txt2stix 1.1.8__py3-none-any.whl → 1.1.10__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. txt2stix/includes/extractions/ai/config.yaml +20 -0
  2. txt2stix/includes/extractions/lookup/config.yaml +33 -15
  3. txt2stix/includes/lookups/_generate_lookups.py +39 -30
  4. txt2stix/includes/lookups/{disarm_id_v1_5.txt → disarm_id_v1_6.txt} +95 -32
  5. txt2stix/includes/lookups/{disarm_name_v1_5.txt → disarm_name_v1_6.txt} +380 -317
  6. txt2stix/includes/lookups/{mitre_atlas_id_v4_5_2.txt → mitre_atlas_id_v4_9_0.txt} +41 -1
  7. txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt +157 -0
  8. txt2stix/includes/lookups/{mitre_attack_enterprise_aliases_v16_0.txt → mitre_attack_enterprise_aliases_v18_0.txt} +679 -531
  9. txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt +4293 -0
  10. txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt +4295 -0
  11. txt2stix/includes/lookups/{mitre_attack_ics_aliases_v16_0.txt → mitre_attack_ics_aliases_v18_0.txt} +7 -3
  12. txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt +410 -0
  13. txt2stix/includes/lookups/{mitre_attack_ics_name_v16_0.txt → mitre_attack_ics_name_v18_0.txt} +172 -53
  14. txt2stix/includes/lookups/{mitre_attack_mobile_aliases_v16_0.txt → mitre_attack_mobile_aliases_v18_0.txt} +33 -0
  15. txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt +643 -0
  16. txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt +645 -0
  17. txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +522 -522
  18. txt2stix/includes/lookups/{mitre_cwe_id_v4_15.txt → mitre_cwe_id_v4_18.txt} +5 -0
  19. txt2stix/includes/lookups/{mitre_cwe_name_v4_15.txt → mitre_cwe_name_v4_18.txt} +889 -884
  20. txt2stix/includes/lookups/sector_aliases_v1_0.txt +751 -0
  21. txt2stix/includes/tests/test_cases.yaml +8 -0
  22. txt2stix/retriever.py +6 -0
  23. {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/METADATA +2 -10
  24. {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/RECORD +27 -26
  25. txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +0 -117
  26. txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +0 -1656
  27. txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +0 -1765
  28. txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +0 -254
  29. txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +0 -277
  30. txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +0 -296
  31. {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/WHEEL +0 -0
  32. {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/entry_points.txt +0 -0
  33. {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/licenses/LICENSE +0 -0
@@ -1,939 +1,944 @@
1
- Sensitive Cookie Without 'HttpOnly' Flag
2
- Insufficient Visual Distinction of Homoglyphs Presented to User
3
- Struts: Duplicate Validation Forms
4
- Improper Restriction of Rendered UI Layers or Frames
5
- Use of Web Link to Untrusted Target with window.opener Access
6
- Incomplete Comparison with Missing Factors
7
- Comparison of Incompatible Types
8
- Comparison Using Wrong Factors
1
+ Reliance on Machine-Dependent Data Representation
2
+ Path Traversal: '../filedir'
3
+ Improper Access Control Applied to Mirrored or Aliased Memory Regions
4
+ Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution
5
+ Unchecked Error Condition
6
+ Spyware
7
+ Duplicate Key in Associative List (Alist)
8
+ Empty Password in Configuration File
9
+ Function Call With Incorrect Order of Arguments
9
10
  Struts: Incomplete validate() Method Definition
10
- Processor Optimization Removal or Modification of Security-critical Code
11
- Insecure Automated Optimizations
12
- Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations
13
- Struts: Form Bean Does Not Extend Validation Class
14
- Use of Redundant Code
15
- Static Member Data Element outside of a Singleton Class Element
16
- Data Element Aggregating an Excessively Large Number of Non-Primitive Elements
17
- Architecture with Number of Horizontal Layers Outside of Expected Range
18
- Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor
11
+ Incorrect Control Flow Scoping
12
+ Covert Channel
13
+ Exposure of Backup File to an Unauthorized Control Sphere
14
+ Improper Clearing of Heap Memory Before Release ('Heap Inspection')
15
+ Reflection Attack in an Authentication Protocol
16
+ Use of Hard-coded Cryptographic Key
17
+ Off-by-one Error
18
+ Use of Less Trusted Source
19
+ Use of Wrong Operator in String Comparison
20
+ ASP.NET Misconfiguration: Improper Model Validation
21
+ Improper Handling of Length Parameter Inconsistency
22
+ Expired Pointer Dereference
23
+ Null Byte Interaction Error (Poison Null Byte)
24
+ Improper Verification of Cryptographic Signature
25
+ Missing Critical Step in Authentication
26
+ Improper Neutralization of Value Delimiters
27
+ Insufficient Isolation of Symbolic Constant Definitions
28
+ Improper Handling of Overlap Between Protected Memory Ranges
29
+ Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
30
+ Path Traversal: '/../filedir'
31
+ Improper Neutralization of Leading Special Elements
32
+ Improper Null Termination
33
+ Privilege Dropping / Lowering Errors
34
+ Path Traversal: '...' (Triple Dot)
35
+ Reliance on Cookies without Validation and Integrity Checking
36
+ Missing Release of File Descriptor or Handle after Effective Lifetime
37
+ Reliance on HTTP instead of HTTPS
38
+ Improper Neutralization of Data within XPath Expressions ('XPath Injection')
39
+ Improper Restriction of Write-Once Bit Fields
40
+ Use of Inherently Dangerous Function
41
+ Improper Verification of Source of a Communication Channel
19
42
  Creation of Immutable Text Using String Concatenation
20
43
  Modules with Circular Dependencies
21
- Invokable Control Element with Large Number of Outward Calls
22
- Excessive Data Query Operations in a Large Data Table
23
- Struts: Form Field Without Validator
24
- Excessive Platform Resource Consumption within a Loop
25
- Initialization with Hard-Coded Network Resource Configuration Data
26
- Excessive Use of Hard-Coded Literals in Initialization
27
- Missing Documentation for Design
28
- Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer
29
- Multiple Inheritance from Concrete Classes
30
- Invokable Control Element with Variadic Parameters
31
- Data Access Operations Outside of Expected Data Manager Component
32
- Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element
33
- Insufficient Technical Documentation
34
- Struts: Plug-in Framework not in Use
35
- Excessive Number of Inefficient Server-Side Data Accesses
36
- Insufficient Encapsulation
37
- Parent Class with References to Child Class
38
- Creation of Class Instance within a Static Code Block
39
- Invokable Control Element with Signature Containing an Excessive Number of Parameters
40
- Runtime Resource Management Control Element in a Component Built to Run on Application Servers
41
- Missing Serialization Control Element
42
- Excessive Execution of Sequential Searches of Data Resource
43
- Inconsistency Between Implementation and Documented Design
44
- Empty Exception Block
45
- Struts: Unused Validation Form
46
- Serializable Data Element Containing non-Serializable Item Elements
47
- Empty Code Block
48
- Data Resource Access without Use of Connection Pooling
49
- Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses
50
- Class with Excessively Deep Inheritance
51
- Unconditional Control Flow Transfer outside of Switch Block
52
- Insufficient Adherence to Expected Conventions
53
- Floating Point Comparison with Incorrect Operator
54
- Inappropriate Source Code Style or Formatting
55
- Parent Class without Virtual Destructor Method
56
- Struts: Unvalidated Action Form
57
- Source Code File with Excessive Number of Lines of Code
58
- Class Instance Self Destruction Control Element
59
- Data Access from Outside Expected Data Manager Component
60
- Invokable Control Element with Excessive File or Data Access Operations
61
- Invokable Control Element with Excessive Volume of Commented-out Code
62
- Class with Excessive Number of Child Classes
63
- Class with Virtual Method without a Virtual Destructor
64
- Synchronous Access of Remote Resource without Timeout
65
- Large Data Table with Excessive Number of Indices
66
- Struts: Validator Turned Off
67
- Method Containing Access of a Member Element from Another Class
68
- Use of Object without Invoking Destructor Method
69
- Use of Same Invokable Control Element in Multiple Architectural Layers
70
- Excessively Complex Data Representation
71
- Excessive Index Range Scan for a Data Resource
72
- Loop Condition Value Update within the Loop
73
- Singleton Class Instance Creation without Proper Locking or Synchronization
74
- Persistent Storable Data Element without Associated Comparison Control Element
75
- Data Element containing Pointer Item without Proper Copy Control Element
76
- Inconsistent Naming Conventions for Identifiers
77
- ASP.NET Misconfiguration: Creating Debug Binary
78
- Struts: Validator Without Form Field
79
- Insufficient Isolation of System-Dependent Functions
80
- Reliance on Runtime Component in Generated Code
81
- Reliance on Machine-Dependent Data Representation
82
- Use of Platform-Dependent Third Party Components
83
- Use of Unmaintained Third Party Components
84
- Insufficient Encapsulation of Machine-Dependent Functionality
85
- Insufficient Use of Symbolic Constants
86
- Insufficient Isolation of Symbolic Constant Definitions
87
- Excessive Reliance on Global Variables
88
- Use of Same Variable for Multiple Purposes
89
- Direct Use of Unsafe JNI
90
- Incomplete Design Documentation
91
- Incomplete I/O Documentation
92
- Incomplete Documentation of Program Execution
93
- Inappropriate Comment Style
94
- Inappropriate Whitespace Style
95
- Source Code Element without Standard Prologue
96
- Inaccurate Comments
97
- Callable with Insufficient Behavioral Summary
98
- Insufficient Documentation of Error Handling Techniques
99
- Excessive Use of Unconditional Branching
100
- Missing XML Validation
101
- Excessive Code Complexity
102
- Excessive McCabe Cyclomatic Complexity
44
+ Omission of Security-relevant Information
103
45
  Excessive Halstead Complexity
104
- Excessive Use of Self-Modifying Code
105
- Excessively Deep Nesting
106
- Excessive Attack Surface
107
- Declaration of Variable with Unnecessarily Wide Scope
108
- Compilation with Insufficient Warnings or Errors
109
- Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
110
- Process Control
111
- Misinterpretation of Input
112
- Improper Encoding or Escaping of Output
113
- Irrelevant Code
114
- Improper Output Neutralization for Logs
115
- Improper Use of Validation Framework
116
- ASP.NET Misconfiguration: Improper Model Validation
46
+ J2EE Misconfiguration: Weak Access Permissions for EJB Methods
47
+ Server-Side Request Forgery (SSRF)
48
+ Public Static Field Not Marked Final
49
+ Use of GET Request Method With Sensitive Query Strings
50
+ Not Failing Securely ('Failing Open')
51
+ Incorrect Regular Expression
52
+ Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor
53
+ Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
54
+ Access of Resource Using Incompatible Type ('Type Confusion')
55
+ Insufficient Resource Pool
56
+ Permissive List of Allowed Inputs
57
+ Path Equivalence: 'filename ' (Trailing Space)
58
+ Callable with Insufficient Behavioral Summary
59
+ Missing Source Correlation of Multiple Independent Data
60
+ Exposure of Version-Control Repository to an Unauthorized Control Sphere
61
+ Improper Neutralization of Invalid Characters in Identifiers in Web Pages
62
+ Path Traversal: '\\UNC\share\name\' (Windows UNC Share)
63
+ Missing Encryption of Sensitive Data
64
+ Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
65
+ Improper Neutralization of Escape, Meta, or Control Sequences
117
66
  Inefficient CPU Computation
118
- Use of Prohibited Code
67
+ Path Equivalence: 'file...name' (Multiple Internal Dot)
68
+ Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
119
69
  Incorrect Access of Indexable Resource ('Range Error')
120
- Initialization of a Resource with an Insecure Default
121
- Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
122
- Improper Restriction of Operations within the Bounds of a Memory Buffer
70
+ Excessive Data Query Operations in a Large Data Table
71
+ Use of Blocking Code in Single-threaded, Non-blocking Context
72
+ Missing Protection Mechanism for Alternate Hardware Interface
73
+ Incorrect Calculation
74
+ Application-Level Admin Tool with Inconsistent View of Underlying Operating System
123
75
  DMA Device Enabled Too Early in Boot Phase
124
- On-Chip Debug and Test Interface With Improper Access Control
125
- Improper Identifier for IP Block used in System-On-Chip (SOC)
126
- Power-On of Untrusted Execution Core Before Enabling Fabric Access Control
127
- ASP.NET Misconfiguration: Missing Custom Error Page
128
- Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
129
- Generation of Weak Initialization Vector (IV)
130
- Failure to Disable Reserved Bits
131
- Stack-based Buffer Overflow
132
- Heap-based Buffer Overflow
133
- Insufficient Granularity of Access Control
134
- Incorrect Register Defaults or Module Parameters
135
- Insufficient Granularity of Address Regions Protected by Register Locks
136
- Race Condition for Write-Once Attributes
137
- Improper Restriction of Write-Once Bit Fields
138
- Creation of Emergent Resource
76
+ Missing Initialization of Resource
77
+ Externally-Generated Error Message Containing Sensitive Information
78
+ Reliance on Data/Memory Layout
79
+ Improper Handling of Undefined Parameters
80
+ Improper Neutralization of Script in Attributes in a Web Page
81
+ ASP.NET Misconfiguration: Creating Debug Binary
82
+ Improper Validation of Function Hook Arguments
83
+ Improper Handling of Extra Values
84
+ Authorization Bypass Through User-Controlled SQL Primary Key
85
+ Invokable Control Element with Excessive File or Data Access Operations
86
+ Path Equivalence: '\multiple\\internal\backslash'
87
+ Excessive Use of Hard-Coded Literals in Initialization
88
+ Modification of Assumed-Immutable Data (MAID)
89
+ Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
90
+ Windows Shortcut Following (.LNK)
91
+ Excessive Reliance on Global Variables
92
+ XML Injection (aka Blind XPath Injection)
93
+ Improper Isolation or Compartmentalization
94
+ Improper Protection of Alternate Path
95
+ Misinterpretation of Input
96
+ Improper Restriction of Names for Files and Other Resources
97
+ Missing Support for Security Features in On-chip Fabrics or Buses
98
+ Incorrect Behavior Order: Validate Before Canonicalize
99
+ External Influence of Sphere Definition
100
+ Improper Handling of URL Encoding (Hex Encoding)
101
+ Improper Enforcement of Message Integrity During Transmission in a Communication Channel
102
+ Improper Control of Document Type Definition
103
+ J2EE Misconfiguration: Missing Custom Error Page
104
+ Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
139
105
  Write-what-where Condition
140
- Exposure of Sensitive Information Through Metadata
141
- Improper Prevention of Lock Bit Modification
142
- Improper Lock Behavior After Power State Transition
143
- Security-Sensitive Hardware Controls with Missing Lock Bit Protection
144
- Hardware Internal or Debug Modes Allow Override of Locks
145
- Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations
146
- Improper Neutralization of Formula Elements in a CSV File
147
- Improper Zeroization of Hardware Register
148
- Buffer Underwrite ('Buffer Underflow')
149
- Use of a Cryptographic Primitive with a Risky Implementation
150
- Use of Predictable Algorithm in Random Number Generator
151
- Inclusion of Undocumented Features or Chicken Bits
152
- Sensitive Non-Volatile Information Not Protected During Debug
153
- Internal Asset Exposed to Unsafe Debug Access Level or State
106
+ External Control of Critical State Data
107
+ Synchronous Access of Remote Resource without Timeout
108
+ Use of Out-of-range Pointer Offset
109
+ Remanent Data Readable after Memory Erase
110
+ Struts: Validator Turned Off
111
+ Insufficient Use of Symbolic Constants
112
+ Use of Non-Canonical URL Paths for Authorization Decisions
154
113
  Improper Finite State Machines (FSMs) in Hardware Logic
155
- Improper Write Handling in Limited-write Non-Volatile Memories
156
- Improper Protection Against Voltage and Clock Glitches
157
- Semiconductor Defects in Hardware Logic with Security-Sensitive Implications
158
- Application-Level Admin Tool with Inconsistent View of Underlying Operating System
159
- Out-of-bounds Read
160
- Improper Preservation of Consistency Between Independent Representations of Shared State
161
- Mirrored Regions with Different Values
162
- CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
163
- Incorrect Selection of Fuse Values
164
- Incorrect Comparison Logic Granularity
165
- Comparison Logic is Vulnerable to Power Side-Channel Attacks
166
- Improper Restriction of Software Interfaces to Hardware Features
167
- Improper Access Control Applied to Mirrored or Aliased Memory Regions
168
- Exposure of Sensitive System Information Due to Uncleared Debug Information
169
- Improper Restriction of Security Token Assignment
170
- Buffer Over-read
171
- Improper Handling of Overlap Between Protected Memory Ranges
172
- Improper Handling of Single Event Upsets
173
- Improper Access Control for Register Interface
174
- Improper Physical Access Control
175
- Hardware Logic with Insecure De-Synchronization between Control and Data Channels
176
- Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls
177
- Improper Scrubbing of Sensitive Data from Decommissioned Device
178
- Policy Uses Obsolete Encoding
179
- Policy Privileges are not Assigned Consistently Between Control and Data Agents
180
- Product Released in Non-Release Configuration
181
- Buffer Under-read
182
- Generation of Incorrect Security Tokens
183
- Uninitialized Value on Reset for Registers Holding Security Settings
184
- Sensitive Information Uncleared Before Debug/Power State Transition
185
- Device Unlock Credential Sharing
186
- Improper Access Control for Volatile Memory Containing Boot Code
187
- Sensitive Cookie with Improper SameSite Attribute
188
- Hardware Child Block Incorrectly Connected to Parent System
189
- Firmware Not Updateable
190
- Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
191
- Cryptographic Operations are run Before Supporting Units are Ready
192
- Wrap-around Error
193
- Access Control Check Implemented After Asset is Accessed
194
- Sequence of Processor Instructions Leads to Unexpected Behavior
195
- Assumed-Immutable Data is Stored in Writable Memory
196
- Mutable Attestation or Measurement Reporting Data
197
- Improper Validation of Specified Quantity in Input
198
- Improper Validation of Specified Index, Position, or Offset in Input
199
- Improper Validation of Syntactic Correctness of Input
200
- Improper Validation of Specified Type of Input
201
- Improper Validation of Consistency within Input
202
- Improper Validation of Unsafe Equivalence in Input
203
- Improper Validation of Array Index
204
- Incorrect Decoding of Security Identifiers
205
- Public Key Re-Use for Signing both Debug and Production Code
206
- Incorrect Conversion of Security Identifiers
207
- Missing Source Correlation of Multiple Independent Data
208
- Insecure Security Identifier Mechanism
209
- Debug Messages Revealing Unnecessary Information
210
- Incorrect Chaining or Granularity of Debug Components
211
- Unprotected Confidential Information on Device is Accessible by OSAT Vendors
212
- Hardware Logic Contains Race Conditions
213
- Missing Protection Mechanism for Alternate Hardware Interface
214
- ASP.NET Misconfiguration: Password in Configuration File
215
- Improper Handling of Length Parameter Inconsistency
216
- Improper Protection of Physical Side Channels
217
- Insufficient or Incomplete Data Removal within Hardware Component
218
- Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
219
- Non-Transparent Sharing of Microarchitectural Resources
220
- Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
221
- Incorrect Calculation of Buffer Size
222
- Missing Ability to Patch ROM Code
223
- Improper Translation of Security Attributes by Fabric Bridge
224
- Missing Protection for Mirrored Regions in On-Chip Fabric Firewall
225
- Hardware Allows Activation of Test or Debug Logic at Runtime
226
- Missing Write Protection for Parametric Data Values
227
- Improper Setting of Bus Controlling Capability in Fabric End-point
228
- Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges
229
- Improper Access Control in Fabric Bridge
230
- Missing Support for Security Features in On-chip Fabrics or Buses
231
- Improper Protection against Electromagnetic Fault Injection (EM-FI)
232
- Improper Protection for Outbound Error Messages and Alert Signals
233
- Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
234
- Use of Blocking Code in Single-threaded, Non-blocking Context
235
- Improper Management of Sensitive Trace Data
236
- Improperly Controlled Sequential Memory Allocation
237
- Missing Immutable Root of Trust in Hardware
238
- Binding to an Unrestricted IP Address
239
- Security Version Number Mutable to Older Versions
240
- Reliance on Component That is Not Updateable
241
- Remanent Data Readable after Memory Erase
242
- Improper Isolation of Shared Resources in Network On Chip (NoC)
243
- Improper Handling of Faults that Lead to Instruction Skips
244
- Inefficient Regular Expression Complexity
245
- Unauthorized Error Injection Can Degrade Hardware Redundancy
246
- Incorrect Bitwise Shift of Integer
247
- Improper Neutralization of Special Elements Used in a Template Engine
248
- Improper Protections Against Hardware Overheating
249
- Insufficient Precision or Accuracy of a Real Number
250
- Use of Externally-Controlled Format String
251
- Multiple Releases of Same Resource or Handle
252
- Information Exposure through Microarchitectural State after Transient Execution
253
- Incorrect Calculation of Multi-Byte String Length
254
- Improper Handling of Hardware Behavior in Exceptionally Cold Environments
255
- Reliance on Insufficiently Trustworthy Component
256
- Improper Neutralization of Special Elements
257
- Improper Handling of Physical or Environmental Conditions
258
- Missing Origin Validation in WebSockets
259
- Insecure Operation on Windows Junction / Mount Point
260
- Incorrect Parsing of Numbers with Different Radices
261
- Weak Authentication
262
- Use of Weak Credentials
263
- Use of Default Credentials
264
- Use of Default Password
265
- Use of Default Cryptographic Key
266
- Dependency on Vulnerable Third-Party Component
267
- Compiler Removal of Code to Clear Buffers
268
- Improper Neutralization of Delimiters
269
- Improper Neutralization of Parameter/Argument Delimiters
270
- Incorrect Initialization of Resource
271
- Improper Neutralization of Value Delimiters
272
- Exposure of Sensitive Information during Transient Execution
273
- Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution
274
- Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution
275
- Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution
276
- Improper Validation of Generative AI Output
277
- Improper Neutralization of Record Delimiters
278
- Improper Neutralization of Line Delimiters
279
- Improper Neutralization of Section Delimiters
280
- Improper Neutralization of Expression/Command Delimiters
281
- Improper Neutralization of Input Terminators
282
- Improper Neutralization of Input Leaders
283
- Improper Neutralization of Quoting Syntax
284
- External Control of System or Configuration Setting
285
- Improper Neutralization of Escape, Meta, or Control Sequences
286
- Improper Neutralization of Comment Delimiters
287
- Improper Neutralization of Macro Symbols
288
- Improper Neutralization of Substitution Characters
289
- Improper Neutralization of Variable Name Delimiters
290
- Improper Neutralization of Wildcards or Matching Symbols
291
- Improper Neutralization of Whitespace
292
- Failure to Sanitize Paired Delimiters
293
- Improper Neutralization of Null Byte or NUL Character
294
- Improper Handling of Invalid Use of Special Elements
295
- Improper Neutralization of Leading Special Elements
114
+ Improper Enforcement of a Single, Unique Action
115
+ Insecure Automated Optimizations
116
+ Transmission of Private Resources into a New Sphere ('Resource Leak')
117
+ Path Equivalence: '/multiple//internal/slash'
118
+ Incorrect Short Circuit Evaluation
119
+ Missing Reference to Active Allocated Resource
120
+ Empty Exception Block
296
121
  Improper Neutralization of Multiple Leading Special Elements
297
- Improper Neutralization of Trailing Special Elements
298
- Improper Neutralization of Multiple Trailing Special Elements
299
- Improper Neutralization of Internal Special Elements
300
- Improper Neutralization of Multiple Internal Special Elements
301
- Improper Handling of Missing Special Element
302
- Improper Handling of Additional Special Element
303
- Improper Handling of Inconsistent Special Elements
304
- Improper Null Termination
305
- Encoding Error
306
- Improper Handling of Alternate Encoding
307
- Double Decoding of the Same Data
308
- Improper Handling of Mixed Encoding
309
- Improper Handling of Unicode Encoding
310
- Improper Handling of URL Encoding (Hex Encoding)
311
- Improper Handling of Case Sensitivity
312
- Incorrect Behavior Order: Early Validation
313
- Incorrect Behavior Order: Validate Before Canonicalize
314
- Incorrect Behavior Order: Validate Before Filter
315
- Collapse of Data into Unsafe Value
316
- Permissive List of Allowed Inputs
317
- Incomplete List of Disallowed Inputs
318
- Incorrect Regular Expression
319
- Overly Restrictive Regular Expression
320
- Partial String Comparison
321
- Reliance on Data/Memory Layout
322
- Integer Overflow or Wraparound
323
- Integer Underflow (Wrap or Wraparound)
324
- Integer Coercion Error
325
- Off-by-one Error
326
- Unexpected Sign Extension
327
- Signed to Unsigned Conversion Error
328
- Unsigned to Signed Conversion Error
329
- Numeric Truncation Error
122
+ Inefficient Regular Expression Complexity
123
+ Struts: Unused Validation Form
330
124
  Use of Incorrect Byte Ordering
331
- Improper Input Validation
332
- Exposure of Sensitive Information to an Unauthorized Actor
333
- Insertion of Sensitive Information Into Sent Data
334
- Exposure of Sensitive Information Through Data Queries
335
- Observable Discrepancy
336
- Observable Response Discrepancy
337
- Observable Behavioral Discrepancy
338
- Observable Internal Behavioral Discrepancy
339
- Observable Behavioral Discrepancy With Equivalent Products
340
- Observable Timing Discrepancy
341
- Generation of Error Message Containing Sensitive Information
342
- Self-generated Error Message Containing Sensitive Information
343
- Externally-Generated Error Message Containing Sensitive Information
344
- Improper Removal of Sensitive Information Before Storage or Transfer
345
- Exposure of Sensitive Information Due to Incompatible Policies
346
- Invocation of Process Using Visible Sensitive Information
347
- Insertion of Sensitive Information Into Debugging Code
348
- Storage of File with Sensitive Data Under Web Root
349
- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
350
- Storage of File With Sensitive Data Under FTP Root
351
- Information Loss or Omission
352
- Truncation of Security-relevant Information
353
- Omission of Security-relevant Information
354
- Obscured Security-relevant Information by Alternate Name
355
- Sensitive Information in Resource Not Removed Before Reuse
356
- Improper Handling of Syntactically Invalid Structure
357
- Improper Handling of Values
358
- Relative Path Traversal
359
- Improper Handling of Missing Values
360
- Improper Handling of Extra Values
361
- Improper Handling of Undefined Values
362
- Improper Handling of Parameters
363
- Failure to Handle Missing Parameter
364
- Improper Handling of Extra Parameters
365
- Improper Handling of Undefined Parameters
366
- Improper Handling of Structural Elements
125
+ Missing Reference to Active File Descriptor or Handle
367
126
  Improper Handling of Incomplete Structural Elements
368
- Failure to Handle Incomplete Element
369
- Path Traversal: '../filedir'
370
- Improper Handling of Inconsistent Structural Elements
371
- Improper Handling of Unexpected Data Type
372
- Use of Inherently Dangerous Function
373
- Creation of chroot Jail Without Changing Working Directory
374
- Improper Clearing of Heap Memory Before Release ('Heap Inspection')
375
- J2EE Bad Practices: Direct Management of Connections
376
- J2EE Bad Practices: Direct Use of Sockets
377
- Uncaught Exception
378
- Path Traversal: '/../filedir'
379
- Execution with Unnecessary Privileges
380
- Unchecked Return Value
381
- Incorrect Check of Function Return Value
382
- Plaintext Storage of a Password
383
- Storing Passwords in a Recoverable Format
384
- Empty Password in Configuration File
385
- Use of Hard-coded Password
386
- Path Traversal: '/dir/../filename'
387
- Password in Configuration File
388
- Weak Encoding for Password
389
- Not Using Password Aging
390
- Password Aging with Long Expiration
391
- Incorrect Privilege Assignment
392
- Privilege Defined With Unsafe Actions
393
- Privilege Chaining
394
- Improper Privilege Management
395
- Path Traversal: 'dir/../../filename'
396
- Privilege Context Switching Error
397
- Privilege Dropping / Lowering Errors
398
- Least Privilege Violation
399
- Improper Check for Dropped Privileges
400
- Improper Handling of Insufficient Privileges
401
- Incorrect Default Permissions
402
- Insecure Inherited Permissions
403
- Insecure Preserved Inherited Permissions
404
- Incorrect Execution-Assigned Permissions
127
+ Incorrect Behavior Order: Validate Before Filter
128
+ Incorrect Conversion between Numeric Types
129
+ Struts: Plug-in Framework not in Use
130
+ Windows Hard Link
405
131
  Path Traversal: '..\filedir'
406
- Improper Handling of Insufficient Permissions or Privileges
407
- Improper Preservation of Permissions
408
- Improper Ownership Management
409
- Unverified Ownership
410
- Improper Access Control
411
- Improper Authorization
412
- Incorrect User Management
413
- Improper Authentication
414
- Authentication Bypass Using an Alternate Path or Channel
415
- Authentication Bypass by Alternate Name
132
+ Use of Invariant Value in Dynamically Changing Context
133
+ Partial String Comparison
416
134
  Path Traversal: '\..\filename'
417
- Authentication Bypass by Spoofing
418
- Reliance on IP Address for Authentication
419
- Using Referer Field for Authentication
420
- Authentication Bypass by Capture-replay
421
- Improper Certificate Validation
422
- Improper Following of a Certificate's Chain of Trust
423
- Improper Validation of Certificate with Host Mismatch
135
+ Access of Memory Location Before Start of Buffer
424
136
  Improper Validation of Certificate Expiration
425
- Improper Check for Certificate Revocation
426
- Path Traversal: '\dir\..\filename'
427
- Channel Accessible by Non-Endpoint
428
- Reflection Attack in an Authentication Protocol
429
- Authentication Bypass by Assumed-Immutable Data
430
- Incorrect Implementation of Authentication Algorithm
431
- Missing Critical Step in Authentication
432
- Authentication Bypass by Primary Weakness
433
- Missing Authentication for Critical Function
137
+ Unprotected Alternate Channel
138
+ Multiple Interpretations of UI Input
139
+ Free of Pointer not at Start of Buffer
140
+ Exposed IOCTL with Insufficient Access Control
434
141
  Improper Restriction of Excessive Authentication Attempts
142
+ Reliance on Security Through Obscurity
143
+ Dependency on Vulnerable Third-Party Component
144
+ Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer
145
+ Mutable Attestation or Measurement Reporting Data
146
+ Improper Scrubbing of Sensitive Data from Decommissioned Device
147
+ Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
148
+ Trust of System Event Data
149
+ Use of Pointer Subtraction to Determine Size
150
+ Improper Neutralization of Special Elements
151
+ Inclusion of Functionality from Untrusted Control Sphere
152
+ Exposure of Sensitive Information Through Metadata
153
+ Files or Directories Accessible to External Parties
154
+ Path Traversal: 'C:dirname'
155
+ Lack of Administrator Control over Security
156
+ UNIX Hard Link
157
+ Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
158
+ Dangerous Signal Handler not Disabled During Sensitive Operations
159
+ Incorrect Conversion of Security Identifiers
160
+ Authentication Bypass Using an Alternate Path or Channel
161
+ Incorrect Behavior Order
162
+ Insertion of Sensitive Information into Externally-Accessible File or Directory
163
+ Incorrect Authorization
164
+ Singleton Class Instance Creation without Proper Locking or Synchronization
165
+ Class Instance Self Destruction Control Element
166
+ Improper Restriction of Operations within the Bounds of a Memory Buffer
167
+ Origin Validation Error
168
+ Improper Preservation of Consistency Between Independent Representations of Shared State
169
+ Use of Expired File Descriptor
170
+ Improper Resolution of Path Equivalence
171
+ Use After Free
172
+ Improper Validation of Syntactic Correctness of Input
173
+ Improper Synchronization
174
+ Exposed Dangerous Method or Function
175
+ Unsigned to Signed Conversion Error
176
+ Free of Memory not on the Heap
177
+ Compiler Removal of Code to Clear Buffers
178
+ Buffer Access with Incorrect Length Value
179
+ Improper Handling of Structural Elements
180
+ Exposure of WSDL File Containing Sensitive Information
181
+ Improper Neutralization of Trailing Special Elements
182
+ Incorrect Pointer Scaling
183
+ Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
184
+ Driving Intermediate Cryptographic State/Results to Hardware Module Outputs
435
185
  Use of Single-factor Authentication
436
- Use of Password System for Primary Authentication
437
- Path Traversal: 'dir\..\..\filename'
438
- Missing Encryption of Sensitive Data
439
- Cleartext Storage of Sensitive Information
440
- Cleartext Storage in a File or on Disk
441
- Cleartext Storage in the Registry
442
- Cleartext Storage of Sensitive Information in a Cookie
443
- Cleartext Storage of Sensitive Information in Memory
444
- Cleartext Storage of Sensitive Information in GUI
445
- Cleartext Storage of Sensitive Information in Executable
446
- Cleartext Transmission of Sensitive Information
447
- Path Traversal: '...' (Triple Dot)
448
- Use of Hard-coded Cryptographic Key
186
+ Incomplete Identification of Uploaded File Variables (PHP)
187
+ Buffer Access Using Size of Source Buffer
188
+ Improper Access Control for Register Interface
449
189
  Key Exchange without Entity Authentication
190
+ Missing Initialization of a Variable
191
+ Comparison Logic is Vulnerable to Power Side-Channel Attacks
192
+ Use of Default Password
193
+ Use of Weak Hash
194
+ Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
195
+ Failure to Handle Missing Parameter
196
+ Not Using Complete Mediation
197
+ Excessive Use of Self-Modifying Code
198
+ Inclusion of Sensitive Information in Source Code Comments
199
+ Array Declared Public, Final, and Static
200
+ Persistent Storable Data Element without Associated Comparison Control Element
201
+ Improper Locking
202
+ Improper Neutralization of Encoded URI Schemes in a Web Page
203
+ Use of umask() with chmod-style Argument
450
204
  Reusing a Nonce, Key Pair in Encryption
451
- Use of a Key Past its Expiration Date
452
- Missing Cryptographic Step
205
+ Use of a One-Way Hash with a Predictable Salt
206
+ Session Fixation
207
+ Incomplete Internal State Distinction
208
+ Sensitive Information in Resource Not Removed Before Reuse
209
+ Object Model Violation: Just One of Equals and Hashcode Defined
210
+ Reliance on IP Address for Authentication
211
+ Critical Public Variable Without Final Modifier
212
+ Missing Check for Certificate Revocation after Initial Check
213
+ Inclusion of Sensitive Information in an Include File
214
+ Incorrect Parsing of Numbers with Different Radices
453
215
  Inadequate Encryption Strength
454
- Use of a Broken or Risky Cryptographic Algorithm
455
- Use of Weak Hash
456
- Generation of Predictable IV with CBC Mode
457
- Path Traversal: '....' (Multiple Dot)
458
- Use of Insufficiently Random Values
459
- Insufficient Entropy
460
- Insufficient Entropy in PRNG
461
- Improper Handling of Insufficient Entropy in TRNG
462
- Small Space of Random Values
463
- Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
216
+ Unlock of a Resource that is not Locked
217
+ Permission Race Condition During Resource Copy
218
+ Improper Filtering of Special Elements
219
+ Unparsed Raw Web Content Delivery
220
+ Only Filtering Special Elements Relative to a Marker
221
+ Protection Mechanism Failure
222
+ Processor Optimization Removal or Modification of Security-critical Code
223
+ Insecure Operation on Windows Junction / Mount Point
224
+ Incorrect Synchronization
464
225
  Same Seed in Pseudo-Random Number Generator (PRNG)
465
- Predictable Seed in Pseudo-Random Number Generator (PRNG)
466
- Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
467
- Small Seed Space in PRNG
468
- Path Traversal: '....//'
469
- Generation of Predictable Numbers or Identifiers
470
- Predictable from Observable State
471
- Predictable Exact Value from Previous Values
472
- Predictable Value Range from Previous Values
473
- Use of Invariant Value in Dynamically Changing Context
474
- Insufficient Verification of Data Authenticity
475
- Origin Validation Error
476
- Improper Verification of Cryptographic Signature
477
- Use of Less Trusted Source
478
- Acceptance of Extraneous Untrusted Data With Trusted Data
226
+ Path Equivalence: 'fakedir/../realdir/filename'
479
227
  Path Traversal: '.../...//'
480
- Reliance on Reverse DNS Resolution for a Security-Critical Action
481
- Insufficient Type Distinction
482
- Cross-Site Request Forgery (CSRF)
483
- Missing Support for Integrity Check
484
- Improper Validation of Integrity Check Value
485
- Product UI does not Warn User of Unsafe Actions
486
- Insufficient UI Warning of Dangerous Operations
487
- Improperly Implemented Security Check for Standard
488
- Exposure of Private Personal Information to an Unauthorized Actor
489
- Absolute Path Traversal
490
- Trust of System Event Data
228
+ Creation of chroot Jail Without Changing Working Directory
229
+ Improper Protection Against Voltage and Clock Glitches
230
+ Incorrect User Management
231
+ Excessive Attack Surface
232
+ J2EE Misconfiguration: Plaintext Password in Configuration File
233
+ Static Member Data Element outside of a Singleton Class Element
234
+ Source Code File with Excessive Number of Lines of Code
235
+ Invokable Control Element with Large Number of Outward Calls
236
+ Insufficient Encapsulation of Machine-Dependent Functionality
237
+ Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution
238
+ Improper Interaction Between Multiple Correctly-Behaving Entities
239
+ Excessive Number of Inefficient Server-Side Data Accesses
240
+ Storage of Sensitive Data in a Mechanism without Access Control
241
+ Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges
242
+ J2EE Bad Practices: Direct Use of Threads
243
+ Improper Handling of Inconsistent Special Elements
244
+ Improper Handling of Physical or Environmental Conditions
245
+ Unrestricted Upload of File with Dangerous Type
246
+ Improper Neutralization of Comment Delimiters
247
+ Path Equivalence: 'filename/' (Trailing Slash)
248
+ Excessive McCabe Cyclomatic Complexity
249
+ Least Privilege Violation
250
+ Improper Neutralization of Equivalent Special Elements
251
+ Not Using Password Aging
252
+ Function Call With Incorrect Variable or Reference as Argument
253
+ Server-generated Error Message Containing Sensitive Information
254
+ Improper Translation of Security Attributes by Fabric Bridge
255
+ Invokable Control Element with Variadic Parameters
256
+ Double Decoding of the Same Data
257
+ Exposure of Data Element to Wrong Session
258
+ Covert Storage Channel
259
+ Predictable Exact Value from Previous Values
260
+ Excessive Iteration
261
+ Small Space of Random Values
262
+ Empty Synchronized Block
263
+ Observable Behavioral Discrepancy With Equivalent Products
264
+ Premature Release of Resource During Expected Lifetime
265
+ Reachable Assertion
266
+ Hardware Logic with Insecure De-Synchronization between Control and Data Channels
267
+ ASP.NET Misconfiguration: Password in Configuration File
268
+ Double Free
269
+ Inefficient Algorithmic Complexity
270
+ Authentication Bypass by Capture-replay
271
+ NULL Pointer Dereference
272
+ Improper Link Resolution Before File Access ('Link Following')
273
+ Improper Restriction of XML External Entity Reference
491
274
  Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
492
- Race Condition Enabling Link Following
493
- Signal Handler Race Condition
494
- Race Condition within a Thread
495
- Time-of-check Time-of-use (TOCTOU) Race Condition
496
- Context Switching Race Condition
275
+ Insufficient Control Flow Management
276
+ Use of Low-Level Functionality
277
+ Improper Control of Interaction Frequency
278
+ Heap-based Buffer Overflow
279
+ Deletion of Data Structure Sentinel
280
+ Non-Transparent Sharing of Microarchitectural Resources
281
+ Policy Privileges are not Assigned Consistently Between Control and Data Agents
282
+ Exposure of Information Through Shell Error Message
283
+ Absolute Path Traversal
284
+ Uncontrolled Resource Consumption
285
+ Non-exit on Failed Initialization
286
+ Use of Function with Inconsistent Implementations
287
+ Improper Neutralization of Wildcards or Matching Symbols
288
+ ASP.NET Misconfiguration: Use of Identity Impersonation
289
+ Debug Messages Revealing Unnecessary Information
290
+ Parent Class without Virtual Destructor Method
291
+ Improper Neutralization of Input Terminators
292
+ Use of a One-Way Hash without a Salt
293
+ Data Access Operations Outside of Expected Data Manager Component
294
+ Uncontrolled Recursion
295
+ J2EE Bad Practices: Non-serializable Object Stored in Session
296
+ Missing Password Field Masking
297
+ Predictable Seed in Pseudo-Random Number Generator (PRNG)
298
+ Product UI does not Warn User of Unsafe Actions
299
+ Reliance on Undefined, Unspecified, or Implementation-Defined Behavior
300
+ Large Data Table with Excessive Number of Indices
301
+ Use of sizeof() on a Pointer Type
302
+ Inclusion of Sensitive Information in Source Code
303
+ J2EE Misconfiguration: Data Transmission Without Encryption
304
+ Unprotected Primary Channel
305
+ Incomplete Cleanup
306
+ Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
307
+ Failure to Disable Reserved Bits
308
+ Use of getlogin() in Multithreaded Application
309
+ Expression is Always False
310
+ EJB Bad Practices: Use of Class Loader
311
+ Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
312
+ Improper Removal of Sensitive Information Before Storage or Transfer
313
+ Improper Neutralization of Multiple Internal Special Elements
314
+ Inappropriate Whitespace Style
315
+ Missing Synchronization
316
+ Integer Overflow or Wraparound
317
+ Improper Validation of Specified Type of Input
318
+ Multiple Binds to the Same Port
319
+ Use of NullPointerException Catch to Detect NULL Pointer Dereference
320
+ Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
321
+ Memory Allocation with Excessive Size Value
322
+ Use of Same Invokable Control Element in Multiple Architectural Layers
323
+ Use of Insufficiently Random Values
497
324
  Divide By Zero
498
- Path Traversal: '/absolute/pathname/here'
499
- Missing Check for Certificate Revocation after Initial Check
500
- Incomplete Internal State Distinction
501
- Passing Mutable Objects to an Untrusted Method
502
- Returning a Mutable Object to an Untrusted Caller
503
- Insecure Temporary File
504
- Creation of Temporary File With Insecure Permissions
505
- Creation of Temporary File in Directory with Insecure Permissions
506
- Path Traversal: '\absolute\pathname\here'
507
- J2EE Bad Practices: Use of System.exit()
508
- J2EE Bad Practices: Direct Use of Threads
509
- Session Fixation
510
- Covert Timing Channel
511
- Symbolic Name not Mapping to Correct Object
512
- Path Traversal: 'C:dirname'
325
+ Improper Encoding or Escaping of Output
326
+ Improper Handling of Syntactically Invalid Structure
327
+ Out-of-bounds Write
328
+ Use of a Non-reentrant Function in a Concurrent Context
329
+ Direct Use of Unsafe JNI
330
+ Inclusion of Web Functionality from an Untrusted Source
331
+ Storage of File with Sensitive Data Under Web Root
332
+ Direct Request ('Forced Browsing')
333
+ Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
334
+ J2EE Misconfiguration: Entity Bean Declared Remote
335
+ Incorrect Implementation of Authentication Algorithm
336
+ Overly Restrictive Account Lockout Mechanism
337
+ Irrelevant Code
338
+ Trapdoor
339
+ Insufficient Control of Network Message Volume (Network Amplification)
340
+ Allocation of Resources Without Limits or Throttling
341
+ Struts: Validator Without Form Field
513
342
  Detection of Error Condition Without Action
514
- Unchecked Error Condition
515
- Missing Report of Error Condition
516
- Return of Wrong Status Code
517
- Unexpected Status Code or Return Value
518
- Use of NullPointerException Catch to Detect NULL Pointer Dereference
343
+ Race Condition Enabling Link Following
519
344
  Declaration of Catch for Generic Exception
520
- Declaration of Throws for Generic Exception
521
- Path Traversal: '\\UNC\share\name\' (Windows UNC Share)
522
- Uncontrolled Resource Consumption
523
- Missing Release of Memory after Effective Lifetime
524
- Transmission of Private Resources into a New Sphere ('Resource Leak')
525
- Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
345
+ Download of Code Without Integrity Check
346
+ Externally Controlled Reference to a Resource in Another Sphere
347
+ Public cloneable() Method Without Final ('Object Hijack')
348
+ Covert Timing Channel
349
+ Uncaught Exception
350
+ Out-of-bounds Read
351
+ Excessive Index Range Scan for a Data Resource
352
+ Improper Access Control
353
+ Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
354
+ Uncaught Exception in Servlet
355
+ Reliance on Cookies without Validation and Integrity Checking in a Security Decision
356
+ Improper Handling of Windows ::DATA Alternate Data Stream
357
+ UI Discrepancy for Security Feature
358
+ Improper Handling of Unicode Encoding
359
+ ASP.NET Misconfiguration: Not Using Input Validation Framework
360
+ Insertion of Sensitive Information Into Debugging Code
361
+ Cleartext Transmission of Sensitive Information
362
+ Power-On of Untrusted Execution Core Before Enabling Fabric Access Control
363
+ Improper Authorization in Handler for Custom URL Scheme
364
+ Improper Isolation of Shared Resources in Network On Chip (NoC)
365
+ Excessively Complex Data Representation
366
+ Exposed Unsafe ActiveX Method
367
+ Observable Behavioral Discrepancy
368
+ Use of Inner Class Containing Sensitive Data
369
+ Parent Class with References to Child Class
370
+ Incorrect Privilege Assignment
371
+ Unconditional Control Flow Transfer outside of Switch Block
372
+ Missing Immutable Root of Trust in Hardware
373
+ Improper Protection of Physical Side Channels
374
+ Expected Behavior Violation
375
+ Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')
376
+ Improper Cleanup on Thrown Exception
377
+ Unexpected Status Code or Return Value
378
+ Expression is Always True
379
+ Improper Handling of File Names that Identify Virtual Resources
380
+ Incorrect Selection of Fuse Values
381
+ Missing Validation of OpenSSL Certificate
382
+ Obsolete Feature in UI
383
+ Improper Neutralization of Script in an Error Message Web Page
384
+ Symbolic Name not Mapping to Correct Object
385
+ Inclusion of Sensitive Information in Test Code
386
+ EJB Bad Practices: Use of Synchronization Primitives
387
+ Incomplete Model of Endpoint Features
388
+ Inappropriate Source Code Style or Formatting
389
+ External Control of File Name or Path
390
+ UNIX Symbolic Link (Symlink) Following
391
+ Incorrect Permission Assignment for Critical Resource
392
+ Improper Validation of Array Index
393
+ Use of Platform-Dependent Third Party Components
394
+ Use of Redundant Code
395
+ Improper Neutralization of Variable Name Delimiters
396
+ Declaration of Variable with Unnecessarily Wide Scope
397
+ Exposure of Private Personal Information to an Unauthorized Actor
398
+ Interpretation Conflict
399
+ Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
400
+ Incorrect Initialization of Resource
401
+ Context Switching Race Condition
402
+ Runtime Resource Management Control Element in a Component Built to Run on Application Servers
403
+ Incomplete I/O Documentation
404
+ Cryptographic Operations are run Before Supporting Units are Ready
405
+ Permissive Regular Expression
526
406
  Improper Resource Shutdown or Release
527
- Asymmetric Resource Consumption (Amplification)
528
- Insufficient Control of Network Message Volume (Network Amplification)
529
- Inefficient Algorithmic Complexity
530
- Incorrect Behavior Order: Early Amplification
531
- Improper Handling of Highly Compressed Data (Data Amplification)
532
- Improper Resolution of Path Equivalence
533
- Insufficient Resource Pool
534
- Unrestricted Externally Accessible Lock
535
- Improper Resource Locking
536
- Missing Lock Check
537
- Double Free
538
- Use After Free
539
- Unprotected Primary Channel
540
- Path Equivalence: 'filename.' (Trailing Dot)
541
- Unprotected Alternate Channel
542
- Race Condition During Access to Alternate Channel
407
+ Failure to Sanitize Paired Delimiters
408
+ Missing Release of Memory after Effective Lifetime
409
+ Reliance on Package-level Scope
410
+ Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
543
411
  Unprotected Windows Messaging Channel ('Shatter')
544
- Improper Protection of Alternate Path
545
- Direct Request ('Forced Browsing')
546
- Untrusted Search Path
547
- Uncontrolled Search Path Element
548
- Unquoted Search Path or Element
549
- Path Equivalence: 'filename....' (Multiple Trailing Dot)
550
- Deployment of Wrong Handler
412
+ Unverified Ownership
413
+ Signal Handler Use of a Non-reentrant Function
414
+ Active Debug Code
415
+ Allocation of File Descriptors or Handles Without Limits or Throttling
416
+ Improper Check for Certificate Revocation
417
+ Architecture with Number of Horizontal Layers Outside of Expected Range
418
+ Semiconductor Defects in Hardware Logic with Security-Sensitive Implications
419
+ Path Equivalence: ' filename' (Leading Space)
420
+ Logging of Excessive Data
421
+ URL Redirection to Untrusted Site ('Open Redirect')
422
+ Servlet Runtime Error Message Containing Sensitive Information
423
+ Use of Default Cryptographic Key
424
+ Method Containing Access of a Member Element from Another Class
425
+ Wrap-around Error
426
+ Placement of User into Incorrect Group
427
+ Improper Restriction of Power Consumption
428
+ Function Call With Incorrect Argument Type
429
+ Incorrect Block Delimitation
551
430
  Missing Handler
552
- Dangerous Signal Handler not Disabled During Sensitive Operations
553
- Unparsed Raw Web Content Delivery
554
- Unrestricted Upload of File with Dangerous Type
555
- Improper Interaction Between Multiple Correctly-Behaving Entities
556
- Interpretation Conflict
557
- Incomplete Model of Endpoint Features
558
- Behavioral Change in New Version or Environment
559
- Path Equivalence: 'file.name' (Internal Dot)
560
- Expected Behavior Violation
561
- Unintended Proxy or Intermediary ('Confused Deputy')
562
- Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
563
- UI Discrepancy for Security Feature
564
- Unimplemented or Unsupported Feature in UI
565
- Obsolete Feature in UI
566
- The UI Performs the Wrong Action
567
- Path Equivalence: 'file...name' (Multiple Internal Dot)
568
- Multiple Interpretations of UI Input
569
- User Interface (UI) Misrepresentation of Critical Information
431
+ Guessable CAPTCHA
432
+ Use of Password Hash Instead of Password for Authentication
433
+ Path Traversal: '/absolute/pathname/here'
434
+ Insertion of Sensitive Information Into Sent Data
435
+ Insufficient UI Warning of Dangerous Operations
436
+ Insecure Security Identifier Mechanism
437
+ Access to Critical Private Variable via Public Method
438
+ Insufficient Session Expiration
439
+ Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
440
+ Insufficient Entropy in PRNG
441
+ Generation of Error Message Containing Sensitive Information
442
+ Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
443
+ Unauthorized Error Injection Can Degrade Hardware Redundancy
444
+ Improper Validation of Consistency within Input
445
+ Improper Validation of Unsafe Equivalence in Input
446
+ Privilege Defined With Unsafe Actions
447
+ Improper Verification of Intent by Broadcast Receiver
448
+ Loop Condition Value Update within the Loop
449
+ Deserialization of Untrusted Data
450
+ Returning a Mutable Object to an Untrusted Caller
451
+ Missing Protection for Mirrored Regions in On-Chip Fabric Firewall
452
+ Generation of Predictable IV with CBC Mode
570
453
  Insecure Default Variable Initialization
571
- External Initialization of Trusted Variables or Data Stores
572
- Non-exit on Failed Initialization
573
- Missing Initialization of a Variable
574
- Use of Uninitialized Variable
575
- Incomplete Cleanup
576
- Path Equivalence: 'filename ' (Trailing Space)
577
- Improper Cleanup on Thrown Exception
578
- Duplicate Key in Associative List (Alist)
579
- Deletion of Data Structure Sentinel
580
- Addition of Data Structure Sentinel
581
- Return of Pointer Value Outside of Expected Range
582
- Use of sizeof() on a Pointer Type
583
- Incorrect Pointer Scaling
584
- Use of Pointer Subtraction to Determine Size
585
- Path Equivalence: ' filename' (Leading Space)
586
- Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
587
- Modification of Assumed-Immutable Data (MAID)
588
- External Control of Assumed-Immutable Web Parameter
589
- PHP External Variable Modification
590
- Use of Function with Inconsistent Implementations
591
- Undefined Behavior for Input to API
592
- NULL Pointer Dereference
593
- Use of Obsolete Function
594
- Missing Default Case in Multiple Condition Expression
595
- Signal Handler Use of a Non-reentrant Function
454
+ Authentication Bypass by Spoofing
455
+ Missing Lock Check
456
+ Improper Neutralization of Record Delimiters
457
+ Struts: Form Bean Does Not Extend Validation Class
458
+ Use of Weak Credentials
459
+ Exposure of Information Through Directory Listing
460
+ Client-Side Enforcement of Server-Side Security
461
+ Excessive Code Complexity
462
+ Missing Documentation for Design
463
+ Improper Validation of Specified Index, Position, or Offset in Input
464
+ Improper Protections Against Hardware Overheating
465
+ Use of Potentially Dangerous Function
466
+ Improper Access Control in Fabric Bridge
467
+ ASP.NET Misconfiguration: Missing Custom Error Page
468
+ Incomplete List of Disallowed Inputs
469
+ Exposure of Sensitive System Information Due to Uncleared Debug Information
596
470
  Path Equivalence: 'file name' (Internal Whitespace)
597
- Use of Incorrect Operator
598
- Assigning instead of Comparing
471
+ Generation of Predictable Numbers or Identifiers
472
+ Improper Validation of Specified Quantity in Input
473
+ Improper Zeroization of Hardware Register
474
+ Assumed-Immutable Data is Stored in Writable Memory
475
+ Signed to Unsigned Conversion Error
476
+ Incomplete Denylist to Cross-Site Scripting
599
477
  Comparing instead of Assigning
600
- Incorrect Block Delimitation
601
- Omitted Break Statement in Switch
602
- Comparison of Classes by Name
603
- Reliance on Package-level Scope
604
- Exposure of Data Element to Wrong Session
605
- Active Debug Code
606
- Path Equivalence: 'filename/' (Trailing Slash)
607
- Public cloneable() Method Without Final ('Object Hijack')
608
- Use of Inner Class Containing Sensitive Data
609
- Critical Public Variable Without Final Modifier
610
- Download of Code Without Integrity Check
611
- Private Data Structure Returned From A Public Method
612
- Public Data Assigned to Private Array-Typed Field
613
- Exposure of Sensitive System Information to an Unauthorized Control Sphere
614
- Cloneable Class Containing Sensitive Information
615
- Serializable Class Containing Sensitive Data
616
- J2EE Misconfiguration: Data Transmission Without Encryption
617
- Path Equivalence: '//multiple/leading/slash'
618
- Public Static Field Not Marked Final
619
- Trust Boundary Violation
620
- Deserialization of Untrusted Data
621
- Embedded Malicious Code
622
- Trojan Horse
623
- Non-Replicating Malicious Code
624
- Replicating Malicious Code (Virus or Worm)
625
- Path Equivalence: '/multiple//internal/slash'
626
- Trapdoor
627
- Logic/Time Bomb
628
- Spyware
629
- Covert Channel
630
- Covert Storage Channel
631
- Path Equivalence: '/multiple/trailing/slash//'
632
- .NET Misconfiguration: Use of Impersonation
633
- Weak Password Requirements
634
- Insufficiently Protected Credentials
635
- Unprotected Transport of Credentials
636
- Use of Cache Containing Sensitive Information
637
- Use of Web Browser Cache Containing Sensitive Information
638
- Cleartext Storage of Sensitive Information in an Environment Variable
639
- Exposure of Version-Control Repository to an Unauthorized Control Sphere
478
+ Initialization of a Resource with an Insecure Default
479
+ Return of Stack Variable Address
480
+ Improper Neutralization of Server-Side Includes (SSI) Within a Web Page
481
+ Obscured Security-relevant Information by Alternate Name
482
+ Path Traversal: '\absolute\pathname\here'
483
+ Exposure of Sensitive Information during Transient Execution
484
+ Internal Asset Exposed to Unsafe Debug Access Level or State
485
+ Missing XML Validation
486
+ Incorrect Decoding of Security Identifiers
487
+ Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
488
+ Invokable Control Element with Excessive Volume of Commented-out Code
489
+ Signal Handler with Functionality that is not Asynchronous-Safe
490
+ Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
491
+ Missing Support for Integrity Check
492
+ Comparison of Incompatible Types
493
+ Sequence of Processor Instructions Leads to Unexpected Behavior
494
+ Use of Prohibited Code
495
+ Multiple Operations on Resource in Single-Operation Context
640
496
  Exposure of Core Dump File to an Unauthorized Control Sphere
641
- Exposure of Access Control List Files to an Unauthorized Control Sphere
642
- Path Equivalence: '\multiple\\internal\backslash'
643
- Exposure of Backup File to an Unauthorized Control Sphere
644
- Inclusion of Sensitive Information in Test Code
645
- Insertion of Sensitive Information into Log File
646
- Exposure of Information Through Shell Error Message
647
- Servlet Runtime Error Message Containing Sensitive Information
648
- Java Runtime Error Message Containing Sensitive Information
649
- Insertion of Sensitive Information into Externally-Accessible File or Directory
650
- Use of Persistent Cookies Containing Sensitive Information
651
- Path Equivalence: 'filedir\' (Trailing Backslash)
652
- Inclusion of Sensitive Information in Source Code
653
- Inclusion of Sensitive Information in an Include File
654
- Use of Singleton Pattern Without Synchronization in a Multithreaded Context
655
- Missing Standardized Error Handling Mechanism
656
- Suspicious Comment
657
- Use of Hard-coded, Security-relevant Constants
658
- Exposure of Information Through Directory Listing
659
- Missing Password Field Masking
497
+ Improper Handling of Invalid Use of Special Elements
498
+ Improper Neutralization of Alternate XSS Syntax
499
+ Function Call With Incorrect Number of Arguments
500
+ Function Call With Incorrectly Specified Argument Value
660
501
  Path Equivalence: '/./' (Single Dot Directory)
661
- Server-generated Error Message Containing Sensitive Information
662
- Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
663
- Files or Directories Accessible to External Parties
664
- Command Shell in Externally Accessible Directory
665
- ASP.NET Misconfiguration: Not Using Input Validation Framework
666
- J2EE Misconfiguration: Plaintext Password in Configuration File
667
- ASP.NET Misconfiguration: Use of Identity Impersonation
668
- Use of getlogin() in Multithreaded Application
669
- Path Equivalence: 'filedir*' (Wildcard)
670
- Use of umask() with chmod-style Argument
671
- Dead Code
672
- Return of Stack Variable Address
673
- Assignment to Variable without Use
502
+ Improper Write Handling in Limited-write Non-Volatile Memories
503
+ Improper Protection for Outbound Error Messages and Alert Signals
674
504
  SQL Injection: Hibernate
675
- Reliance on Cookies without Validation and Integrity Checking
676
- Authorization Bypass Through User-Controlled SQL Primary Key
677
- Unsynchronized Access to Shared Data in a Multithreaded Context
678
- finalize() Method Without super.finalize()
679
- Path Equivalence: 'fakedir/../realdir/filename'
680
- Expression is Always False
681
- Expression is Always True
682
- Call to Thread run() instead of start()
505
+ Unimplemented or Unsupported Feature in UI
506
+ Predictable Value Range from Previous Values
507
+ Improper Prevention of Lock Bit Modification
508
+ Unchecked Return Value to NULL Pointer Dereference
509
+ Improper Neutralization of Input Leaders
510
+ Insufficient Isolation of System-Dependent Functions
683
511
  Improper Following of Specification by Caller
684
- EJB Bad Practices: Use of Synchronization Primitives
685
- EJB Bad Practices: Use of AWT Swing
686
- EJB Bad Practices: Use of Java I/O
687
- EJB Bad Practices: Use of Sockets
688
- EJB Bad Practices: Use of Class Loader
689
- J2EE Bad Practices: Non-serializable Object Stored in Session
690
- Path Equivalence: Windows 8.3 Filename
691
- clone() Method Without super.clone()
692
- Object Model Violation: Just One of Equals and Hashcode Defined
693
- Array Declared Public, Final, and Static
694
- finalize() Method Declared Public
695
- Return Inside Finally Block
696
- Empty Synchronized Block
697
- Explicit Call to Finalize()
698
- Assignment of a Fixed Address to a Pointer
512
+ Improper Handling of Missing Values
513
+ Improper Neutralization of HTTP Headers for Scripting Syntax
514
+ Insufficient or Incomplete Data Removal within Hardware Component
515
+ CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
516
+ Unintended Proxy or Intermediary ('Confused Deputy')
517
+ Data Element Aggregating an Excessively Large Number of Non-Primitive Elements
518
+ Relative Path Traversal
519
+ Insufficient Psychological Acceptability
520
+ External Control of System or Configuration Setting
521
+ Incorrect Calculation of Buffer Size
699
522
  Attempt to Access Child of a Non-structure Pointer
700
- Call to Non-ubiquitous API
701
- Improper Link Resolution Before File Access ('Link Following')
702
- Free of Memory not on the Heap
703
- Sensitive Data Storage in Improperly Locked Memory
704
- Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
705
- J2EE Framework: Saving Unserializable Objects to Disk
706
- Comparison of Object References Instead of Object Contents
707
- Use of Wrong Operator in String Comparison
708
- Use of GET Request Method With Sensitive Query Strings
709
- Missing Validation of OpenSSL Certificate
710
- J2EE Misconfiguration: Insufficient Session-ID Length
711
- Uncaught Exception in Servlet
712
- URL Redirection to Untrusted Site ('Open Redirect')
713
- Client-Side Enforcement of Server-Side Security
714
- Use of Client-Side Authentication
715
- Multiple Binds to the Same Port
716
- Unchecked Input for Loop Condition
717
- Public Static Final Field References Mutable Object
718
- Struts: Non-private Field in ActionForm Class
719
- Double-Checked Locking
720
- UNIX Symbolic Link (Symlink) Following
721
- Externally Controlled Reference to a Resource in Another Sphere
722
- Improper Restriction of XML External Entity Reference
723
- Improper Authorization of Index Containing Sensitive Information
724
- Insufficient Session Expiration
725
- Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
726
- Inclusion of Sensitive Information in Source Code Comments
727
- Incomplete Identification of Uploaded File Variables (PHP)
728
- Reachable Assertion
729
- Exposed Unsafe ActiveX Method
523
+ Java Runtime Error Message Containing Sensitive Information
524
+ Use of Web Link to Untrusted Target with window.opener Access
525
+ Incorrect Behavior Order: Early Validation
526
+ Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
527
+ Improper Control of a Resource Through its Lifetime
528
+ Improper Lock Behavior After Power State Transition
529
+ Use of Path Manipulation Function without Maximum-sized Buffer
530
+ Cloneable Class Containing Sensitive Information
531
+ Insufficient Visual Distinction of Homoglyphs Presented to User
532
+ Incorrect Resource Transfer Between Spheres
533
+ Stack-based Buffer Overflow
534
+ Insecure Setting of Generative AI/ML Model Inference Parameters
535
+ Mismatched Memory Management Routines
536
+ Inappropriate Encoding for Output Context
537
+ Improper Neutralization of Line Delimiters
538
+ Improper Adherence to Coding Standards
539
+ Hidden Functionality
540
+ Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses
541
+ Improper Enforcement of Behavioral Workflow
542
+ Creation of Class Instance within a Static Code Block
543
+ Inaccurate Comments
544
+ Addition of Data Structure Sentinel
545
+ Generation of Incorrect Security Tokens
546
+ Inappropriate Comment Style
547
+ Improper Handling of Mixed Encoding
548
+ Struts: Form Field Without Validator
549
+ Execution with Unnecessary Privileges
550
+ Buffer Underwrite ('Buffer Underflow')
551
+ Only Filtering Special Elements at an Absolute Position
552
+ Improper Handling of Undefined Values
553
+ Public Data Assigned to Private Array-Typed Field
554
+ Insufficient Technical Documentation
555
+ Inconsistent Naming Conventions for Identifiers
556
+ Always-Incorrect Control Flow Implementation
557
+ Explicit Call to Finalize()
558
+ Improper Preservation of Permissions
730
559
  Dangling Database Cursor ('Cursor Injection')
731
- UNIX Hard Link
732
- Unverified Password Change
733
- Variable Extraction Error
734
- Improper Validation of Function Hook Arguments
735
- Unsafe ActiveX Control Marked Safe For Scripting
736
- Executable Regular Expression Error
737
- Permissive Regular Expression
738
- Null Byte Interaction Error (Poison Null Byte)
739
- Dynamic Variable Evaluation
740
- Function Call with Incorrectly Specified Arguments
741
- Not Failing Securely ('Failing Open')
742
- Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')
743
- Not Using Complete Mediation
744
560
  Authorization Bypass Through User-Controlled Key
745
- Windows Shortcut Following (.LNK)
746
- Weak Password Recovery Mechanism for Forgotten Password
747
- Improper Restriction of Names for Files and Other Resources
748
- External Control of Critical State Data
749
- Improper Neutralization of Data within XPath Expressions ('XPath Injection')
750
- Improper Neutralization of HTTP Headers for Scripting Syntax
751
- Overly Restrictive Account Lockout Mechanism
752
- Reliance on File Name or Extension of Externally-Supplied File
753
- Use of Non-Canonical URL Paths for Authorization Decisions
561
+ Improper Ownership Management
562
+ Insecure Temporary File
563
+ J2EE Bad Practices: Direct Use of Sockets
564
+ Use of Incorrectly-Resolved Name or Reference
565
+ Improper Handling of Faults that Lead to Instruction Skips
566
+ Improper Handling of Insufficient Entropy in TRNG
567
+ Trust Boundary Violation
568
+ Process Control
569
+ Compilation with Insufficient Warnings or Errors
570
+ Weak Authentication
571
+ Policy Uses Obsolete Encoding
572
+ Missing Custom Error Page
573
+ Path Traversal: '....' (Multiple Dot)
574
+ Time-of-check Time-of-use (TOCTOU) Race Condition
575
+ Data Element containing Pointer Item without Proper Copy Control Element
576
+ Excessively Deep Nesting
577
+ Improper Handling of Insufficient Privileges
578
+ Information Exposure through Microarchitectural State after Transient Execution
754
579
  Incorrect Use of Privileged APIs
755
- Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
756
- Windows Hard Link
757
- Trusting HTTP Permission Methods on the Server Side
758
- Exposure of WSDL File Containing Sensitive Information
759
- Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')
760
- Improper Isolation or Compartmentalization
761
- Reliance on a Single Factor in a Security Decision
762
- Insufficient Psychological Acceptability
763
- Reliance on Security Through Obscurity
764
- Violation of Secure Design Principles
765
- Improper Handling of File Names that Identify Virtual Resources
766
- Improper Synchronization
767
- Use of a Non-reentrant Function in a Concurrent Context
768
- Improper Control of a Resource Through its Lifetime
580
+ Use of Externally-Controlled Format String
581
+ Variable Extraction Error
582
+ Exposure of Sensitive Information Due to Incompatible Policies
583
+ Declaration of Throws for Generic Exception
584
+ Hardware Allows Activation of Test or Debug Logic at Runtime
769
585
  Improper Initialization
770
- Operation on Resource in Wrong Phase of Lifetime
771
- Improper Locking
586
+ Serializable Class Containing Sensitive Data
587
+ Data Resource Access without Use of Connection Pooling
588
+ Insufficient Adherence to Expected Conventions
589
+ Improper Setting of Bus Controlling Capability in Fabric End-point
590
+ Hardware Internal or Debug Modes Allow Override of Locks
591
+ Improper Authentication
592
+ Use of Password Hash With Insufficient Computational Effort
772
593
  Exposure of Resource to Wrong Sphere
773
- Incorrect Resource Transfer Between Spheres
774
- Improper Handling of Windows Device Names
775
- Always-Incorrect Control Flow Implementation
776
- Lack of Administrator Control over Security
777
- Operation on a Resource after Expiration or Release
778
- External Influence of Sphere Definition
779
- Uncontrolled Recursion
780
- Multiple Operations on Resource in Single-Operation Context
781
- Use of Potentially Dangerous Function
782
- Integer Overflow to Buffer Overflow
783
- Incorrect Conversion between Numeric Types
784
- Incorrect Calculation
785
- Function Call With Incorrect Order of Arguments
786
- Incorrect Provision of Specified Functionality
787
- Function Call With Incorrect Number of Arguments
788
- Function Call With Incorrect Argument Type
789
- Function Call With Incorrectly Specified Argument Value
790
- Function Call With Incorrect Variable or Reference as Argument
791
- Permission Race Condition During Resource Copy
792
- Improper Handling of Windows ::DATA Alternate Data Stream
793
- Unchecked Return Value to NULL Pointer Dereference
794
- Insufficient Control Flow Management
795
- Incomplete Denylist to Cross-Site Scripting
796
- Protection Mechanism Failure
594
+ Improperly Controlled Sequential Memory Allocation
595
+ Use of Persistent Cookies Containing Sensitive Information
596
+ Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')
597
+ Hardware Logic Contains Race Conditions
598
+ Incorrect Comparison Logic Granularity
599
+ Use of Incorrect Operator
600
+ Cleartext Storage of Sensitive Information in Memory
601
+ Improper Check for Dropped Privileges
602
+ Numeric Range Comparison Without Minimum Check
603
+ Improper Neutralization of Internal Special Elements
604
+ Improper Handling of Values
605
+ Improper Certificate Validation
606
+ Truncation of Security-relevant Information
607
+ Double-Checked Locking
608
+ Only Filtering Special Elements at a Specified Location
609
+ Improper Access Control for Volatile Memory Containing Boot Code
610
+ Comparison Using Wrong Factors
611
+ Missing Default Case in Multiple Condition Expression
612
+ Insecure Inherited Permissions
613
+ Improperly Controlled Modification of Dynamically-Determined Object Attributes
614
+ Path Traversal: 'dir\..\..\filename'
615
+ Generation of Weak Initialization Vector (IV)
616
+ Improper Handling of Additional Special Element
617
+ Improper Neutralization
618
+ Observable Discrepancy
619
+ Use of Uninitialized Variable
620
+ Self-generated Error Message Containing Sensitive Information
621
+ finalize() Method Without super.finalize()
622
+ Struts: Duplicate Validation Forms
623
+ Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
624
+ Exposure of Sensitive Information Through Data Queries
625
+ Insufficient Documentation of Error Handling Techniques
626
+ Channel Accessible by Non-Endpoint
627
+ Path Equivalence: 'file.name' (Internal Dot)
628
+ Improper Handling of Parameters
629
+ Struts: Non-private Field in ActionForm Class
630
+ Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
631
+ Improper Authorization of Index Containing Sensitive Information
632
+ Improper Use of Validation Framework
797
633
  Use of Multiple Resources with Duplicate Identifier
798
- Use of Low-Level Functionality
799
- Incorrect Behavior Order
800
- Incorrect Comparison
634
+ Use of a Broken or Risky Cryptographic Algorithm
635
+ Uninitialized Value on Reset for Registers Holding Security Settings
636
+ Improper Output Neutralization for Logs
637
+ Insufficient Encapsulation
638
+ Unprotected Confidential Information on Device is Accessible by OSAT Vendors
639
+ Excessive Use of Unconditional Branching
640
+ Use of Predictable Algorithm in Random Number Generator
641
+ Improper Restriction of Security Token Assignment
642
+ Improper Neutralization of Delimiters
643
+ Regular Expression without Anchors
644
+ Improper Handling of Hardware Behavior in Exceptionally Cold Environments
645
+ Improper Neutralization of Macro Symbols
646
+ Unchecked Input for Loop Condition
647
+ Use of Cache Containing Sensitive Information
648
+ Improper Neutralization of Whitespace
649
+ Integer Overflow to Buffer Overflow
650
+ .NET Misconfiguration: Use of Impersonation
651
+ Improper Neutralization of Section Delimiters
652
+ Unsynchronized Access to Shared Data in a Multithreaded Context
653
+ Missing Write Protection for Parametric Data Values
654
+ Missing Ability to Patch ROM Code
655
+ Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
656
+ Cleartext Storage of Sensitive Information
657
+ Access of Uninitialized Pointer
658
+ Insufficient Verification of Data Authenticity
659
+ Use of a Cryptographic Primitive with a Risky Implementation
660
+ Improper Export of Android Application Components
661
+ Improper Neutralization of Substitution Characters
662
+ Behavioral Change in New Version or Environment
663
+ Passing Mutable Objects to an Untrusted Method
664
+ Use of Uninitialized Resource
665
+ Acceptance of Extraneous Untrusted Data With Trusted Data
666
+ Incorrect Chaining or Granularity of Debug Components
667
+ Compiler Optimization Removal or Modification of Security-critical Code
668
+ Improper Validation of Integrity Check Value
669
+ Multiple Inheritance from Concrete Classes
670
+ Serializable Data Element Containing non-Serializable Item Elements
671
+ Improper Neutralization of Quoting Syntax
672
+ Command Shell in Externally Accessible Directory
673
+ User Interface (UI) Misrepresentation of Critical Information
674
+ Path Traversal: '\dir\..\filename'
675
+ Comparison of Object References Instead of Object Contents
801
676
  Execution After Redirect (EAR)
802
- J2EE Misconfiguration: Missing Custom Error Page
803
- Improper Check or Handling of Exceptional Conditions
677
+ Incorrectly Specified Destination in a Communication Channel
678
+ Function Call with Incorrectly Specified Arguments
679
+ Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
680
+ Plaintext Storage of a Password
681
+ Security-Sensitive Hardware Controls with Missing Lock Bit Protection
682
+ Use of Hard-coded Password
683
+ Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element
684
+ Improper Management of Sensitive Trace Data
685
+ Logic/Time Bomb
686
+ Improper Control of Generation of Code ('Code Injection')
687
+ Improper Restriction of Rendered UI Layers or Frames
688
+ Security Version Number Mutable to Older Versions
689
+ Cleartext Storage of Sensitive Information in an Environment Variable
690
+ Numeric Truncation Error
691
+ Improper Handling of Windows Device Names
692
+ Class with Excessively Deep Inheritance
693
+ Authentication Bypass by Assumed-Immutable Data
694
+ Access Control Check Implemented After Asset is Accessed
695
+ Incorrect Default Permissions
696
+ Race Condition for Write-Once Attributes
697
+ Struts: Unvalidated Action Form
698
+ Incomplete Filtering of Special Elements
699
+ Creation of Temporary File in Directory with Insecure Permissions
804
700
  Incorrect Type Conversion or Cast
805
- Incorrect Control Flow Scoping
806
- Use of Incorrectly-Resolved Name or Reference
807
- Improper Neutralization
701
+ Privilege Context Switching Error
702
+ Inconsistency Between Implementation and Documented Design
703
+ Incomplete Comparison with Missing Factors
704
+ Path Equivalence: '/multiple/trailing/slash//'
705
+ Exposure of Sensitive Information to an Unauthorized Actor
706
+ Weak Password Recovery Mechanism for Forgotten Password
707
+ Improper Neutralization of Formula Elements in a CSV File
808
708
  Incorrect Ownership Assignment
809
- Improper Adherence to Coding Standards
709
+ Missing Standardized Error Handling Mechanism
710
+ clone() Method Without super.clone()
711
+ Insufficient Precision or Accuracy of a Real Number
712
+ Non-Replicating Malicious Code
713
+ Authentication Bypass by Alternate Name
714
+ Public Static Final Field References Mutable Object
715
+ Insufficient Type Distinction
716
+ Multiple Locks of a Critical Resource
717
+ Improper Neutralization of Expression/Command Delimiters
718
+ Reliance on Component That is Not Updateable
719
+ Incorrect Calculation of Multi-Byte String Length
720
+ Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
721
+ Improper Neutralization of CRLF Sequences ('CRLF Injection')
722
+ Insufficient Granularity of Access Control
723
+ Sensitive Cookie with Improper SameSite Attribute
724
+ Improper Handling of Missing Special Element
725
+ Predictable from Observable State
726
+ Class with Excessive Number of Child Classes
727
+ Use of Same Variable for Multiple Purposes
728
+ Improper Control of Resource Identifiers ('Resource Injection')
729
+ Incorrect Execution-Assigned Permissions
730
+ Observable Response Discrepancy
731
+ Improper Handling of Insufficient Permissions or Privileges
732
+ Incorrect Register Defaults or Module Parameters
733
+ Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
734
+ Authentication Bypass by Primary Weakness
735
+ Insecure Storage of Sensitive Information
736
+ Improper Validation of Certificate with Host Mismatch
810
737
  Improper Handling of Apple HFS+ Alternate Data Stream Path
811
- External Control of File Name or Path
812
- Incorrect Permission Assignment for Critical Resource
813
- Compiler Optimization Removal or Modification of Security-critical Code
814
- Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
815
- Exposed Dangerous Method or Function
816
- Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
738
+ Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls
739
+ Return Inside Finally Block
740
+ Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations
741
+ Unchecked Return Value
742
+ Incorrect Provision of Specified Functionality
743
+ Storing Passwords in a Recoverable Format
744
+ Return of Pointer Value Outside of Expected Range
745
+ Improperly Implemented Security Check for Standard
746
+ Deployment of Wrong Handler
747
+ Sensitive Data Storage in Improperly Locked Memory
748
+ Sensitive Non-Volatile Information Not Protected During Debug
749
+ Improper Control of Dynamically-Identified Variables
750
+ Executable Regular Expression Error
751
+ Firmware Not Updateable
752
+ Access of Memory Location After End of Buffer
753
+ Deadlock
754
+ Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
817
755
  Improper Check for Unusual or Exceptional Conditions
756
+ On-Chip Debug and Test Interface With Improper Access Control
757
+ Mirrored Regions with Different Values
758
+ Trojan Horse
759
+ Initialization with Hard-Coded Network Resource Configuration Data
760
+ Improper Check or Handling of Exceptional Conditions
761
+ Exposure of Access Control List Files to an Unauthorized Control Sphere
762
+ Reliance on Runtime Component in Generated Code
763
+ Use of Default Credentials
764
+ External Initialization of Trusted Variables or Data Stores
765
+ Improper Restriction of Software Interfaces to Hardware Features
766
+ Small Seed Space in PRNG
767
+ Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution
768
+ The UI Performs the Wrong Action
769
+ Public Key Re-Use for Signing both Debug and Production Code
770
+ Collapse of Data into Unsafe Value
771
+ Path Equivalence: Windows 8.3 Filename
818
772
  Improper Handling of Exceptional Conditions
819
- Missing Custom Error Page
820
- Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
821
- Reliance on Undefined, Unspecified, or Implementation-Defined Behavior
822
- Use of a One-Way Hash without a Salt
823
- Improper Neutralization of Equivalent Special Elements
824
- Use of a One-Way Hash with a Predictable Salt
825
- Free of Pointer not at Start of Buffer
826
- Mismatched Memory Management Routines
827
- Release of Invalid Pointer or Reference
828
- Multiple Locks of a Critical Resource
829
- Multiple Unlocks of a Critical Resource
830
- Critical Data Element Declared Public
831
- Access to Critical Private Variable via Public Method
832
- Incorrect Short Circuit Evaluation
773
+ Undefined Behavior for Input to API
774
+ Improper Protection against Electromagnetic Fault Injection (EM-FI)
775
+ Improper Neutralization of Input Used for LLM Prompting
776
+ Missing Report of Error Condition
777
+ Insufficiently Protected Credentials
778
+ Buffer Under-read
779
+ Asymmetric Resource Consumption (Amplification)
780
+ Suspicious Comment
781
+ Cleartext Storage of Sensitive Information in Executable
782
+ Data Access from Outside Expected Data Manager Component
783
+ Improper Handling of Single Event Upsets
784
+ Excessive Execution of Sequential Searches of Data Resource
785
+ Incorrect Comparison
786
+ Empty Code Block
787
+ EJB Bad Practices: Use of Java I/O
788
+ Path Equivalence: 'filename....' (Multiple Trailing Dot)
789
+ Missing Authentication for Critical Function
790
+ Unverified Password Change
791
+ Missing Cryptographic Step
792
+ Doubled Character XSS Manipulations
793
+ Cross-Site Request Forgery (CSRF)
794
+ Use of Unmaintained Third Party Components
795
+ Use of Client-Side Authentication
796
+ Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
797
+ Path Equivalence: '//multiple/leading/slash'
798
+ Observable Timing Discrepancy
799
+ Improper Validation of Generative AI Output
800
+ Cleartext Storage of Sensitive Information in a Cookie
801
+ Use of a Key Past its Expiration Date
833
802
  Improper Neutralization of Special Elements used in a Command ('Command Injection')
834
- Allocation of Resources Without Limits or Throttling
835
- Missing Reference to Active Allocated Resource
836
- Missing Release of Resource after Effective Lifetime
837
- Missing Reference to Active File Descriptor or Handle
838
- Allocation of File Descriptors or Handles Without Limits or Throttling
839
- Missing Release of File Descriptor or Handle after Effective Lifetime
840
- Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
841
- Regular Expression without Anchors
842
- Insufficient Logging
843
- Logging of Excessive Data
844
- Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
845
- Use of RSA Algorithm without OAEP
846
- Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code
847
- Exposed IOCTL with Insufficient Access Control
803
+ Loop with Unreachable Exit Condition ('Infinite Loop')
804
+ Untrusted Search Path
805
+ Assignment to Variable without Use
806
+ Unrestricted Externally Accessible Lock
807
+ Embedded Malicious Code
808
+ Path Equivalence: 'filedir*' (Wildcard)
809
+ Use of Hard-coded, Security-relevant Constants
810
+ Information Loss or Omission
811
+ Improper Neutralization of Special Elements Used in a Template Engine
812
+ Incomplete Documentation of Program Execution
813
+ Weak Password Requirements
814
+ External Control of Assumed-Immutable Web Parameter
815
+ Untrusted Pointer Dereference
816
+ Use of Web Browser Cache Containing Sensitive Information
817
+ Integer Underflow (Wrap or Wraparound)
818
+ Insufficient Entropy
819
+ Trusting HTTP Permission Methods on the Server Side
820
+ EJB Bad Practices: Use of Sockets
821
+ Improper Control of Dynamically-Managed Code Resources
822
+ Unsafe ActiveX Control Marked Safe For Scripting
823
+ Improper Update of Reference Count
824
+ J2EE Bad Practices: Use of System.exit()
825
+ Improper Input Validation
826
+ Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
827
+ Use of Obsolete Function
828
+ Reliance on File Name or Extension of Externally-Supplied File
829
+ Operation on a Resource after Expiration or Release
830
+ Insertion of Sensitive Information into Log File
831
+ Assignment of a Fixed Address to a Pointer
832
+ Use of Singleton Pattern Without Synchronization in a Multithreaded Context
833
+ Password Aging with Long Expiration
834
+ Cleartext Storage in the Registry
835
+ Missing Authorization
836
+ Overly Restrictive Regular Expression
837
+ Operation on Resource in Wrong Phase of Lifetime
838
+ J2EE Framework: Saving Unserializable Objects to Disk
848
839
  Operator Precedence Logic Error
849
- Reliance on Cookies without Validation and Integrity Checking in a Security Decision
850
- Use of Path Manipulation Function without Maximum-sized Buffer
851
- Access of Memory Location Before Start of Buffer
852
- Out-of-bounds Write
853
- Access of Memory Location After End of Buffer
854
- Memory Allocation with Excessive Size Value
855
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
856
- Improper Filtering of Special Elements
857
- Incomplete Filtering of Special Elements
840
+ Unexpected Sign Extension
841
+ Improper Neutralization of Special Elements in Data Query Logic
842
+ Race Condition within a Thread
843
+ Call to Non-ubiquitous API
844
+ Missing Origin Validation in WebSockets
845
+ Permissive Cross-domain Security Policy with Untrusted Domains
846
+ Incomplete Design Documentation
847
+ Cleartext Storage in a File or on Disk
848
+ Improper Handling of Extra Parameters
849
+ Integer Coercion Error
850
+ J2EE Misconfiguration: Insufficient Session-ID Length
851
+ Unprotected Transport of Credentials
852
+ Reliance on Insufficiently Trustworthy Component
853
+ Privilege Chaining
854
+ Path Equivalence: 'filename.' (Trailing Dot)
855
+ Product Released in Non-Release Configuration
856
+ Race Condition During Access to Alternate Channel
857
+ Improper Neutralization of Parameter/Argument Delimiters
858
+ Exposure of Sensitive System Information to an Unauthorized Control Sphere
859
+ Inclusion of Undocumented Features or Chicken Bits
858
860
  Incomplete Filtering of One or More Instances of Special Elements
859
- Only Filtering One Instance of a Special Element
861
+ Insufficient Granularity of Address Regions Protected by Register Locks
862
+ Use of Implicit Intent for Sensitive Communication
863
+ Excessive Platform Resource Consumption within a Loop
864
+ Password in Configuration File
865
+ Improper Following of a Certificate's Chain of Trust
866
+ EJB Bad Practices: Use of AWT Swing
867
+ Path Traversal: '....//'
868
+ Use of Object without Invoking Destructor Method
869
+ Unquoted Search Path or Element
870
+ Improper Identifier for IP Block used in System-On-Chip (SOC)
871
+ Weak Encoding for Password
872
+ Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
873
+ Improper Handling of Alternate Encoding
874
+ Assigning instead of Comparing
875
+ Path Traversal: 'dir/../../filename'
876
+ Critical Data Element Declared Public
877
+ Violation of Secure Design Principles
878
+ Improper Privilege Management
879
+ Incorrect Bitwise Shift of Integer
860
880
  Incomplete Filtering of Multiple Instances of Special Elements
861
- Only Filtering Special Elements at a Specified Location
862
- Only Filtering Special Elements Relative to a Marker
863
- Only Filtering Special Elements at an Absolute Position
864
- Use of Hard-coded Credentials
865
- Improper Control of Interaction Frequency
866
- J2EE Misconfiguration: Entity Bean Declared Remote
867
- Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
868
- Guessable CAPTCHA
869
- Buffer Access with Incorrect Length Value
870
- Buffer Access Using Size of Source Buffer
871
- Reliance on Untrusted Inputs in a Security Decision
872
- Improper Neutralization of Script in an Error Message Web Page
873
- Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
874
- Missing Synchronization
875
- Incorrect Synchronization
876
- Untrusted Pointer Dereference
877
- Use of Out-of-range Pointer Offset
878
- Access of Uninitialized Pointer
879
- Expired Pointer Dereference
880
- Premature Release of Resource During Expected Lifetime
881
- Improper Control of Document Type Definition
882
- Signal Handler with Functionality that is not Asynchronous-Safe
883
- Inclusion of Functionality from Untrusted Control Sphere
884
- Improper Neutralization of Script in Attributes in a Web Page
885
- Inclusion of Web Functionality from an Untrusted Source
881
+ Call to Thread run() instead of start()
882
+ Improper Resource Locking
883
+ Signal Handler Race Condition
884
+ Insecure Preserved Inherited Permissions
885
+ Return of Wrong Status Code
886
+ Creation of Temporary File With Insecure Permissions
887
+ Improper Handling of Unexpected Data Type
888
+ Invokable Control Element with Signature Containing an Excessive Number of Parameters
889
+ Using Referer Field for Authentication
890
+ Uncontrolled Search Path Element
891
+ Cleartext Storage of Sensitive Information in GUI
892
+ Source Code Element without Standard Prologue
893
+ Use of RSA Algorithm without OAEP
894
+ Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
895
+ Private Data Structure Returned From A Public Method
896
+ finalize() Method Declared Public
897
+ Replicating Malicious Code (Virus or Worm)
886
898
  Signal Handler Function Associated with Multiple Signals
887
- Unlock of a Resource that is not Locked
888
- Deadlock
889
- Excessive Iteration
890
- Loop with Unreachable Exit Condition ('Infinite Loop')
891
- Use of Password Hash Instead of Password for Authentication
892
- Improper Enforcement of a Single, Unique Action
893
- Inappropriate Encoding for Output Context
894
- Numeric Range Comparison Without Minimum Check
895
- Improper Neutralization of Encoded URI Schemes in a Web Page
896
- Improper Enforcement of Behavioral Workflow
897
- Placement of User into Incorrect Group
898
- Access of Resource Using Incompatible Type ('Type Confusion')
899
- Doubled Character XSS Manipulations
900
- Improper Neutralization of Invalid Characters in Identifiers in Web Pages
901
- Missing Authorization
902
- Incorrect Authorization
903
- Improper Neutralization of Alternate XSS Syntax
904
- Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
905
- Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
906
- J2EE Misconfiguration: Weak Access Permissions for EJB Methods
907
- Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
908
- Use of Uninitialized Resource
909
- Missing Initialization of Resource
910
- XML Injection (aka Blind XPath Injection)
911
- Use of Expired File Descriptor
912
- Improper Update of Reference Count
913
- Hidden Functionality
914
- Improper Control of Dynamically-Managed Code Resources
915
- Improper Control of Dynamically-Identified Variables
916
- Improperly Controlled Modification of Dynamically-Determined Object Attributes
917
- Use of Password Hash With Insufficient Computational Effort
918
- Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
919
- Server-Side Request Forgery (SSRF)
920
- Improper Restriction of Power Consumption
921
- Storage of Sensitive Data in a Mechanism without Access Control
922
- Insecure Storage of Sensitive Information
899
+ Observable Internal Behavioral Discrepancy
900
+ Device Unlock Credential Sharing
901
+ Binding to an Unrestricted IP Address
902
+ Reliance on Reverse DNS Resolution for a Security-Critical Action
903
+ Class with Virtual Method without a Virtual Destructor
904
+ Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
923
905
  Improper Restriction of Communication Channel to Intended Endpoints
924
- Improper Enforcement of Message Integrity During Transmission in a Communication Channel
925
- Improper Verification of Intent by Broadcast Receiver
926
- Improper Export of Android Application Components
927
- Use of Implicit Intent for Sensitive Communication
928
- Improper Neutralization of CRLF Sequences ('CRLF Injection')
929
- Improper Authorization in Handler for Custom URL Scheme
930
- Improper Control of Generation of Code ('Code Injection')
931
- Improper Verification of Source of a Communication Channel
932
- Incorrectly Specified Destination in a Communication Channel
933
- Permissive Cross-domain Policy with Untrusted Domains
934
- Improper Neutralization of Special Elements in Data Query Logic
935
- Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
936
- Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
937
- Improper Neutralization of Server-Side Includes (SSI) Within a Web Page
938
- Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')
939
- Improper Control of Resource Identifiers ('Resource Injection')
906
+ Reliance on a Single Factor in a Security Decision
907
+ Sensitive Cookie Without 'HttpOnly' Flag
908
+ Storage of File With Sensitive Data Under FTP Root
909
+ Improper Handling of Highly Compressed Data (Data Amplification)
910
+ Incorrect Behavior Order: Early Amplification
911
+ Invocation of Process Using Visible Sensitive Information
912
+ Only Filtering One Instance of a Special Element
913
+ Path Equivalence: 'filedir\' (Trailing Backslash)
914
+ Path Traversal: '/dir/../filename'
915
+ Comparison of Classes by Name
916
+ Dead Code
917
+ Buffer Over-read
918
+ Improper Neutralization of Multiple Trailing Special Elements
919
+ Dynamic Variable Evaluation
920
+ Use of Password System for Primary Authentication
921
+ Encoding Error
922
+ Incorrect Check of Function Return Value
923
+ Improper Physical Access Control
924
+ Creation of Emergent Resource
925
+ PHP External Variable Modification
926
+ Reliance on Untrusted Inputs in a Security Decision
927
+ Multiple Releases of Same Resource or Handle
928
+ Hardware Child Block Incorrectly Connected to Parent System
929
+ Failure to Handle Incomplete Element
930
+ Improper Neutralization of Null Byte or NUL Character
931
+ Sensitive Information Uncleared Before Debug/Power State Transition
932
+ Floating Point Comparison with Incorrect Operator
933
+ Release of Invalid Pointer or Reference
934
+ Improper Handling of Case Sensitivity
935
+ Omitted Break Statement in Switch
936
+ J2EE Bad Practices: Direct Management of Connections
937
+ Missing Serialization Control Element
938
+ Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code
939
+ Use of Hard-coded Credentials
940
+ Multiple Unlocks of a Critical Resource
941
+ Insufficient Logging
942
+ Missing Release of Resource after Effective Lifetime
943
+ Improper Authorization
944
+ Improper Handling of Inconsistent Structural Elements