associated Comparison Control Element
|
|
75
|
-
Data Element containing Pointer Item without Proper Copy Control Element
|
|
76
|
-
Inconsistent Naming Conventions for Identifiers
|
|
77
|
-
ASP.NET Misconfiguration: Creating Debug Binary
|
|
78
|
-
Struts: Validator Without Form Field
|
|
79
|
-
Insufficient Isolation of System-Dependent Functions
|
|
80
|
-
Reliance on Runtime Component in Generated Code
|
|
81
|
-
Reliance on Machine-Dependent Data Representation
|
|
82
|
-
Use of Platform-Dependent Third Party Components
|
|
83
|
-
Use of Unmaintained Third Party Components
|
|
84
|
-
Insufficient Encapsulation of Machine-Dependent Functionality
|
|
85
|
-
Insufficient Use of Symbolic Constants
|
|
86
|
-
Insufficient Isolation of Symbolic Constant Definitions
|
|
87
|
-
Excessive Reliance on Global Variables
|
|
88
|
-
Use of Same Variable for Multiple Purposes
|
|
89
|
-
Direct Use of Unsafe JNI
|
|
90
|
-
Incomplete Design Documentation
|
|
91
|
-
Incomplete I/O Documentation
|
|
92
|
-
Incomplete Documentation of Program Execution
|
|
93
|
-
Inappropriate Comment Style
|
|
94
|
-
Inappropriate Whitespace Style
|
|
95
|
-
Source Code Element without Standard Prologue
|
|
96
|
-
Inaccurate Comments
|
|
97
|
-
Callable with Insufficient Behavioral Summary
|
|
98
|
-
Insufficient Documentation of Error Handling Techniques
|
|
99
|
-
Excessive Use of Unconditional Branching
|
|
100
|
-
Missing XML Validation
|
|
101
|
-
Excessive Code Complexity
|
|
102
|
-
Excessive McCabe Cyclomatic Complexity
|
|
44
|
+
Omission of Security-relevant Information
|
|
103
45
|
Excessive Halstead Complexity
|
|
104
|
-
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
110
|
-
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
46
|
+
J2EE Misconfiguration: Weak Access Permissions for EJB Methods
|
|
47
|
+
Server-Side Request Forgery (SSRF)
|
|
48
|
+
Public Static Field Not Marked Final
|
|
49
|
+
Use of GET Request Method With Sensitive Query Strings
|
|
50
|
+
Not Failing Securely ('Failing Open')
|
|
51
|
+
Incorrect Regular Expression
|
|
52
|
+
Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor
|
|
53
|
+
Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
|
|
54
|
+
Access of Resource Using Incompatible Type ('Type Confusion')
|
|
55
|
+
Insufficient Resource Pool
|
|
56
|
+
Permissive List of Allowed Inputs
|
|
57
|
+
Path Equivalence: 'filename ' (Trailing Space)
|
|
58
|
+
Callable with Insufficient Behavioral Summary
|
|
59
|
+
Missing Source Correlation of Multiple Independent Data
|
|
60
|
+
Exposure of Version-Control Repository to an Unauthorized Control Sphere
|
|
61
|
+
Improper Neutralization of Invalid Characters in Identifiers in Web Pages
|
|
62
|
+
Path Traversal: '\\UNC\share\name\' (Windows UNC Share)
|
|
63
|
+
Missing Encryption of Sensitive Data
|
|
64
|
+
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
|
|
65
|
+
Improper Neutralization of Escape, Meta, or Control Sequences
|
|
117
66
|
Inefficient CPU Computation
|
|
118
|
-
|
|
67
|
+
Path Equivalence: 'file...name' (Multiple Internal Dot)
|
|
68
|
+
Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
|
|
119
69
|
Incorrect Access of Indexable Resource ('Range Error')
|
|
120
|
-
|
|
121
|
-
|
|
122
|
-
|
|
70
|
+
Excessive Data Query Operations in a Large Data Table
|
|
71
|
+
Use of Blocking Code in Single-threaded, Non-blocking Context
|
|
72
|
+
Missing Protection Mechanism for Alternate Hardware Interface
|
|
73
|
+
Incorrect Calculation
|
|
74
|
+
Application-Level Admin Tool with Inconsistent View of Underlying Operating System
|
|
123
75
|
DMA Device Enabled Too Early in Boot Phase
|
|
124
|
-
|
|
125
|
-
|
|
126
|
-
|
|
127
|
-
|
|
128
|
-
|
|
129
|
-
|
|
130
|
-
|
|
131
|
-
|
|
132
|
-
|
|
133
|
-
|
|
134
|
-
|
|
135
|
-
|
|
136
|
-
|
|
137
|
-
|
|
138
|
-
|
|
76
|
+
Missing Initialization of Resource
|
|
77
|
+
Externally-Generated Error Message Containing Sensitive Information
|
|
78
|
+
Reliance on Data/Memory Layout
|
|
79
|
+
Improper Handling of Undefined Parameters
|
|
80
|
+
Improper Neutralization of Script in Attributes in a Web Page
|
|
81
|
+
ASP.NET Misconfiguration: Creating Debug Binary
|
|
82
|
+
Improper Validation of Function Hook Arguments
|
|
83
|
+
Improper Handling of Extra Values
|
|
84
|
+
Authorization Bypass Through User-Controlled SQL Primary Key
|
|
85
|
+
Invokable Control Element with Excessive File or Data Access Operations
|
|
86
|
+
Path Equivalence: '\multiple\\internal\backslash'
|
|
87
|
+
Excessive Use of Hard-Coded Literals in Initialization
|
|
88
|
+
Modification of Assumed-Immutable Data (MAID)
|
|
89
|
+
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
|
|
90
|
+
Windows Shortcut Following (.LNK)
|
|
91
|
+
Excessive Reliance on Global Variables
|
|
92
|
+
XML Injection (aka Blind XPath Injection)
|
|
93
|
+
Improper Isolation or Compartmentalization
|
|
94
|
+
Improper Protection of Alternate Path
|
|
95
|
+
Misinterpretation of Input
|
|
96
|
+
Improper Restriction of Names for Files and Other Resources
|
|
97
|
+
Missing Support for Security Features in On-chip Fabrics or Buses
|
|
98
|
+
Incorrect Behavior Order: Validate Before Canonicalize
|
|
99
|
+
External Influence of Sphere Definition
|
|
100
|
+
Improper Handling of URL Encoding (Hex Encoding)
|
|
101
|
+
Improper Enforcement of Message Integrity During Transmission in a Communication Channel
|
|
102
|
+
Improper Control of Document Type Definition
|
|
103
|
+
J2EE Misconfiguration: Missing Custom Error Page
|
|
104
|
+
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
|
|
139
105
|
Write-what-where Condition
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
|
|
147
|
-
Improper Zeroization of Hardware Register
|
|
148
|
-
Buffer Underwrite ('Buffer Underflow')
|
|
149
|
-
Use of a Cryptographic Primitive with a Risky Implementation
|
|
150
|
-
Use of Predictable Algorithm in Random Number Generator
|
|
151
|
-
Inclusion of Undocumented Features or Chicken Bits
|
|
152
|
-
Sensitive Non-Volatile Information Not Protected During Debug
|
|
153
|
-
Internal Asset Exposed to Unsafe Debug Access Level or State
|
|
106
|
+
External Control of Critical State Data
|
|
107
|
+
Synchronous Access of Remote Resource without Timeout
|
|
108
|
+
Use of Out-of-range Pointer Offset
|
|
109
|
+
Remanent Data Readable after Memory Erase
|
|
110
|
+
Struts: Validator Turned Off
|
|
111
|
+
Insufficient Use of Symbolic Constants
|
|
112
|
+
Use of Non-Canonical URL Paths for Authorization Decisions
|
|
154
113
|
Improper Finite State Machines (FSMs) in Hardware Logic
|
|
155
|
-
Improper
|
|
156
|
-
|
|
157
|
-
|
|
158
|
-
|
|
159
|
-
|
|
160
|
-
|
|
161
|
-
|
|
162
|
-
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
|
|
163
|
-
Incorrect Selection of Fuse Values
|
|
164
|
-
Incorrect Comparison Logic Granularity
|
|
165
|
-
Comparison Logic is Vulnerable to Power Side-Channel Attacks
|
|
166
|
-
Improper Restriction of Software Interfaces to Hardware Features
|
|
167
|
-
Improper Access Control Applied to Mirrored or Aliased Memory Regions
|
|
168
|
-
Exposure of Sensitive System Information Due to Uncleared Debug Information
|
|
169
|
-
Improper Restriction of Security Token Assignment
|
|
170
|
-
Buffer Over-read
|
|
171
|
-
Improper Handling of Overlap Between Protected Memory Ranges
|
|
172
|
-
Improper Handling of Single Event Upsets
|
|
173
|
-
Improper Access Control for Register Interface
|
|
174
|
-
Improper Physical Access Control
|
|
175
|
-
Hardware Logic with Insecure De-Synchronization between Control and Data Channels
|
|
176
|
-
Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls
|
|
177
|
-
Improper Scrubbing of Sensitive Data from Decommissioned Device
|
|
178
|
-
Policy Uses Obsolete Encoding
|
|
179
|
-
Policy Privileges are not Assigned Consistently Between Control and Data Agents
|
|
180
|
-
Product Released in Non-Release Configuration
|
|
181
|
-
Buffer Under-read
|
|
182
|
-
Generation of Incorrect Security Tokens
|
|
183
|
-
Uninitialized Value on Reset for Registers Holding Security Settings
|
|
184
|
-
Sensitive Information Uncleared Before Debug/Power State Transition
|
|
185
|
-
Device Unlock Credential Sharing
|
|
186
|
-
Improper Access Control for Volatile Memory Containing Boot Code
|
|
187
|
-
Sensitive Cookie with Improper SameSite Attribute
|
|
188
|
-
Hardware Child Block Incorrectly Connected to Parent System
|
|
189
|
-
Firmware Not Updateable
|
|
190
|
-
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
|
|
191
|
-
Cryptographic Operations are run Before Supporting Units are Ready
|
|
192
|
-
Wrap-around Error
|
|
193
|
-
Access Control Check Implemented After Asset is Accessed
|
|
194
|
-
Sequence of Processor Instructions Leads to Unexpected Behavior
|
|
195
|
-
Assumed-Immutable Data is Stored in Writable Memory
|
|
196
|
-
Mutable Attestation or Measurement Reporting Data
|
|
197
|
-
Improper Validation of Specified Quantity in Input
|
|
198
|
-
Improper Validation of Specified Index, Position, or Offset in Input
|
|
199
|
-
Improper Validation of Syntactic Correctness of Input
|
|
200
|
-
Improper Validation of Specified Type of Input
|
|
201
|
-
Improper Validation of Consistency within Input
|
|
202
|
-
Improper Validation of Unsafe Equivalence in Input
|
|
203
|
-
Improper Validation of Array Index
|
|
204
|
-
Incorrect Decoding of Security Identifiers
|
|
205
|
-
Public Key Re-Use for Signing both Debug and Production Code
|
|
206
|
-
Incorrect Conversion of Security Identifiers
|
|
207
|
-
Missing Source Correlation of Multiple Independent Data
|
|
208
|
-
Insecure Security Identifier Mechanism
|
|
209
|
-
Debug Messages Revealing Unnecessary Information
|
|
210
|
-
Incorrect Chaining or Granularity of Debug Components
|
|
211
|
-
Unprotected Confidential Information on Device is Accessible by OSAT Vendors
|
|
212
|
-
Hardware Logic Contains Race Conditions
|
|
213
|
-
Missing Protection Mechanism for Alternate Hardware Interface
|
|
214
|
-
ASP.NET Misconfiguration: Password in Configuration File
|
|
215
|
-
Improper Handling of Length Parameter Inconsistency
|
|
216
|
-
Improper Protection of Physical Side Channels
|
|
217
|
-
Insufficient or Incomplete Data Removal within Hardware Component
|
|
218
|
-
Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
|
|
219
|
-
Non-Transparent Sharing of Microarchitectural Resources
|
|
220
|
-
Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
|
|
221
|
-
Incorrect Calculation of Buffer Size
|
|
222
|
-
Missing Ability to Patch ROM Code
|
|
223
|
-
Improper Translation of Security Attributes by Fabric Bridge
|
|
224
|
-
Missing Protection for Mirrored Regions in On-Chip Fabric Firewall
|
|
225
|
-
Hardware Allows Activation of Test or Debug Logic at Runtime
|
|
226
|
-
Missing Write Protection for Parametric Data Values
|
|
227
|
-
Improper Setting of Bus Controlling Capability in Fabric End-point
|
|
228
|
-
Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges
|
|
229
|
-
Improper Access Control in Fabric Bridge
|
|
230
|
-
Missing Support for Security Features in On-chip Fabrics or Buses
|
|
231
|
-
Improper Protection against Electromagnetic Fault Injection (EM-FI)
|
|
232
|
-
Improper Protection for Outbound Error Messages and Alert Signals
|
|
233
|
-
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
|
|
234
|
-
Use of Blocking Code in Single-threaded, Non-blocking Context
|
|
235
|
-
Improper Management of Sensitive Trace Data
|
|
236
|
-
Improperly Controlled Sequential Memory Allocation
|
|
237
|
-
Missing Immutable Root of Trust in Hardware
|
|
238
|
-
Binding to an Unrestricted IP Address
|
|
239
|
-
Security Version Number Mutable to Older Versions
|
|
240
|
-
Reliance on Component That is Not Updateable
|
|
241
|
-
Remanent Data Readable after Memory Erase
|
|
242
|
-
Improper Isolation of Shared Resources in Network On Chip (NoC)
|
|
243
|
-
Improper Handling of Faults that Lead to Instruction Skips
|
|
244
|
-
Inefficient Regular Expression Complexity
|
|
245
|
-
Unauthorized Error Injection Can Degrade Hardware Redundancy
|
|
246
|
-
Incorrect Bitwise Shift of Integer
|
|
247
|
-
Improper Neutralization of Special Elements Used in a Template Engine
|
|
248
|
-
Improper Protections Against Hardware Overheating
|
|
249
|
-
Insufficient Precision or Accuracy of a Real Number
|
|
250
|
-
Use of Externally-Controlled Format String
|
|
251
|
-
Multiple Releases of Same Resource or Handle
|
|
252
|
-
Information Exposure through Microarchitectural State after Transient Execution
|
|
253
|
-
Incorrect Calculation of Multi-Byte String Length
|
|
254
|
-
Improper Handling of Hardware Behavior in Exceptionally Cold Environments
|
|
255
|
-
Reliance on Insufficiently Trustworthy Component
|
|
256
|
-
Improper Neutralization of Special Elements
|
|
257
|
-
Improper Handling of Physical or Environmental Conditions
|
|
258
|
-
Missing Origin Validation in WebSockets
|
|
259
|
-
Insecure Operation on Windows Junction / Mount Point
|
|
260
|
-
Incorrect Parsing of Numbers with Different Radices
|
|
261
|
-
Weak Authentication
|
|
262
|
-
Use of Weak Credentials
|
|
263
|
-
Use of Default Credentials
|
|
264
|
-
Use of Default Password
|
|
265
|
-
Use of Default Cryptographic Key
|
|
266
|
-
Dependency on Vulnerable Third-Party Component
|
|
267
|
-
Compiler Removal of Code to Clear Buffers
|
|
268
|
-
Improper Neutralization of Delimiters
|
|
269
|
-
Improper Neutralization of Parameter/Argument Delimiters
|
|
270
|
-
Incorrect Initialization of Resource
|
|
271
|
-
Improper Neutralization of Value Delimiters
|
|
272
|
-
Exposure of Sensitive Information during Transient Execution
|
|
273
|
-
Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution
|
|
274
|
-
Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution
|
|
275
|
-
Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution
|
|
276
|
-
Improper Validation of Generative AI Output
|
|
277
|
-
Improper Neutralization of Record Delimiters
|
|
278
|
-
Improper Neutralization of Line Delimiters
|
|
279
|
-
Improper Neutralization of Section Delimiters
|
|
280
|
-
Improper Neutralization of Expression/Command Delimiters
|
|
281
|
-
Improper Neutralization of Input Terminators
|
|
282
|
-
Improper Neutralization of Input Leaders
|
|
283
|
-
Improper Neutralization of Quoting Syntax
|
|
284
|
-
External Control of System or Configuration Setting
|
|
285
|
-
Improper Neutralization of Escape, Meta, or Control Sequences
|
|
286
|
-
Improper Neutralization of Comment Delimiters
|
|
287
|
-
Improper Neutralization of Macro Symbols
|
|
288
|
-
Improper Neutralization of Substitution Characters
|
|
289
|
-
Improper Neutralization of Variable Name Delimiters
|
|
290
|
-
Improper Neutralization of Wildcards or Matching Symbols
|
|
291
|
-
Improper Neutralization of Whitespace
|
|
292
|
-
Failure to Sanitize Paired Delimiters
|
|
293
|
-
Improper Neutralization of Null Byte or NUL Character
|
|
294
|
-
Improper Handling of Invalid Use of Special Elements
|
|
295
|
-
Improper Neutralization of Leading Special Elements
|
|
114
|
+
Improper Enforcement of a Single, Unique Action
|
|
115
|
+
Insecure Automated Optimizations
|
|
116
|
+
Transmission of Private Resources into a New Sphere ('Resource Leak')
|
|
117
|
+
Path Equivalence: '/multiple//internal/slash'
|
|
118
|
+
Incorrect Short Circuit Evaluation
|
|
119
|
+
Missing Reference to Active Allocated Resource
|
|
120
|
+
Empty Exception Block
|
|
296
121
|
Improper Neutralization of Multiple Leading Special Elements
|
|
297
|
-
|
|
298
|
-
|
|
299
|
-
Improper Neutralization of Internal Special Elements
|
|
300
|
-
Improper Neutralization of Multiple Internal Special Elements
|
|
301
|
-
Improper Handling of Missing Special Element
|
|
302
|
-
Improper Handling of Additional Special Element
|
|
303
|
-
Improper Handling of Inconsistent Special Elements
|
|
304
|
-
Improper Null Termination
|
|
305
|
-
Encoding Error
|
|
306
|
-
Improper Handling of Alternate Encoding
|
|
307
|
-
Double Decoding of the Same Data
|
|
308
|
-
Improper Handling of Mixed Encoding
|
|
309
|
-
Improper Handling of Unicode Encoding
|
|
310
|
-
Improper Handling of URL Encoding (Hex Encoding)
|
|
311
|
-
Improper Handling of Case Sensitivity
|
|
312
|
-
Incorrect Behavior Order: Early Validation
|
|
313
|
-
Incorrect Behavior Order: Validate Before Canonicalize
|
|
314
|
-
Incorrect Behavior Order: Validate Before Filter
|
|
315
|
-
Collapse of Data into Unsafe Value
|
|
316
|
-
Permissive List of Allowed Inputs
|
|
317
|
-
Incomplete List of Disallowed Inputs
|
|
318
|
-
Incorrect Regular Expression
|
|
319
|
-
Overly Restrictive Regular Expression
|
|
320
|
-
Partial String Comparison
|
|
321
|
-
Reliance on Data/Memory Layout
|
|
322
|
-
Integer Overflow or Wraparound
|
|
323
|
-
Integer Underflow (Wrap or Wraparound)
|
|
324
|
-
Integer Coercion Error
|
|
325
|
-
Off-by-one Error
|
|
326
|
-
Unexpected Sign Extension
|
|
327
|
-
Signed to Unsigned Conversion Error
|
|
328
|
-
Unsigned to Signed Conversion Error
|
|
329
|
-
Numeric Truncation Error
|
|
122
|
+
Inefficient Regular Expression Complexity
|
|
123
|
+
Struts: Unused Validation Form
|
|
330
124
|
Use of Incorrect Byte Ordering
|
|
331
|
-
|
|
332
|
-
Exposure of Sensitive Information to an Unauthorized Actor
|
|
333
|
-
Insertion of Sensitive Information Into Sent Data
|
|
334
|
-
Exposure of Sensitive Information Through Data Queries
|
|
335
|
-
Observable Discrepancy
|
|
336
|
-
Observable Response Discrepancy
|
|
337
|
-
Observable Behavioral Discrepancy
|
|
338
|
-
Observable Internal Behavioral Discrepancy
|
|
339
|
-
Observable Behavioral Discrepancy With Equivalent Products
|
|
340
|
-
Observable Timing Discrepancy
|
|
341
|
-
Generation of Error Message Containing Sensitive Information
|
|
342
|
-
Self-generated Error Message Containing Sensitive Information
|
|
343
|
-
Externally-Generated Error Message Containing Sensitive Information
|
|
344
|
-
Improper Removal of Sensitive Information Before Storage or Transfer
|
|
345
|
-
Exposure of Sensitive Information Due to Incompatible Policies
|
|
346
|
-
Invocation of Process Using Visible Sensitive Information
|
|
347
|
-
Insertion of Sensitive Information Into Debugging Code
|
|
348
|
-
Storage of File with Sensitive Data Under Web Root
|
|
349
|
-
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
|
350
|
-
Storage of File With Sensitive Data Under FTP Root
|
|
351
|
-
Information Loss or Omission
|
|
352
|
-
Truncation of Security-relevant Information
|
|
353
|
-
Omission of Security-relevant Information
|
|
354
|
-
Obscured Security-relevant Information by Alternate Name
|
|
355
|
-
Sensitive Information in Resource Not Removed Before Reuse
|
|
356
|
-
Improper Handling of Syntactically Invalid Structure
|
|
357
|
-
Improper Handling of Values
|
|
358
|
-
Relative Path Traversal
|
|
359
|
-
Improper Handling of Missing Values
|
|
360
|
-
Improper Handling of Extra Values
|
|
361
|
-
Improper Handling of Undefined Values
|
|
362
|
-
Improper Handling of Parameters
|
|
363
|
-
Failure to Handle Missing Parameter
|
|
364
|
-
Improper Handling of Extra Parameters
|
|
365
|
-
Improper Handling of Undefined Parameters
|
|
366
|
-
Improper Handling of Structural Elements
|
|
125
|
+
Missing Reference to Active File Descriptor or Handle
|
|
367
126
|
Improper Handling of Incomplete Structural Elements
|
|
368
|
-
|
|
369
|
-
|
|
370
|
-
|
|
371
|
-
|
|
372
|
-
Use of Inherently Dangerous Function
|
|
373
|
-
Creation of chroot Jail Without Changing Working Directory
|
|
374
|
-
Improper Clearing of Heap Memory Before Release ('Heap Inspection')
|
|
375
|
-
J2EE Bad Practices: Direct Management of Connections
|
|
376
|
-
J2EE Bad Practices: Direct Use of Sockets
|
|
377
|
-
Uncaught Exception
|
|
378
|
-
Path Traversal: '/../filedir'
|
|
379
|
-
Execution with Unnecessary Privileges
|
|
380
|
-
Unchecked Return Value
|
|
381
|
-
Incorrect Check of Function Return Value
|
|
382
|
-
Plaintext Storage of a Password
|
|
383
|
-
Storing Passwords in a Recoverable Format
|
|
384
|
-
Empty Password in Configuration File
|
|
385
|
-
Use of Hard-coded Password
|
|
386
|
-
Path Traversal: '/dir/../filename'
|
|
387
|
-
Password in Configuration File
|
|
388
|
-
Weak Encoding for Password
|
|
389
|
-
Not Using Password Aging
|
|
390
|
-
Password Aging with Long Expiration
|
|
391
|
-
Incorrect Privilege Assignment
|
|
392
|
-
Privilege Defined With Unsafe Actions
|
|
393
|
-
Privilege Chaining
|
|
394
|
-
Improper Privilege Management
|
|
395
|
-
Path Traversal: 'dir/../../filename'
|
|
396
|
-
Privilege Context Switching Error
|
|
397
|
-
Privilege Dropping / Lowering Errors
|
|
398
|
-
Least Privilege Violation
|
|
399
|
-
Improper Check for Dropped Privileges
|
|
400
|
-
Improper Handling of Insufficient Privileges
|
|
401
|
-
Incorrect Default Permissions
|
|
402
|
-
Insecure Inherited Permissions
|
|
403
|
-
Insecure Preserved Inherited Permissions
|
|
404
|
-
Incorrect Execution-Assigned Permissions
|
|
127
|
+
Incorrect Behavior Order: Validate Before Filter
|
|
128
|
+
Incorrect Conversion between Numeric Types
|
|
129
|
+
Struts: Plug-in Framework not in Use
|
|
130
|
+
Windows Hard Link
|
|
405
131
|
Path Traversal: '..\filedir'
|
|
406
|
-
|
|
407
|
-
|
|
408
|
-
Improper Ownership Management
|
|
409
|
-
Unverified Ownership
|
|
410
|
-
Improper Access Control
|
|
411
|
-
Improper Authorization
|
|
412
|
-
Incorrect User Management
|
|
413
|
-
Improper Authentication
|
|
414
|
-
Authentication Bypass Using an Alternate Path or Channel
|
|
415
|
-
Authentication Bypass by Alternate Name
|
|
132
|
+
Use of Invariant Value in Dynamically Changing Context
|
|
133
|
+
Partial String Comparison
|
|
416
134
|
Path Traversal: '\..\filename'
|
|
417
|
-
|
|
418
|
-
Reliance on IP Address for Authentication
|
|
419
|
-
Using Referer Field for Authentication
|
|
420
|
-
Authentication Bypass by Capture-replay
|
|
421
|
-
Improper Certificate Validation
|
|
422
|
-
Improper Following of a Certificate's Chain of Trust
|
|
423
|
-
Improper Validation of Certificate with Host Mismatch
|
|
135
|
+
Access of Memory Location Before Start of Buffer
|
|
424
136
|
Improper Validation of Certificate Expiration
|
|
425
|
-
|
|
426
|
-
|
|
427
|
-
|
|
428
|
-
|
|
429
|
-
Authentication Bypass by Assumed-Immutable Data
|
|
430
|
-
Incorrect Implementation of Authentication Algorithm
|
|
431
|
-
Missing Critical Step in Authentication
|
|
432
|
-
Authentication Bypass by Primary Weakness
|
|
433
|
-
Missing Authentication for Critical Function
|
|
137
|
+
Unprotected Alternate Channel
|
|
138
|
+
Multiple Interpretations of UI Input
|
|
139
|
+
Free of Pointer not at Start of Buffer
|
|
140
|
+
Exposed IOCTL with Insufficient Access Control
|
|
434
141
|
Improper Restriction of Excessive Authentication Attempts
|
|
142
|
+
Reliance on Security Through Obscurity
|
|
143
|
+
Dependency on Vulnerable Third-Party Component
|
|
144
|
+
Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer
|
|
145
|
+
Mutable Attestation or Measurement Reporting Data
|
|
146
|
+
Improper Scrubbing of Sensitive Data from Decommissioned Device
|
|
147
|
+
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
|
|
148
|
+
Trust of System Event Data
|
|
149
|
+
Use of Pointer Subtraction to Determine Size
|
|
150
|
+
Improper Neutralization of Special Elements
|
|
151
|
+
Inclusion of Functionality from Untrusted Control Sphere
|
|
152
|
+
Exposure of Sensitive Information Through Metadata
|
|
153
|
+
Files or Directories Accessible to External Parties
|
|
154
|
+
Path Traversal: 'C:dirname'
|
|
155
|
+
Lack of Administrator Control over Security
|
|
156
|
+
UNIX Hard Link
|
|
157
|
+
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
|
|
158
|
+
Dangerous Signal Handler not Disabled During Sensitive Operations
|
|
159
|
+
Incorrect Conversion of Security Identifiers
|
|
160
|
+
Authentication Bypass Using an Alternate Path or Channel
|
|
161
|
+
Incorrect Behavior Order
|
|
162
|
+
Insertion of Sensitive Information into Externally-Accessible File or Directory
|
|
163
|
+
Incorrect Authorization
|
|
164
|
+
Singleton Class Instance Creation without Proper Locking or Synchronization
|
|
165
|
+
Class Instance Self Destruction Control Element
|
|
166
|
+
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
|
167
|
+
Origin Validation Error
|
|
168
|
+
Improper Preservation of Consistency Between Independent Representations of Shared State
|
|
169
|
+
Use of Expired File Descriptor
|
|
170
|
+
Improper Resolution of Path Equivalence
|
|
171
|
+
Use After Free
|
|
172
|
+
Improper Validation of Syntactic Correctness of Input
|
|
173
|
+
Improper Synchronization
|
|
174
|
+
Exposed Dangerous Method or Function
|
|
175
|
+
Unsigned to Signed Conversion Error
|
|
176
|
+
Free of Memory not on the Heap
|
|
177
|
+
Compiler Removal of Code to Clear Buffers
|
|
178
|
+
Buffer Access with Incorrect Length Value
|
|
179
|
+
Improper Handling of Structural Elements
|
|
180
|
+
Exposure of WSDL File Containing Sensitive Information
|
|
181
|
+
Improper Neutralization of Trailing Special Elements
|
|
182
|
+
Incorrect Pointer Scaling
|
|
183
|
+
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
|
|
184
|
+
Driving Intermediate Cryptographic State/Results to Hardware Module Outputs
|
|
435
185
|
Use of Single-factor Authentication
|
|
436
|
-
|
|
437
|
-
|
|
438
|
-
|
|
439
|
-
Cleartext Storage of Sensitive Information
|
|
440
|
-
Cleartext Storage in a File or on Disk
|
|
441
|
-
Cleartext Storage in the Registry
|
|
442
|
-
Cleartext Storage of Sensitive Information in a Cookie
|
|
443
|
-
Cleartext Storage of Sensitive Information in Memory
|
|
444
|
-
Cleartext Storage of Sensitive Information in GUI
|
|
445
|
-
Cleartext Storage of Sensitive Information in Executable
|
|
446
|
-
Cleartext Transmission of Sensitive Information
|
|
447
|
-
Path Traversal: '...' (Triple Dot)
|
|
448
|
-
Use of Hard-coded Cryptographic Key
|
|
186
|
+
Incomplete Identification of Uploaded File Variables (PHP)
|
|
187
|
+
Buffer Access Using Size of Source Buffer
|
|
188
|
+
Improper Access Control for Register Interface
|
|
449
189
|
Key Exchange without Entity Authentication
|
|
190
|
+
Missing Initialization of a Variable
|
|
191
|
+
Comparison Logic is Vulnerable to Power Side-Channel Attacks
|
|
192
|
+
Use of Default Password
|
|
193
|
+
Use of Weak Hash
|
|
194
|
+
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
|
195
|
+
Failure to Handle Missing Parameter
|
|
196
|
+
Not Using Complete Mediation
|
|
197
|
+
Excessive Use of Self-Modifying Code
|
|
198
|
+
Inclusion of Sensitive Information in Source Code Comments
|
|
199
|
+
Array Declared Public, Final, and Static
|
|
200
|
+
Persistent Storable Data Element without Associated Comparison Control Element
|
|
201
|
+
Improper Locking
|
|
202
|
+
Improper Neutralization of Encoded URI Schemes in a Web Page
|
|
203
|
+
Use of umask() with chmod-style Argument
|
|
450
204
|
Reusing a Nonce, Key Pair in Encryption
|
|
451
|
-
Use of a
|
|
452
|
-
|
|
205
|
+
Use of a One-Way Hash with a Predictable Salt
|
|
206
|
+
Session Fixation
|
|
207
|
+
Incomplete Internal State Distinction
|
|
208
|
+
Sensitive Information in Resource Not Removed Before Reuse
|
|
209
|
+
Object Model Violation: Just One of Equals and Hashcode Defined
|
|
210
|
+
Reliance on IP Address for Authentication
|
|
211
|
+
Critical Public Variable Without Final Modifier
|
|
212
|
+
Missing Check for Certificate Revocation after Initial Check
|
|
213
|
+
Inclusion of Sensitive Information in an Include File
|
|
214
|
+
Incorrect Parsing of Numbers with Different Radices
|
|
453
215
|
Inadequate Encryption Strength
|
|
454
|
-
|
|
455
|
-
|
|
456
|
-
|
|
457
|
-
|
|
458
|
-
|
|
459
|
-
|
|
460
|
-
|
|
461
|
-
|
|
462
|
-
|
|
463
|
-
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
|
|
216
|
+
Unlock of a Resource that is not Locked
|
|
217
|
+
Permission Race Condition During Resource Copy
|
|
218
|
+
Improper Filtering of Special Elements
|
|
219
|
+
Unparsed Raw Web Content Delivery
|
|
220
|
+
Only Filtering Special Elements Relative to a Marker
|
|
221
|
+
Protection Mechanism Failure
|
|
222
|
+
Processor Optimization Removal or Modification of Security-critical Code
|
|
223
|
+
Insecure Operation on Windows Junction / Mount Point
|
|
224
|
+
Incorrect Synchronization
|
|
464
225
|
Same Seed in Pseudo-Random Number Generator (PRNG)
|
|
465
|
-
|
|
466
|
-
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
|
|
467
|
-
Small Seed Space in PRNG
|
|
468
|
-
Path Traversal: '....//'
|
|
469
|
-
Generation of Predictable Numbers or Identifiers
|
|
470
|
-
Predictable from Observable State
|
|
471
|
-
Predictable Exact Value from Previous Values
|
|
472
|
-
Predictable Value Range from Previous Values
|
|
473
|
-
Use of Invariant Value in Dynamically Changing Context
|
|
474
|
-
Insufficient Verification of Data Authenticity
|
|
475
|
-
Origin Validation Error
|
|
476
|
-
Improper Verification of Cryptographic Signature
|
|
477
|
-
Use of Less Trusted Source
|
|
478
|
-
Acceptance of Extraneous Untrusted Data With Trusted Data
|
|
226
|
+
Path Equivalence: 'fakedir/../realdir/filename'
|
|
479
227
|
Path Traversal: '.../...//'
|
|
480
|
-
|
|
481
|
-
|
|
482
|
-
|
|
483
|
-
|
|
484
|
-
|
|
485
|
-
|
|
486
|
-
|
|
487
|
-
|
|
488
|
-
|
|
489
|
-
|
|
490
|
-
|
|
228
|
+
Creation of chroot Jail Without Changing Working Directory
|
|
229
|
+
Improper Protection Against Voltage and Clock Glitches
|
|
230
|
+
Incorrect User Management
|
|
231
|
+
Excessive Attack Surface
|
|
232
|
+
J2EE Misconfiguration: Plaintext Password in Configuration File
|
|
233
|
+
Static Member Data Element outside of a Singleton Class Element
|
|
234
|
+
Source Code File with Excessive Number of Lines of Code
|
|
235
|
+
Invokable Control Element with Large Number of Outward Calls
|
|
236
|
+
Insufficient Encapsulation of Machine-Dependent Functionality
|
|
237
|
+
Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution
|
|
238
|
+
Improper Interaction Between Multiple Correctly-Behaving Entities
|
|
239
|
+
Excessive Number of Inefficient Server-Side Data Accesses
|
|
240
|
+
Storage of Sensitive Data in a Mechanism without Access Control
|
|
241
|
+
Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges
|
|
242
|
+
J2EE Bad Practices: Direct Use of Threads
|
|
243
|
+
Improper Handling of Inconsistent Special Elements
|
|
244
|
+
Improper Handling of Physical or Environmental Conditions
|
|
245
|
+
Unrestricted Upload of File with Dangerous Type
|
|
246
|
+
Improper Neutralization of Comment Delimiters
|
|
247
|
+
Path Equivalence: 'filename/' (Trailing Slash)
|
|
248
|
+
Excessive McCabe Cyclomatic Complexity
|
|
249
|
+
Least Privilege Violation
|
|
250
|
+
Improper Neutralization of Equivalent Special Elements
|
|
251
|
+
Not Using Password Aging
|
|
252
|
+
Function Call With Incorrect Variable or Reference as Argument
|
|
253
|
+
Server-generated Error Message Containing Sensitive Information
|
|
254
|
+
Improper Translation of Security Attributes by Fabric Bridge
|
|
255
|
+
Invokable Control Element with Variadic Parameters
|
|
256
|
+
Double Decoding of the Same Data
|
|
257
|
+
Exposure of Data Element to Wrong Session
|
|
258
|
+
Covert Storage Channel
|
|
259
|
+
Predictable Exact Value from Previous Values
|
|
260
|
+
Excessive Iteration
|
|
261
|
+
Small Space of Random Values
|
|
262
|
+
Empty Synchronized Block
|
|
263
|
+
Observable Behavioral Discrepancy With Equivalent Products
|
|
264
|
+
Premature Release of Resource During Expected Lifetime
|
|
265
|
+
Reachable Assertion
|
|
266
|
+
Hardware Logic with Insecure De-Synchronization between Control and Data Channels
|
|
267
|
+
ASP.NET Misconfiguration: Password in Configuration File
|
|
268
|
+
Double Free
|
|
269
|
+
Inefficient Algorithmic Complexity
|
|
270
|
+
Authentication Bypass by Capture-replay
|
|
271
|
+
NULL Pointer Dereference
|
|
272
|
+
Improper Link Resolution Before File Access ('Link Following')
|
|
273
|
+
Improper Restriction of XML External Entity Reference
|
|
491
274
|
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
|
|
492
|
-
|
|
493
|
-
|
|
494
|
-
|
|
495
|
-
|
|
496
|
-
|
|
275
|
+
Insufficient Control Flow Management
|
|
276
|
+
Use of Low-Level Functionality
|
|
277
|
+
Improper Control of Interaction Frequency
|
|
278
|
+
Heap-based Buffer Overflow
|
|
279
|
+
Deletion of Data Structure Sentinel
|
|
280
|
+
Non-Transparent Sharing of Microarchitectural Resources
|
|
281
|
+
Policy Privileges are not Assigned Consistently Between Control and Data Agents
|
|
282
|
+
Exposure of Information Through Shell Error Message
|
|
283
|
+
Absolute Path Traversal
|
|
284
|
+
Uncontrolled Resource Consumption
|
|
285
|
+
Non-exit on Failed Initialization
|
|
286
|
+
Use of Function with Inconsistent Implementations
|
|
287
|
+
Improper Neutralization of Wildcards or Matching Symbols
|
|
288
|
+
ASP.NET Misconfiguration: Use of Identity Impersonation
|
|
289
|
+
Debug Messages Revealing Unnecessary Information
|
|
290
|
+
Parent Class without Virtual Destructor Method
|
|
291
|
+
Improper Neutralization of Input Terminators
|
|
292
|
+
Use of a One-Way Hash without a Salt
|
|
293
|
+
Data Access Operations Outside of Expected Data Manager Component
|
|
294
|
+
Uncontrolled Recursion
|
|
295
|
+
J2EE Bad Practices: Non-serializable Object Stored in Session
|
|
296
|
+
Missing Password Field Masking
|
|
297
|
+
Predictable Seed in Pseudo-Random Number Generator (PRNG)
|
|
298
|
+
Product UI does not Warn User of Unsafe Actions
|
|
299
|
+
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior
|
|
300
|
+
Large Data Table with Excessive Number of Indices
|
|
301
|
+
Use of sizeof() on a Pointer Type
|
|
302
|
+
Inclusion of Sensitive Information in Source Code
|
|
303
|
+
J2EE Misconfiguration: Data Transmission Without Encryption
|
|
304
|
+
Unprotected Primary Channel
|
|
305
|
+
Incomplete Cleanup
|
|
306
|
+
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
|
|
307
|
+
Failure to Disable Reserved Bits
|
|
308
|
+
Use of getlogin() in Multithreaded Application
|
|
309
|
+
Expression is Always False
|
|
310
|
+
EJB Bad Practices: Use of Class Loader
|
|
311
|
+
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
|
|
312
|
+
Improper Removal of Sensitive Information Before Storage or Transfer
|
|
313
|
+
Improper Neutralization of Multiple Internal Special Elements
|
|
314
|
+
Inappropriate Whitespace Style
|
|
315
|
+
Missing Synchronization
|
|
316
|
+
Integer Overflow or Wraparound
|
|
317
|
+
Improper Validation of Specified Type of Input
|
|
318
|
+
Multiple Binds to the Same Port
|
|
319
|
+
Use of NullPointerException Catch to Detect NULL Pointer Dereference
|
|
320
|
+
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
|
|
321
|
+
Memory Allocation with Excessive Size Value
|
|
322
|
+
Use of Same Invokable Control Element in Multiple Architectural Layers
|
|
323
|
+
Use of Insufficiently Random Values
|
|
497
324
|
Divide By Zero
|
|
498
|
-
|
|
499
|
-
|
|
500
|
-
|
|
501
|
-
|
|
502
|
-
|
|
503
|
-
|
|
504
|
-
|
|
505
|
-
|
|
506
|
-
|
|
507
|
-
J2EE
|
|
508
|
-
|
|
509
|
-
|
|
510
|
-
|
|
511
|
-
|
|
512
|
-
|
|
325
|
+
Improper Encoding or Escaping of Output
|
|
326
|
+
Improper Handling of Syntactically Invalid Structure
|
|
327
|
+
Out-of-bounds Write
|
|
328
|
+
Use of a Non-reentrant Function in a Concurrent Context
|
|
329
|
+
Direct Use of Unsafe JNI
|
|
330
|
+
Inclusion of Web Functionality from an Untrusted Source
|
|
331
|
+
Storage of File with Sensitive Data Under Web Root
|
|
332
|
+
Direct Request ('Forced Browsing')
|
|
333
|
+
Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
|
|
334
|
+
J2EE Misconfiguration: Entity Bean Declared Remote
|
|
335
|
+
Incorrect Implementation of Authentication Algorithm
|
|
336
|
+
Overly Restrictive Account Lockout Mechanism
|
|
337
|
+
Irrelevant Code
|
|
338
|
+
Trapdoor
|
|
339
|
+
Insufficient Control of Network Message Volume (Network Amplification)
|
|
340
|
+
Allocation of Resources Without Limits or Throttling
|
|
341
|
+
Struts: Validator Without Form Field
|
|
513
342
|
Detection of Error Condition Without Action
|
|
514
|
-
|
|
515
|
-
Missing Report of Error Condition
|
|
516
|
-
Return of Wrong Status Code
|
|
517
|
-
Unexpected Status Code or Return Value
|
|
518
|
-
Use of NullPointerException Catch to Detect NULL Pointer Dereference
|
|
343
|
+
Race Condition Enabling Link Following
|
|
519
344
|
Declaration of Catch for Generic Exception
|
|
520
|
-
|
|
521
|
-
|
|
522
|
-
|
|
523
|
-
|
|
524
|
-
|
|
525
|
-
|
|
345
|
+
Download of Code Without Integrity Check
|
|
346
|
+
Externally Controlled Reference to a Resource in Another Sphere
|
|
347
|
+
Public cloneable() Method Without Final ('Object Hijack')
|
|
348
|
+
Covert Timing Channel
|
|
349
|
+
Uncaught Exception
|
|
350
|
+
Out-of-bounds Read
|
|
351
|
+
Excessive Index Range Scan for a Data Resource
|
|
352
|
+
Improper Access Control
|
|
353
|
+
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
|
|
354
|
+
Uncaught Exception in Servlet
|
|
355
|
+
Reliance on Cookies without Validation and Integrity Checking in a Security Decision
|
|
356
|
+
Improper Handling of Windows ::DATA Alternate Data Stream
|
|
357
|
+
UI Discrepancy for Security Feature
|
|
358
|
+
Improper Handling of Unicode Encoding
|
|
359
|
+
ASP.NET Misconfiguration: Not Using Input Validation Framework
|
|
360
|
+
Insertion of Sensitive Information Into Debugging Code
|
|
361
|
+
Cleartext Transmission of Sensitive Information
|
|
362
|
+
Power-On of Untrusted Execution Core Before Enabling Fabric Access Control
|
|
363
|
+
Improper Authorization in Handler for Custom URL Scheme
|
|
364
|
+
Improper Isolation of Shared Resources in Network On Chip (NoC)
|
|
365
|
+
Excessively Complex Data Representation
|
|
366
|
+
Exposed Unsafe ActiveX Method
|
|
367
|
+
Observable Behavioral Discrepancy
|
|
368
|
+
Use of Inner Class Containing Sensitive Data
|
|
369
|
+
Parent Class with References to Child Class
|
|
370
|
+
Incorrect Privilege Assignment
|
|
371
|
+
Unconditional Control Flow Transfer outside of Switch Block
|
|
372
|
+
Missing Immutable Root of Trust in Hardware
|
|
373
|
+
Improper Protection of Physical Side Channels
|
|
374
|
+
Expected Behavior Violation
|
|
375
|
+
Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')
|
|
376
|
+
Improper Cleanup on Thrown Exception
|
|
377
|
+
Unexpected Status Code or Return Value
|
|
378
|
+
Expression is Always True
|
|
379
|
+
Improper Handling of File Names that Identify Virtual Resources
|
|
380
|
+
Incorrect Selection of Fuse Values
|
|
381
|
+
Missing Validation of OpenSSL Certificate
|
|
382
|
+
Obsolete Feature in UI
|
|
383
|
+
Improper Neutralization of Script in an Error Message Web Page
|
|
384
|
+
Symbolic Name not Mapping to Correct Object
|
|
385
|
+
Inclusion of Sensitive Information in Test Code
|
|
386
|
+
EJB Bad Practices: Use of Synchronization Primitives
|
|
387
|
+
Incomplete Model of Endpoint Features
|
|
388
|
+
Inappropriate Source Code Style or Formatting
|
|
389
|
+
External Control of File Name or Path
|
|
390
|
+
UNIX Symbolic Link (Symlink) Following
|
|
391
|
+
Incorrect Permission Assignment for Critical Resource
|
|
392
|
+
Improper Validation of Array Index
|
|
393
|
+
Use of Platform-Dependent Third Party Components
|
|
394
|
+
Use of Redundant Code
|
|
395
|
+
Improper Neutralization of Variable Name Delimiters
|
|
396
|
+
Declaration of Variable with Unnecessarily Wide Scope
|
|
397
|
+
Exposure of Private Personal Information to an Unauthorized Actor
|
|
398
|
+
Interpretation Conflict
|
|
399
|
+
Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
|
|
400
|
+
Incorrect Initialization of Resource
|
|
401
|
+
Context Switching Race Condition
|
|
402
|
+
Runtime Resource Management Control Element in a Component Built to Run on Application Servers
|
|
403
|
+
Incomplete I/O Documentation
|
|
404
|
+
Cryptographic Operations are run Before Supporting Units are Ready
|
|
405
|
+
Permissive Regular Expression
|
|
526
406
|
Improper Resource Shutdown or Release
|
|
527
|
-
|
|
528
|
-
|
|
529
|
-
|
|
530
|
-
|
|
531
|
-
Improper Handling of Highly Compressed Data (Data Amplification)
|
|
532
|
-
Improper Resolution of Path Equivalence
|
|
533
|
-
Insufficient Resource Pool
|
|
534
|
-
Unrestricted Externally Accessible Lock
|
|
535
|
-
Improper Resource Locking
|
|
536
|
-
Missing Lock Check
|
|
537
|
-
Double Free
|
|
538
|
-
Use After Free
|
|
539
|
-
Unprotected Primary Channel
|
|
540
|
-
Path Equivalence: 'filename.' (Trailing Dot)
|
|
541
|
-
Unprotected Alternate Channel
|
|
542
|
-
Race Condition During Access to Alternate Channel
|
|
407
|
+
Failure to Sanitize Paired Delimiters
|
|
408
|
+
Missing Release of Memory after Effective Lifetime
|
|
409
|
+
Reliance on Package-level Scope
|
|
410
|
+
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
|
|
543
411
|
Unprotected Windows Messaging Channel ('Shatter')
|
|
544
|
-
|
|
545
|
-
|
|
546
|
-
|
|
547
|
-
|
|
548
|
-
|
|
549
|
-
|
|
550
|
-
|
|
412
|
+
Unverified Ownership
|
|
413
|
+
Signal Handler Use of a Non-reentrant Function
|
|
414
|
+
Active Debug Code
|
|
415
|
+
Allocation of File Descriptors or Handles Without Limits or Throttling
|
|
416
|
+
Improper Check for Certificate Revocation
|
|
417
|
+
Architecture with Number of Horizontal Layers Outside of Expected Range
|
|
418
|
+
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications
|
|
419
|
+
Path Equivalence: ' filename' (Leading Space)
|
|
420
|
+
Logging of Excessive Data
|
|
421
|
+
URL Redirection to Untrusted Site ('Open Redirect')
|
|
422
|
+
Servlet Runtime Error Message Containing Sensitive Information
|
|
423
|
+
Use of Default Cryptographic Key
|
|
424
|
+
Method Containing Access of a Member Element from Another Class
|
|
425
|
+
Wrap-around Error
|
|
426
|
+
Placement of User into Incorrect Group
|
|
427
|
+
Improper Restriction of Power Consumption
|
|
428
|
+
Function Call With Incorrect Argument Type
|
|
429
|
+
Incorrect Block Delimitation
|
|
551
430
|
Missing Handler
|
|
552
|
-
|
|
553
|
-
|
|
554
|
-
|
|
555
|
-
|
|
556
|
-
|
|
557
|
-
|
|
558
|
-
|
|
559
|
-
|
|
560
|
-
|
|
561
|
-
|
|
562
|
-
|
|
563
|
-
|
|
564
|
-
|
|
565
|
-
|
|
566
|
-
|
|
567
|
-
|
|
568
|
-
|
|
569
|
-
|
|
431
|
+
Guessable CAPTCHA
|
|
432
|
+
Use of Password Hash Instead of Password for Authentication
|
|
433
|
+
Path Traversal: '/absolute/pathname/here'
|
|
434
|
+
Insertion of Sensitive Information Into Sent Data
|
|
435
|
+
Insufficient UI Warning of Dangerous Operations
|
|
436
|
+
Insecure Security Identifier Mechanism
|
|
437
|
+
Access to Critical Private Variable via Public Method
|
|
438
|
+
Insufficient Session Expiration
|
|
439
|
+
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
|
|
440
|
+
Insufficient Entropy in PRNG
|
|
441
|
+
Generation of Error Message Containing Sensitive Information
|
|
442
|
+
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
|
|
443
|
+
Unauthorized Error Injection Can Degrade Hardware Redundancy
|
|
444
|
+
Improper Validation of Consistency within Input
|
|
445
|
+
Improper Validation of Unsafe Equivalence in Input
|
|
446
|
+
Privilege Defined With Unsafe Actions
|
|
447
|
+
Improper Verification of Intent by Broadcast Receiver
|
|
448
|
+
Loop Condition Value Update within the Loop
|
|
449
|
+
Deserialization of Untrusted Data
|
|
450
|
+
Returning a Mutable Object to an Untrusted Caller
|
|
451
|
+
Missing Protection for Mirrored Regions in On-Chip Fabric Firewall
|
|
452
|
+
Generation of Predictable IV with CBC Mode
|
|
570
453
|
Insecure Default Variable Initialization
|
|
571
|
-
|
|
572
|
-
|
|
573
|
-
|
|
574
|
-
|
|
575
|
-
|
|
576
|
-
|
|
577
|
-
|
|
578
|
-
|
|
579
|
-
|
|
580
|
-
|
|
581
|
-
|
|
582
|
-
Use of
|
|
583
|
-
|
|
584
|
-
|
|
585
|
-
|
|
586
|
-
|
|
587
|
-
Modification of Assumed-Immutable Data (MAID)
|
|
588
|
-
External Control of Assumed-Immutable Web Parameter
|
|
589
|
-
PHP External Variable Modification
|
|
590
|
-
Use of Function with Inconsistent Implementations
|
|
591
|
-
Undefined Behavior for Input to API
|
|
592
|
-
NULL Pointer Dereference
|
|
593
|
-
Use of Obsolete Function
|
|
594
|
-
Missing Default Case in Multiple Condition Expression
|
|
595
|
-
Signal Handler Use of a Non-reentrant Function
|
|
454
|
+
Authentication Bypass by Spoofing
|
|
455
|
+
Missing Lock Check
|
|
456
|
+
Improper Neutralization of Record Delimiters
|
|
457
|
+
Struts: Form Bean Does Not Extend Validation Class
|
|
458
|
+
Use of Weak Credentials
|
|
459
|
+
Exposure of Information Through Directory Listing
|
|
460
|
+
Client-Side Enforcement of Server-Side Security
|
|
461
|
+
Excessive Code Complexity
|
|
462
|
+
Missing Documentation for Design
|
|
463
|
+
Improper Validation of Specified Index, Position, or Offset in Input
|
|
464
|
+
Improper Protections Against Hardware Overheating
|
|
465
|
+
Use of Potentially Dangerous Function
|
|
466
|
+
Improper Access Control in Fabric Bridge
|
|
467
|
+
ASP.NET Misconfiguration: Missing Custom Error Page
|
|
468
|
+
Incomplete List of Disallowed Inputs
|
|
469
|
+
Exposure of Sensitive System Information Due to Uncleared Debug Information
|
|
596
470
|
Path Equivalence: 'file name' (Internal Whitespace)
|
|
597
|
-
|
|
598
|
-
|
|
471
|
+
Generation of Predictable Numbers or Identifiers
|
|
472
|
+
Improper Validation of Specified Quantity in Input
|
|
473
|
+
Improper Zeroization of Hardware Register
|
|
474
|
+
Assumed-Immutable Data is Stored in Writable Memory
|
|
475
|
+
Signed to Unsigned Conversion Error
|
|
476
|
+
Incomplete Denylist to Cross-Site Scripting
|
|
599
477
|
Comparing instead of Assigning
|
|
600
|
-
|
|
601
|
-
|
|
602
|
-
|
|
603
|
-
|
|
604
|
-
|
|
605
|
-
|
|
606
|
-
|
|
607
|
-
|
|
608
|
-
|
|
609
|
-
|
|
610
|
-
|
|
611
|
-
|
|
612
|
-
|
|
613
|
-
|
|
614
|
-
|
|
615
|
-
|
|
616
|
-
|
|
617
|
-
|
|
618
|
-
Public Static Field Not Marked Final
|
|
619
|
-
Trust Boundary Violation
|
|
620
|
-
Deserialization of Untrusted Data
|
|
621
|
-
Embedded Malicious Code
|
|
622
|
-
Trojan Horse
|
|
623
|
-
Non-Replicating Malicious Code
|
|
624
|
-
Replicating Malicious Code (Virus or Worm)
|
|
625
|
-
Path Equivalence: '/multiple//internal/slash'
|
|
626
|
-
Trapdoor
|
|
627
|
-
Logic/Time Bomb
|
|
628
|
-
Spyware
|
|
629
|
-
Covert Channel
|
|
630
|
-
Covert Storage Channel
|
|
631
|
-
Path Equivalence: '/multiple/trailing/slash//'
|
|
632
|
-
.NET Misconfiguration: Use of Impersonation
|
|
633
|
-
Weak Password Requirements
|
|
634
|
-
Insufficiently Protected Credentials
|
|
635
|
-
Unprotected Transport of Credentials
|
|
636
|
-
Use of Cache Containing Sensitive Information
|
|
637
|
-
Use of Web Browser Cache Containing Sensitive Information
|
|
638
|
-
Cleartext Storage of Sensitive Information in an Environment Variable
|
|
639
|
-
Exposure of Version-Control Repository to an Unauthorized Control Sphere
|
|
478
|
+
Initialization of a Resource with an Insecure Default
|
|
479
|
+
Return of Stack Variable Address
|
|
480
|
+
Improper Neutralization of Server-Side Includes (SSI) Within a Web Page
|
|
481
|
+
Obscured Security-relevant Information by Alternate Name
|
|
482
|
+
Path Traversal: '\absolute\pathname\here'
|
|
483
|
+
Exposure of Sensitive Information during Transient Execution
|
|
484
|
+
Internal Asset Exposed to Unsafe Debug Access Level or State
|
|
485
|
+
Missing XML Validation
|
|
486
|
+
Incorrect Decoding of Security Identifiers
|
|
487
|
+
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
|
|
488
|
+
Invokable Control Element with Excessive Volume of Commented-out Code
|
|
489
|
+
Signal Handler with Functionality that is not Asynchronous-Safe
|
|
490
|
+
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
|
|
491
|
+
Missing Support for Integrity Check
|
|
492
|
+
Comparison of Incompatible Types
|
|
493
|
+
Sequence of Processor Instructions Leads to Unexpected Behavior
|
|
494
|
+
Use of Prohibited Code
|
|
495
|
+
Multiple Operations on Resource in Single-Operation Context
|
|
640
496
|
Exposure of Core Dump File to an Unauthorized Control Sphere
|
|
641
|
-
|
|
642
|
-
|
|
643
|
-
|
|
644
|
-
|
|
645
|
-
Insertion of Sensitive Information into Log File
|
|
646
|
-
Exposure of Information Through Shell Error Message
|
|
647
|
-
Servlet Runtime Error Message Containing Sensitive Information
|
|
648
|
-
Java Runtime Error Message Containing Sensitive Information
|
|
649
|
-
Insertion of Sensitive Information into Externally-Accessible File or Directory
|
|
650
|
-
Use of Persistent Cookies Containing Sensitive Information
|
|
651
|
-
Path Equivalence: 'filedir\' (Trailing Backslash)
|
|
652
|
-
Inclusion of Sensitive Information in Source Code
|
|
653
|
-
Inclusion of Sensitive Information in an Include File
|
|
654
|
-
Use of Singleton Pattern Without Synchronization in a Multithreaded Context
|
|
655
|
-
Missing Standardized Error Handling Mechanism
|
|
656
|
-
Suspicious Comment
|
|
657
|
-
Use of Hard-coded, Security-relevant Constants
|
|
658
|
-
Exposure of Information Through Directory Listing
|
|
659
|
-
Missing Password Field Masking
|
|
497
|
+
Improper Handling of Invalid Use of Special Elements
|
|
498
|
+
Improper Neutralization of Alternate XSS Syntax
|
|
499
|
+
Function Call With Incorrect Number of Arguments
|
|
500
|
+
Function Call With Incorrectly Specified Argument Value
|
|
660
501
|
Path Equivalence: '/./' (Single Dot Directory)
|
|
661
|
-
|
|
662
|
-
|
|
663
|
-
Files or Directories Accessible to External Parties
|
|
664
|
-
Command Shell in Externally Accessible Directory
|
|
665
|
-
ASP.NET Misconfiguration: Not Using Input Validation Framework
|
|
666
|
-
J2EE Misconfiguration: Plaintext Password in Configuration File
|
|
667
|
-
ASP.NET Misconfiguration: Use of Identity Impersonation
|
|
668
|
-
Use of getlogin() in Multithreaded Application
|
|
669
|
-
Path Equivalence: 'filedir*' (Wildcard)
|
|
670
|
-
Use of umask() with chmod-style Argument
|
|
671
|
-
Dead Code
|
|
672
|
-
Return of Stack Variable Address
|
|
673
|
-
Assignment to Variable without Use
|
|
502
|
+
Improper Write Handling in Limited-write Non-Volatile Memories
|
|
503
|
+
Improper Protection for Outbound Error Messages and Alert Signals
|
|
674
504
|
SQL Injection: Hibernate
|
|
675
|
-
|
|
676
|
-
|
|
677
|
-
|
|
678
|
-
|
|
679
|
-
|
|
680
|
-
|
|
681
|
-
Expression is Always True
|
|
682
|
-
Call to Thread run() instead of start()
|
|
505
|
+
Unimplemented or Unsupported Feature in UI
|
|
506
|
+
Predictable Value Range from Previous Values
|
|
507
|
+
Improper Prevention of Lock Bit Modification
|
|
508
|
+
Unchecked Return Value to NULL Pointer Dereference
|
|
509
|
+
Improper Neutralization of Input Leaders
|
|
510
|
+
Insufficient Isolation of System-Dependent Functions
|
|
683
511
|
Improper Following of Specification by Caller
|
|
684
|
-
|
|
685
|
-
|
|
686
|
-
|
|
687
|
-
|
|
688
|
-
|
|
689
|
-
|
|
690
|
-
Path
|
|
691
|
-
|
|
692
|
-
|
|
693
|
-
|
|
694
|
-
finalize() Method Declared Public
|
|
695
|
-
Return Inside Finally Block
|
|
696
|
-
Empty Synchronized Block
|
|
697
|
-
Explicit Call to Finalize()
|
|
698
|
-
Assignment of a Fixed Address to a Pointer
|
|
512
|
+
Improper Handling of Missing Values
|
|
513
|
+
Improper Neutralization of HTTP Headers for Scripting Syntax
|
|
514
|
+
Insufficient or Incomplete Data Removal within Hardware Component
|
|
515
|
+
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
|
|
516
|
+
Unintended Proxy or Intermediary ('Confused Deputy')
|
|
517
|
+
Data Element Aggregating an Excessively Large Number of Non-Primitive Elements
|
|
518
|
+
Relative Path Traversal
|
|
519
|
+
Insufficient Psychological Acceptability
|
|
520
|
+
External Control of System or Configuration Setting
|
|
521
|
+
Incorrect Calculation of Buffer Size
|
|
699
522
|
Attempt to Access Child of a Non-structure Pointer
|
|
700
|
-
|
|
701
|
-
|
|
702
|
-
|
|
703
|
-
|
|
704
|
-
|
|
705
|
-
|
|
706
|
-
|
|
707
|
-
|
|
708
|
-
|
|
709
|
-
|
|
710
|
-
|
|
711
|
-
|
|
712
|
-
|
|
713
|
-
|
|
714
|
-
|
|
715
|
-
|
|
716
|
-
|
|
717
|
-
|
|
718
|
-
|
|
719
|
-
|
|
720
|
-
|
|
721
|
-
|
|
722
|
-
|
|
723
|
-
|
|
724
|
-
|
|
725
|
-
|
|
726
|
-
|
|
727
|
-
|
|
728
|
-
|
|
729
|
-
|
|
523
|
+
Java Runtime Error Message Containing Sensitive Information
|
|
524
|
+
Use of Web Link to Untrusted Target with window.opener Access
|
|
525
|
+
Incorrect Behavior Order: Early Validation
|
|
526
|
+
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
|
|
527
|
+
Improper Control of a Resource Through its Lifetime
|
|
528
|
+
Improper Lock Behavior After Power State Transition
|
|
529
|
+
Use of Path Manipulation Function without Maximum-sized Buffer
|
|
530
|
+
Cloneable Class Containing Sensitive Information
|
|
531
|
+
Insufficient Visual Distinction of Homoglyphs Presented to User
|
|
532
|
+
Incorrect Resource Transfer Between Spheres
|
|
533
|
+
Stack-based Buffer Overflow
|
|
534
|
+
Insecure Setting of Generative AI/ML Model Inference Parameters
|
|
535
|
+
Mismatched Memory Management Routines
|
|
536
|
+
Inappropriate Encoding for Output Context
|
|
537
|
+
Improper Neutralization of Line Delimiters
|
|
538
|
+
Improper Adherence to Coding Standards
|
|
539
|
+
Hidden Functionality
|
|
540
|
+
Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses
|
|
541
|
+
Improper Enforcement of Behavioral Workflow
|
|
542
|
+
Creation of Class Instance within a Static Code Block
|
|
543
|
+
Inaccurate Comments
|
|
544
|
+
Addition of Data Structure Sentinel
|
|
545
|
+
Generation of Incorrect Security Tokens
|
|
546
|
+
Inappropriate Comment Style
|
|
547
|
+
Improper Handling of Mixed Encoding
|
|
548
|
+
Struts: Form Field Without Validator
|
|
549
|
+
Execution with Unnecessary Privileges
|
|
550
|
+
Buffer Underwrite ('Buffer Underflow')
|
|
551
|
+
Only Filtering Special Elements at an Absolute Position
|
|
552
|
+
Improper Handling of Undefined Values
|
|
553
|
+
Public Data Assigned to Private Array-Typed Field
|
|
554
|
+
Insufficient Technical Documentation
|
|
555
|
+
Inconsistent Naming Conventions for Identifiers
|
|
556
|
+
Always-Incorrect Control Flow Implementation
|
|
557
|
+
Explicit Call to Finalize()
|
|
558
|
+
Improper Preservation of Permissions
|
|
730
559
|
Dangling Database Cursor ('Cursor Injection')
|
|
731
|
-
UNIX Hard Link
|
|
732
|
-
Unverified Password Change
|
|
733
|
-
Variable Extraction Error
|
|
734
|
-
Improper Validation of Function Hook Arguments
|
|
735
|
-
Unsafe ActiveX Control Marked Safe For Scripting
|
|
736
|
-
Executable Regular Expression Error
|
|
737
|
-
Permissive Regular Expression
|
|
738
|
-
Null Byte Interaction Error (Poison Null Byte)
|
|
739
|
-
Dynamic Variable Evaluation
|
|
740
|
-
Function Call with Incorrectly Specified Arguments
|
|
741
|
-
Not Failing Securely ('Failing Open')
|
|
742
|
-
Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')
|
|
743
|
-
Not Using Complete Mediation
|
|
744
560
|
Authorization Bypass Through User-Controlled Key
|
|
745
|
-
|
|
746
|
-
|
|
747
|
-
|
|
748
|
-
|
|
749
|
-
Improper
|
|
750
|
-
Improper
|
|
751
|
-
|
|
752
|
-
|
|
753
|
-
|
|
561
|
+
Improper Ownership Management
|
|
562
|
+
Insecure Temporary File
|
|
563
|
+
J2EE Bad Practices: Direct Use of Sockets
|
|
564
|
+
Use of Incorrectly-Resolved Name or Reference
|
|
565
|
+
Improper Handling of Faults that Lead to Instruction Skips
|
|
566
|
+
Improper Handling of Insufficient Entropy in TRNG
|
|
567
|
+
Trust Boundary Violation
|
|
568
|
+
Process Control
|
|
569
|
+
Compilation with Insufficient Warnings or Errors
|
|
570
|
+
Weak Authentication
|
|
571
|
+
Policy Uses Obsolete Encoding
|
|
572
|
+
Missing Custom Error Page
|
|
573
|
+
Path Traversal: '....' (Multiple Dot)
|
|
574
|
+
Time-of-check Time-of-use (TOCTOU) Race Condition
|
|
575
|
+
Data Element containing Pointer Item without Proper Copy Control Element
|
|
576
|
+
Excessively Deep Nesting
|
|
577
|
+
Improper Handling of Insufficient Privileges
|
|
578
|
+
Information Exposure through Microarchitectural State after Transient Execution
|
|
754
579
|
Incorrect Use of Privileged APIs
|
|
755
|
-
|
|
756
|
-
|
|
757
|
-
|
|
758
|
-
|
|
759
|
-
|
|
760
|
-
Improper Isolation or Compartmentalization
|
|
761
|
-
Reliance on a Single Factor in a Security Decision
|
|
762
|
-
Insufficient Psychological Acceptability
|
|
763
|
-
Reliance on Security Through Obscurity
|
|
764
|
-
Violation of Secure Design Principles
|
|
765
|
-
Improper Handling of File Names that Identify Virtual Resources
|
|
766
|
-
Improper Synchronization
|
|
767
|
-
Use of a Non-reentrant Function in a Concurrent Context
|
|
768
|
-
Improper Control of a Resource Through its Lifetime
|
|
580
|
+
Use of Externally-Controlled Format String
|
|
581
|
+
Variable Extraction Error
|
|
582
|
+
Exposure of Sensitive Information Due to Incompatible Policies
|
|
583
|
+
Declaration of Throws for Generic Exception
|
|
584
|
+
Hardware Allows Activation of Test or Debug Logic at Runtime
|
|
769
585
|
Improper Initialization
|
|
770
|
-
|
|
771
|
-
|
|
586
|
+
Serializable Class Containing Sensitive Data
|
|
587
|
+
Data Resource Access without Use of Connection Pooling
|
|
588
|
+
Insufficient Adherence to Expected Conventions
|
|
589
|
+
Improper Setting of Bus Controlling Capability in Fabric End-point
|
|
590
|
+
Hardware Internal or Debug Modes Allow Override of Locks
|
|
591
|
+
Improper Authentication
|
|
592
|
+
Use of Password Hash With Insufficient Computational Effort
|
|
772
593
|
Exposure of Resource to Wrong Sphere
|
|
773
|
-
|
|
774
|
-
|
|
775
|
-
|
|
776
|
-
|
|
777
|
-
|
|
778
|
-
|
|
779
|
-
|
|
780
|
-
|
|
781
|
-
|
|
782
|
-
|
|
783
|
-
|
|
784
|
-
|
|
785
|
-
|
|
786
|
-
|
|
787
|
-
|
|
788
|
-
|
|
789
|
-
|
|
790
|
-
|
|
791
|
-
|
|
792
|
-
|
|
793
|
-
|
|
794
|
-
|
|
795
|
-
|
|
796
|
-
|
|
594
|
+
Improperly Controlled Sequential Memory Allocation
|
|
595
|
+
Use of Persistent Cookies Containing Sensitive Information
|
|
596
|
+
Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')
|
|
597
|
+
Hardware Logic Contains Race Conditions
|
|
598
|
+
Incorrect Comparison Logic Granularity
|
|
599
|
+
Use of Incorrect Operator
|
|
600
|
+
Cleartext Storage of Sensitive Information in Memory
|
|
601
|
+
Improper Check for Dropped Privileges
|
|
602
|
+
Numeric Range Comparison Without Minimum Check
|
|
603
|
+
Improper Neutralization of Internal Special Elements
|
|
604
|
+
Improper Handling of Values
|
|
605
|
+
Improper Certificate Validation
|
|
606
|
+
Truncation of Security-relevant Information
|
|
607
|
+
Double-Checked Locking
|
|
608
|
+
Only Filtering Special Elements at a Specified Location
|
|
609
|
+
Improper Access Control for Volatile Memory Containing Boot Code
|
|
610
|
+
Comparison Using Wrong Factors
|
|
611
|
+
Missing Default Case in Multiple Condition Expression
|
|
612
|
+
Insecure Inherited Permissions
|
|
613
|
+
Improperly Controlled Modification of Dynamically-Determined Object Attributes
|
|
614
|
+
Path Traversal: 'dir\..\..\filename'
|
|
615
|
+
Generation of Weak Initialization Vector (IV)
|
|
616
|
+
Improper Handling of Additional Special Element
|
|
617
|
+
Improper Neutralization
|
|
618
|
+
Observable Discrepancy
|
|
619
|
+
Use of Uninitialized Variable
|
|
620
|
+
Self-generated Error Message Containing Sensitive Information
|
|
621
|
+
finalize() Method Without super.finalize()
|
|
622
|
+
Struts: Duplicate Validation Forms
|
|
623
|
+
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
|
|
624
|
+
Exposure of Sensitive Information Through Data Queries
|
|
625
|
+
Insufficient Documentation of Error Handling Techniques
|
|
626
|
+
Channel Accessible by Non-Endpoint
|
|
627
|
+
Path Equivalence: 'file.name' (Internal Dot)
|
|
628
|
+
Improper Handling of Parameters
|
|
629
|
+
Struts: Non-private Field in ActionForm Class
|
|
630
|
+
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
|
|
631
|
+
Improper Authorization of Index Containing Sensitive Information
|
|
632
|
+
Improper Use of Validation Framework
|
|
797
633
|
Use of Multiple Resources with Duplicate Identifier
|
|
798
|
-
Use of
|
|
799
|
-
|
|
800
|
-
|
|
634
|
+
Use of a Broken or Risky Cryptographic Algorithm
|
|
635
|
+
Uninitialized Value on Reset for Registers Holding Security Settings
|
|
636
|
+
Improper Output Neutralization for Logs
|
|
637
|
+
Insufficient Encapsulation
|
|
638
|
+
Unprotected Confidential Information on Device is Accessible by OSAT Vendors
|
|
639
|
+
Excessive Use of Unconditional Branching
|
|
640
|
+
Use of Predictable Algorithm in Random Number Generator
|
|
641
|
+
Improper Restriction of Security Token Assignment
|
|
642
|
+
Improper Neutralization of Delimiters
|
|
643
|
+
Regular Expression without Anchors
|
|
644
|
+
Improper Handling of Hardware Behavior in Exceptionally Cold Environments
|
|
645
|
+
Improper Neutralization of Macro Symbols
|
|
646
|
+
Unchecked Input for Loop Condition
|
|
647
|
+
Use of Cache Containing Sensitive Information
|
|
648
|
+
Improper Neutralization of Whitespace
|
|
649
|
+
Integer Overflow to Buffer Overflow
|
|
650
|
+
.NET Misconfiguration: Use of Impersonation
|
|
651
|
+
Improper Neutralization of Section Delimiters
|
|
652
|
+
Unsynchronized Access to Shared Data in a Multithreaded Context
|
|
653
|
+
Missing Write Protection for Parametric Data Values
|
|
654
|
+
Missing Ability to Patch ROM Code
|
|
655
|
+
Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
|
|
656
|
+
Cleartext Storage of Sensitive Information
|
|
657
|
+
Access of Uninitialized Pointer
|
|
658
|
+
Insufficient Verification of Data Authenticity
|
|
659
|
+
Use of a Cryptographic Primitive with a Risky Implementation
|
|
660
|
+
Improper Export of Android Application Components
|
|
661
|
+
Improper Neutralization of Substitution Characters
|
|
662
|
+
Behavioral Change in New Version or Environment
|
|
663
|
+
Passing Mutable Objects to an Untrusted Method
|
|
664
|
+
Use of Uninitialized Resource
|
|
665
|
+
Acceptance of Extraneous Untrusted Data With Trusted Data
|
|
666
|
+
Incorrect Chaining or Granularity of Debug Components
|
|
667
|
+
Compiler Optimization Removal or Modification of Security-critical Code
|
|
668
|
+
Improper Validation of Integrity Check Value
|
|
669
|
+
Multiple Inheritance from Concrete Classes
|
|
670
|
+
Serializable Data Element Containing non-Serializable Item Elements
|
|
671
|
+
Improper Neutralization of Quoting Syntax
|
|
672
|
+
Command Shell in Externally Accessible Directory
|
|
673
|
+
User Interface (UI) Misrepresentation of Critical Information
|
|
674
|
+
Path Traversal: '\dir\..\filename'
|
|
675
|
+
Comparison of Object References Instead of Object Contents
|
|
801
676
|
Execution After Redirect (EAR)
|
|
802
|
-
|
|
803
|
-
|
|
677
|
+
Incorrectly Specified Destination in a Communication Channel
|
|
678
|
+
Function Call with Incorrectly Specified Arguments
|
|
679
|
+
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
|
|
680
|
+
Plaintext Storage of a Password
|
|
681
|
+
Security-Sensitive Hardware Controls with Missing Lock Bit Protection
|
|
682
|
+
Use of Hard-coded Password
|
|
683
|
+
Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element
|
|
684
|
+
Improper Management of Sensitive Trace Data
|
|
685
|
+
Logic/Time Bomb
|
|
686
|
+
Improper Control of Generation of Code ('Code Injection')
|
|
687
|
+
Improper Restriction of Rendered UI Layers or Frames
|
|
688
|
+
Security Version Number Mutable to Older Versions
|
|
689
|
+
Cleartext Storage of Sensitive Information in an Environment Variable
|
|
690
|
+
Numeric Truncation Error
|
|
691
|
+
Improper Handling of Windows Device Names
|
|
692
|
+
Class with Excessively Deep Inheritance
|
|
693
|
+
Authentication Bypass by Assumed-Immutable Data
|
|
694
|
+
Access Control Check Implemented After Asset is Accessed
|
|
695
|
+
Incorrect Default Permissions
|
|
696
|
+
Race Condition for Write-Once Attributes
|
|
697
|
+
Struts: Unvalidated Action Form
|
|
698
|
+
Incomplete Filtering of Special Elements
|
|
699
|
+
Creation of Temporary File in Directory with Insecure Permissions
|
|
804
700
|
Incorrect Type Conversion or Cast
|
|
805
|
-
|
|
806
|
-
|
|
807
|
-
|
|
701
|
+
Privilege Context Switching Error
|
|
702
|
+
Inconsistency Between Implementation and Documented Design
|
|
703
|
+
Incomplete Comparison with Missing Factors
|
|
704
|
+
Path Equivalence: '/multiple/trailing/slash//'
|
|
705
|
+
Exposure of Sensitive Information to an Unauthorized Actor
|
|
706
|
+
Weak Password Recovery Mechanism for Forgotten Password
|
|
707
|
+
Improper Neutralization of Formula Elements in a CSV File
|
|
808
708
|
Incorrect Ownership Assignment
|
|
809
|
-
|
|
709
|
+
Missing Standardized Error Handling Mechanism
|
|
710
|
+
clone() Method Without super.clone()
|
|
711
|
+
Insufficient Precision or Accuracy of a Real Number
|
|
712
|
+
Non-Replicating Malicious Code
|
|
713
|
+
Authentication Bypass by Alternate Name
|
|
714
|
+
Public Static Final Field References Mutable Object
|
|
715
|
+
Insufficient Type Distinction
|
|
716
|
+
Multiple Locks of a Critical Resource
|
|
717
|
+
Improper Neutralization of Expression/Command Delimiters
|
|
718
|
+
Reliance on Component That is Not Updateable
|
|
719
|
+
Incorrect Calculation of Multi-Byte String Length
|
|
720
|
+
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
|
721
|
+
Improper Neutralization of CRLF Sequences ('CRLF Injection')
|
|
722
|
+
Insufficient Granularity of Access Control
|
|
723
|
+
Sensitive Cookie with Improper SameSite Attribute
|
|
724
|
+
Improper Handling of Missing Special Element
|
|
725
|
+
Predictable from Observable State
|
|
726
|
+
Class with Excessive Number of Child Classes
|
|
727
|
+
Use of Same Variable for Multiple Purposes
|
|
728
|
+
Improper Control of Resource Identifiers ('Resource Injection')
|
|
729
|
+
Incorrect Execution-Assigned Permissions
|
|
730
|
+
Observable Response Discrepancy
|
|
731
|
+
Improper Handling of Insufficient Permissions or Privileges
|
|
732
|
+
Incorrect Register Defaults or Module Parameters
|
|
733
|
+
Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
|
|
734
|
+
Authentication Bypass by Primary Weakness
|
|
735
|
+
Insecure Storage of Sensitive Information
|
|
736
|
+
Improper Validation of Certificate with Host Mismatch
|
|
810
737
|
Improper Handling of Apple HFS+ Alternate Data Stream Path
|
|
811
|
-
|
|
812
|
-
|
|
813
|
-
|
|
814
|
-
|
|
815
|
-
|
|
816
|
-
|
|
738
|
+
Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls
|
|
739
|
+
Return Inside Finally Block
|
|
740
|
+
Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations
|
|
741
|
+
Unchecked Return Value
|
|
742
|
+
Incorrect Provision of Specified Functionality
|
|
743
|
+
Storing Passwords in a Recoverable Format
|
|
744
|
+
Return of Pointer Value Outside of Expected Range
|
|
745
|
+
Improperly Implemented Security Check for Standard
|
|
746
|
+
Deployment of Wrong Handler
|
|
747
|
+
Sensitive Data Storage in Improperly Locked Memory
|
|
748
|
+
Sensitive Non-Volatile Information Not Protected During Debug
|
|
749
|
+
Improper Control of Dynamically-Identified Variables
|
|
750
|
+
Executable Regular Expression Error
|
|
751
|
+
Firmware Not Updateable
|
|
752
|
+
Access of Memory Location After End of Buffer
|
|
753
|
+
Deadlock
|
|
754
|
+
Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
|
|
817
755
|
Improper Check for Unusual or Exceptional Conditions
|
|
756
|
+
On-Chip Debug and Test Interface With Improper Access Control
|
|
757
|
+
Mirrored Regions with Different Values
|
|
758
|
+
Trojan Horse
|
|
759
|
+
Initialization with Hard-Coded Network Resource Configuration Data
|
|
760
|
+
Improper Check or Handling of Exceptional Conditions
|
|
761
|
+
Exposure of Access Control List Files to an Unauthorized Control Sphere
|
|
762
|
+
Reliance on Runtime Component in Generated Code
|
|
763
|
+
Use of Default Credentials
|
|
764
|
+
External Initialization of Trusted Variables or Data Stores
|
|
765
|
+
Improper Restriction of Software Interfaces to Hardware Features
|
|
766
|
+
Small Seed Space in PRNG
|
|
767
|
+
Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution
|
|
768
|
+
The UI Performs the Wrong Action
|
|
769
|
+
Public Key Re-Use for Signing both Debug and Production Code
|
|
770
|
+
Collapse of Data into Unsafe Value
|
|
771
|
+
Path Equivalence: Windows 8.3 Filename
|
|
818
772
|
Improper Handling of Exceptional Conditions
|
|
819
|
-
|
|
820
|
-
|
|
821
|
-
|
|
822
|
-
|
|
823
|
-
|
|
824
|
-
|
|
825
|
-
|
|
826
|
-
|
|
827
|
-
|
|
828
|
-
|
|
829
|
-
|
|
830
|
-
|
|
831
|
-
|
|
832
|
-
|
|
773
|
+
Undefined Behavior for Input to API
|
|
774
|
+
Improper Protection against Electromagnetic Fault Injection (EM-FI)
|
|
775
|
+
Improper Neutralization of Input Used for LLM Prompting
|
|
776
|
+
Missing Report of Error Condition
|
|
777
|
+
Insufficiently Protected Credentials
|
|
778
|
+
Buffer Under-read
|
|
779
|
+
Asymmetric Resource Consumption (Amplification)
|
|
780
|
+
Suspicious Comment
|
|
781
|
+
Cleartext Storage of Sensitive Information in Executable
|
|
782
|
+
Data Access from Outside Expected Data Manager Component
|
|
783
|
+
Improper Handling of Single Event Upsets
|
|
784
|
+
Excessive Execution of Sequential Searches of Data Resource
|
|
785
|
+
Incorrect Comparison
|
|
786
|
+
Empty Code Block
|
|
787
|
+
EJB Bad Practices: Use of Java I/O
|
|
788
|
+
Path Equivalence: 'filename....' (Multiple Trailing Dot)
|
|
789
|
+
Missing Authentication for Critical Function
|
|
790
|
+
Unverified Password Change
|
|
791
|
+
Missing Cryptographic Step
|
|
792
|
+
Doubled Character XSS Manipulations
|
|
793
|
+
Cross-Site Request Forgery (CSRF)
|
|
794
|
+
Use of Unmaintained Third Party Components
|
|
795
|
+
Use of Client-Side Authentication
|
|
796
|
+
Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
|
|
797
|
+
Path Equivalence: '//multiple/leading/slash'
|
|
798
|
+
Observable Timing Discrepancy
|
|
799
|
+
Improper Validation of Generative AI Output
|
|
800
|
+
Cleartext Storage of Sensitive Information in a Cookie
|
|
801
|
+
Use of a Key Past its Expiration Date
|
|
833
802
|
Improper Neutralization of Special Elements used in a Command ('Command Injection')
|
|
834
|
-
|
|
835
|
-
|
|
836
|
-
|
|
837
|
-
|
|
838
|
-
|
|
839
|
-
|
|
840
|
-
|
|
841
|
-
|
|
842
|
-
|
|
843
|
-
|
|
844
|
-
|
|
845
|
-
|
|
846
|
-
|
|
847
|
-
|
|
803
|
+
Loop with Unreachable Exit Condition ('Infinite Loop')
|
|
804
|
+
Untrusted Search Path
|
|
805
|
+
Assignment to Variable without Use
|
|
806
|
+
Unrestricted Externally Accessible Lock
|
|
807
|
+
Embedded Malicious Code
|
|
808
|
+
Path Equivalence: 'filedir*' (Wildcard)
|
|
809
|
+
Use of Hard-coded, Security-relevant Constants
|
|
810
|
+
Information Loss or Omission
|
|
811
|
+
Improper Neutralization of Special Elements Used in a Template Engine
|
|
812
|
+
Incomplete Documentation of Program Execution
|
|
813
|
+
Weak Password Requirements
|
|
814
|
+
External Control of Assumed-Immutable Web Parameter
|
|
815
|
+
Untrusted Pointer Dereference
|
|
816
|
+
Use of Web Browser Cache Containing Sensitive Information
|
|
817
|
+
Integer Underflow (Wrap or Wraparound)
|
|
818
|
+
Insufficient Entropy
|
|
819
|
+
Trusting HTTP Permission Methods on the Server Side
|
|
820
|
+
EJB Bad Practices: Use of Sockets
|
|
821
|
+
Improper Control of Dynamically-Managed Code Resources
|
|
822
|
+
Unsafe ActiveX Control Marked Safe For Scripting
|
|
823
|
+
Improper Update of Reference Count
|
|
824
|
+
J2EE Bad Practices: Use of System.exit()
|
|
825
|
+
Improper Input Validation
|
|
826
|
+
Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
|
|
827
|
+
Use of Obsolete Function
|
|
828
|
+
Reliance on File Name or Extension of Externally-Supplied File
|
|
829
|
+
Operation on a Resource after Expiration or Release
|
|
830
|
+
Insertion of Sensitive Information into Log File
|
|
831
|
+
Assignment of a Fixed Address to a Pointer
|
|
832
|
+
Use of Singleton Pattern Without Synchronization in a Multithreaded Context
|
|
833
|
+
Password Aging with Long Expiration
|
|
834
|
+
Cleartext Storage in the Registry
|
|
835
|
+
Missing Authorization
|
|
836
|
+
Overly Restrictive Regular Expression
|
|
837
|
+
Operation on Resource in Wrong Phase of Lifetime
|
|
838
|
+
J2EE Framework: Saving Unserializable Objects to Disk
|
|
848
839
|
Operator Precedence Logic Error
|
|
849
|
-
|
|
850
|
-
|
|
851
|
-
|
|
852
|
-
|
|
853
|
-
|
|
854
|
-
|
|
855
|
-
|
|
856
|
-
|
|
857
|
-
|
|
840
|
+
Unexpected Sign Extension
|
|
841
|
+
Improper Neutralization of Special Elements in Data Query Logic
|
|
842
|
+
Race Condition within a Thread
|
|
843
|
+
Call to Non-ubiquitous API
|
|
844
|
+
Missing Origin Validation in WebSockets
|
|
845
|
+
Permissive Cross-domain Security Policy with Untrusted Domains
|
|
846
|
+
Incomplete Design Documentation
|
|
847
|
+
Cleartext Storage in a File or on Disk
|
|
848
|
+
Improper Handling of Extra Parameters
|
|
849
|
+
Integer Coercion Error
|
|
850
|
+
J2EE Misconfiguration: Insufficient Session-ID Length
|
|
851
|
+
Unprotected Transport of Credentials
|
|
852
|
+
Reliance on Insufficiently Trustworthy Component
|
|
853
|
+
Privilege Chaining
|
|
854
|
+
Path Equivalence: 'filename.' (Trailing Dot)
|
|
855
|
+
Product Released in Non-Release Configuration
|
|
856
|
+
Race Condition During Access to Alternate Channel
|
|
857
|
+
Improper Neutralization of Parameter/Argument Delimiters
|
|
858
|
+
Exposure of Sensitive System Information to an Unauthorized Control Sphere
|
|
859
|
+
Inclusion of Undocumented Features or Chicken Bits
|
|
858
860
|
Incomplete Filtering of One or More Instances of Special Elements
|
|
859
|
-
|
|
861
|
+
Insufficient Granularity of Address Regions Protected by Register Locks
|
|
862
|
+
Use of Implicit Intent for Sensitive Communication
|
|
863
|
+
Excessive Platform Resource Consumption within a Loop
|
|
864
|
+
Password in Configuration File
|
|
865
|
+
Improper Following of a Certificate's Chain of Trust
|
|
866
|
+
EJB Bad Practices: Use of AWT Swing
|
|
867
|
+
Path Traversal: '....//'
|
|
868
|
+
Use of Object without Invoking Destructor Method
|
|
869
|
+
Unquoted Search Path or Element
|
|
870
|
+
Improper Identifier for IP Block used in System-On-Chip (SOC)
|
|
871
|
+
Weak Encoding for Password
|
|
872
|
+
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
|
|
873
|
+
Improper Handling of Alternate Encoding
|
|
874
|
+
Assigning instead of Comparing
|
|
875
|
+
Path Traversal: 'dir/../../filename'
|
|
876
|
+
Critical Data Element Declared Public
|
|
877
|
+
Violation of Secure Design Principles
|
|
878
|
+
Improper Privilege Management
|
|
879
|
+
Incorrect Bitwise Shift of Integer
|
|
860
880
|
Incomplete Filtering of Multiple Instances of Special Elements
|
|
861
|
-
|
|
862
|
-
|
|
863
|
-
|
|
864
|
-
|
|
865
|
-
|
|
866
|
-
|
|
867
|
-
Improper
|
|
868
|
-
|
|
869
|
-
|
|
870
|
-
|
|
871
|
-
|
|
872
|
-
|
|
873
|
-
|
|
874
|
-
|
|
875
|
-
|
|
876
|
-
|
|
877
|
-
|
|
878
|
-
Access of Uninitialized Pointer
|
|
879
|
-
Expired Pointer Dereference
|
|
880
|
-
Premature Release of Resource During Expected Lifetime
|
|
881
|
-
Improper Control of Document Type Definition
|
|
882
|
-
Signal Handler with Functionality that is not Asynchronous-Safe
|
|
883
|
-
Inclusion of Functionality from Untrusted Control Sphere
|
|
884
|
-
Improper Neutralization of Script in Attributes in a Web Page
|
|
885
|
-
Inclusion of Web Functionality from an Untrusted Source
|
|
881
|
+
Call to Thread run() instead of start()
|
|
882
|
+
Improper Resource Locking
|
|
883
|
+
Signal Handler Race Condition
|
|
884
|
+
Insecure Preserved Inherited Permissions
|
|
885
|
+
Return of Wrong Status Code
|
|
886
|
+
Creation of Temporary File With Insecure Permissions
|
|
887
|
+
Improper Handling of Unexpected Data Type
|
|
888
|
+
Invokable Control Element with Signature Containing an Excessive Number of Parameters
|
|
889
|
+
Using Referer Field for Authentication
|
|
890
|
+
Uncontrolled Search Path Element
|
|
891
|
+
Cleartext Storage of Sensitive Information in GUI
|
|
892
|
+
Source Code Element without Standard Prologue
|
|
893
|
+
Use of RSA Algorithm without OAEP
|
|
894
|
+
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
|
895
|
+
Private Data Structure Returned From A Public Method
|
|
896
|
+
finalize() Method Declared Public
|
|
897
|
+
Replicating Malicious Code (Virus or Worm)
|
|
886
898
|
Signal Handler Function Associated with Multiple Signals
|
|
887
|
-
|
|
888
|
-
|
|
889
|
-
|
|
890
|
-
|
|
891
|
-
|
|
892
|
-
|
|
893
|
-
Inappropriate Encoding for Output Context
|
|
894
|
-
Numeric Range Comparison Without Minimum Check
|
|
895
|
-
Improper Neutralization of Encoded URI Schemes in a Web Page
|
|
896
|
-
Improper Enforcement of Behavioral Workflow
|
|
897
|
-
Placement of User into Incorrect Group
|
|
898
|
-
Access of Resource Using Incompatible Type ('Type Confusion')
|
|
899
|
-
Doubled Character XSS Manipulations
|
|
900
|
-
Improper Neutralization of Invalid Characters in Identifiers in Web Pages
|
|
901
|
-
Missing Authorization
|
|
902
|
-
Incorrect Authorization
|
|
903
|
-
Improper Neutralization of Alternate XSS Syntax
|
|
904
|
-
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
|
|
905
|
-
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
|
|
906
|
-
J2EE Misconfiguration: Weak Access Permissions for EJB Methods
|
|
907
|
-
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
|
|
908
|
-
Use of Uninitialized Resource
|
|
909
|
-
Missing Initialization of Resource
|
|
910
|
-
XML Injection (aka Blind XPath Injection)
|
|
911
|
-
Use of Expired File Descriptor
|
|
912
|
-
Improper Update of Reference Count
|
|
913
|
-
Hidden Functionality
|
|
914
|
-
Improper Control of Dynamically-Managed Code Resources
|
|
915
|
-
Improper Control of Dynamically-Identified Variables
|
|
916
|
-
Improperly Controlled Modification of Dynamically-Determined Object Attributes
|
|
917
|
-
Use of Password Hash With Insufficient Computational Effort
|
|
918
|
-
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
|
|
919
|
-
Server-Side Request Forgery (SSRF)
|
|
920
|
-
Improper Restriction of Power Consumption
|
|
921
|
-
Storage of Sensitive Data in a Mechanism without Access Control
|
|
922
|
-
Insecure Storage of Sensitive Information
|
|
899
|
+
Observable Internal Behavioral Discrepancy
|
|
900
|
+
Device Unlock Credential Sharing
|
|
901
|
+
Binding to an Unrestricted IP Address
|
|
902
|
+
Reliance on Reverse DNS Resolution for a Security-Critical Action
|
|
903
|
+
Class with Virtual Method without a Virtual Destructor
|
|
904
|
+
Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
|
|
923
905
|
Improper Restriction of Communication Channel to Intended Endpoints
|
|
924
|
-
|
|
925
|
-
|
|
926
|
-
|
|
927
|
-
|
|
928
|
-
|
|
929
|
-
|
|
930
|
-
|
|
931
|
-
|
|
932
|
-
|
|
933
|
-
|
|
934
|
-
|
|
935
|
-
|
|
936
|
-
Improper Neutralization of
|
|
937
|
-
|
|
938
|
-
|
|
939
|
-
|
|
906
|
+
Reliance on a Single Factor in a Security Decision
|
|
907
|
+
Sensitive Cookie Without 'HttpOnly' Flag
|
|
908
|
+
Storage of File With Sensitive Data Under FTP Root
|
|
909
|
+
Improper Handling of Highly Compressed Data (Data Amplification)
|
|
910
|
+
Incorrect Behavior Order: Early Amplification
|
|
911
|
+
Invocation of Process Using Visible Sensitive Information
|
|
912
|
+
Only Filtering One Instance of a Special Element
|
|
913
|
+
Path Equivalence: 'filedir\' (Trailing Backslash)
|
|
914
|
+
Path Traversal: '/dir/../filename'
|
|
915
|
+
Comparison of Classes by Name
|
|
916
|
+
Dead Code
|
|
917
|
+
Buffer Over-read
|
|
918
|
+
Improper Neutralization of Multiple Trailing Special Elements
|
|
919
|
+
Dynamic Variable Evaluation
|
|
920
|
+
Use of Password System for Primary Authentication
|
|
921
|
+
Encoding Error
|
|
922
|
+
Incorrect Check of Function Return Value
|
|
923
|
+
Improper Physical Access Control
|
|
924
|
+
Creation of Emergent Resource
|
|
925
|
+
PHP External Variable Modification
|
|
926
|
+
Reliance on Untrusted Inputs in a Security Decision
|
|
927
|
+
Multiple Releases of Same Resource or Handle
|
|
928
|
+
Hardware Child Block Incorrectly Connected to Parent System
|
|
929
|
+
Failure to Handle Incomplete Element
|
|
930
|
+
Improper Neutralization of Null Byte or NUL Character
|
|
931
|
+
Sensitive Information Uncleared Before Debug/Power State Transition
|
|
932
|
+
Floating Point Comparison with Incorrect Operator
|
|
933
|
+
Release of Invalid Pointer or Reference
|
|
934
|
+
Improper Handling of Case Sensitivity
|
|
935
|
+
Omitted Break Statement in Switch
|
|
936
|
+
J2EE Bad Practices: Direct Management of Connections
|
|
937
|
+
Missing Serialization Control Element
|
|
938
|
+
Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code
|
|
939
|
+
Use of Hard-coded Credentials
|
|
940
|
+
Multiple Unlocks of a Critical Resource
|
|
941
|
+
Insufficient Logging
|
|
942
|
+
Missing Release of Resource after Effective Lifetime
|
|
943
|
+
Improper Authorization
|
|
944
|
+
Improper Handling of Inconsistent Structural Elements
|