CWE

Common Weakness Enumeration

A Community-Developed Dictionary of Software Weakness Types

CWE/SANS Top 25 Most Dangerous Software Errors Common Weakness Scoring System
Common Weakness Risk Analysis Framework
Home > CWE List > CWE- Individual Dictionary Definition (2.7)  

Presentation Filter:

CWE-254: Security Features

 
Security Features
Category ID: 254 (Category)Status: Incomplete
+ Description

Description Summary

Software security is not security software. Here we're concerned with topics like authentication, access control, confidentiality, cryptography, and privilege management.
+ Relationships
NatureTypeIDNameView(s) this relationship pertains toView(s)
ChildOfCategoryCategory18Source Code
Development Concepts (primary)699
ParentOfCategoryCategory255Credentials Management
Development Concepts (primary)699
ParentOfWeakness VariantWeakness Variant256Plaintext Storage of a Password
Seven Pernicious Kingdoms (primary)700
ParentOfWeakness VariantWeakness Variant258Empty Password in Configuration File
Seven Pernicious Kingdoms (primary)700
ParentOfWeakness BaseWeakness Base259Use of Hard-coded Password
Seven Pernicious Kingdoms (primary)700
ParentOfWeakness VariantWeakness Variant260Password in Configuration File
Development Concepts699
Seven Pernicious Kingdoms (primary)700
ParentOfWeakness VariantWeakness Variant261Weak Cryptography for Passwords
Seven Pernicious Kingdoms (primary)700
ParentOfCategoryCategory264Permissions, Privileges, and Access Controls
Development Concepts (primary)699
ParentOfWeakness BaseWeakness Base272Least Privilege Violation
Seven Pernicious Kingdoms (primary)700
ParentOfWeakness ClassWeakness Class285Improper Authorization
Seven Pernicious Kingdoms (primary)700
ParentOfWeakness ClassWeakness Class287Improper Authentication
Development Concepts699
ParentOfWeakness BaseWeakness Base295Improper Certificate Validation
Development Concepts (primary)699
ParentOfCategoryCategory310Cryptographic Issues
Development Concepts (primary)699
ParentOfWeakness ClassWeakness Class330Use of Insufficiently Random Values
Development Concepts (primary)699
Seven Pernicious Kingdoms (primary)700
ParentOfWeakness ClassWeakness Class345Insufficient Verification of Data Authenticity
Development Concepts (primary)699
ParentOfCategoryCategory355User Interface Security Issues
Development Concepts (primary)699
ParentOfWeakness BaseWeakness Base358Improperly Implemented Security Check for Standard
Development Concepts (primary)699
ParentOfWeakness ClassWeakness Class359Exposure of Private Information ('Privacy Violation')
Development Concepts (primary)699
Seven Pernicious Kingdoms (primary)700
ParentOfWeakness BaseWeakness Base565Reliance on Cookies without Validation and Integrity Checking
Development Concepts (primary)699
ParentOfWeakness BaseWeakness Base602Client-Side Enforcement of Server-Side Security
Development Concepts (primary)699
ParentOfWeakness BaseWeakness Base653Insufficient Compartmentalization
Development Concepts699
ParentOfWeakness BaseWeakness Base654Reliance on a Single Factor in a Security Decision
Development Concepts699
ParentOfWeakness BaseWeakness Base655Insufficient Psychological Acceptability
Development Concepts699
ParentOfWeakness BaseWeakness Base656Reliance on Security Through Obscurity
Development Concepts699
ParentOfWeakness ClassWeakness Class693Protection Mechanism Failure
Development Concepts (primary)699
ParentOfWeakness BaseWeakness Base778Insufficient Logging
Development Concepts699
ParentOfWeakness BaseWeakness Base779Logging of Excessive Data
Development Concepts699
ParentOfWeakness VariantWeakness Variant784Reliance on Cookies without Validation and Integrity Checking in a Security Decision
Development Concepts699
ParentOfWeakness BaseWeakness Base798Use of Hard-coded Credentials
Seven Pernicious Kingdoms (primary)700
ParentOfWeakness BaseWeakness Base807Reliance on Untrusted Inputs in a Security Decision
Development Concepts (primary)699
MemberOfViewView700Seven Pernicious Kingdoms
Seven Pernicious Kingdoms (primary)700
+ Taxonomy Mappings
Mapped Taxonomy NameNode IDFitMapped Node Name
7 Pernicious KingdomsSecurity Features
+ Content History
Submissions
Submission DateSubmitterOrganizationSource
Externally Mined
Modifications
Modification DateModifierOrganizationSource
2008-09-08MITREInternal
updated Relationships, Taxonomy_Mappings
2009-07-27MITREInternal
updated Relationships
2010-02-16MITREInternal
updated Relationships
Page Last Updated: June 23, 2014