16 |
Configuration |
|
Major |
Maintenance_Notes, References |
|
Minor |
None |
20 |
Improper Input Validation |
|
Major |
References, Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
22 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
|
Major |
Observed_Examples, References |
|
Minor |
Applicable_Platforms, Demonstrative_Examples |
23 |
Relative Path Traversal |
|
Major |
Alternate_Terms, Observed_Examples, References |
|
Minor |
Applicable_Platforms, Demonstrative_Examples |
24 |
Path Traversal: '../filedir' |
|
Major |
None |
|
Minor |
Applicable_Platforms |
25 |
Path Traversal: '/../filedir' |
|
Major |
None |
|
Minor |
Applicable_Platforms |
26 |
Path Traversal: '/dir/../filename' |
|
Major |
None |
|
Minor |
Applicable_Platforms |
27 |
Path Traversal: 'dir/../../filename' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
28 |
Path Traversal: '..\filedir' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
29 |
Path Traversal: '\..\filename' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
30 |
Path Traversal: '\dir\..\filename' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
31 |
Path Traversal: 'dir\..\..\filename' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
32 |
Path Traversal: '...' (Triple Dot) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
33 |
Path Traversal: '....' (Multiple Dot) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
34 |
Path Traversal: '....//' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
35 |
Path Traversal: '.../...//' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
36 |
Absolute Path Traversal |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
37 |
Path Traversal: '/absolute/pathname/here' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
38 |
Path Traversal: '\absolute\pathname\here' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
39 |
Path Traversal: 'C:dirname' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
40 |
Path Traversal: '\\UNC\share\name\' (Windows UNC Share) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
41 |
Improper Resolution of Path Equivalence |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
42 |
Path Equivalence: 'filename.' (Trailing Dot) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
43 |
Path Equivalence: 'filename....' (Multiple Trailing Dot) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
44 |
Path Equivalence: 'file.name' (Internal Dot) |
|
Major |
None |
|
Minor |
Applicable_Platforms |
45 |
Path Equivalence: 'file...name' (Multiple Internal Dot) |
|
Major |
None |
|
Minor |
Applicable_Platforms |
46 |
Path Equivalence: 'filename ' (Trailing Space) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
47 |
Path Equivalence: ' filename' (Leading Space) |
|
Major |
None |
|
Minor |
Applicable_Platforms |
48 |
Path Equivalence: 'file name' (Internal Whitespace) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
49 |
Path Equivalence: 'filename/' (Trailing Slash) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
50 |
Path Equivalence: '//multiple/leading/slash' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
51 |
Path Equivalence: '/multiple//internal/slash' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
52 |
Path Equivalence: '/multiple/trailing/slash//' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
53 |
Path Equivalence: '\multiple\\internal\backslash' |
|
Major |
None |
|
Minor |
Applicable_Platforms |
54 |
Path Equivalence: 'filedir\' (Trailing Backslash) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
55 |
Path Equivalence: '/./' (Single Dot Directory) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
56 |
Path Equivalence: 'filedir*' (Wildcard) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
57 |
Path Equivalence: 'fakedir/../realdir/filename' |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
58 |
Path Equivalence: Windows 8.3 Filename |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
59 |
Improper Link Resolution Before File Access ('Link Following') |
|
Major |
Alternate_Terms, Background_Details, Observed_Examples, References, Relationship_Notes, Theoretical_Notes |
|
Minor |
Applicable_Platforms |
61 |
UNIX Symbolic Link (Symlink) Following |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
62 |
UNIX Hard Link |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
64 |
Windows Shortcut Following (.LNK) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
65 |
Windows Hard Link |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
66 |
Improper Handling of File Names that Identify Virtual Resources |
|
Major |
None |
|
Minor |
Applicable_Platforms |
67 |
Improper Handling of Windows Device Names |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
69 |
Improper Handling of Windows ::DATA Alternate Data Stream |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
72 |
Improper Handling of Apple HFS+ Alternate Data Stream Path |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
73 |
External Control of File Name or Path |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
74 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
75 |
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) |
|
Major |
None |
|
Minor |
Applicable_Platforms |
76 |
Improper Neutralization of Equivalent Special Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms |
77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
|
Major |
Observed_Examples, References, Terminology_Notes |
|
Minor |
Applicable_Platforms |
78 |
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
79 |
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
|
Major |
Background_Details, Observed_Examples |
|
Minor |
Applicable_Platforms |
80 |
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
81 |
Improper Neutralization of Script in an Error Message Web Page |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
82 |
Improper Neutralization of Script in Attributes of IMG Tags in a Web Page |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
83 |
Improper Neutralization of Script in Attributes in a Web Page |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
84 |
Improper Neutralization of Encoded URI Schemes in a Web Page |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
85 |
Doubled Character XSS Manipulations |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
86 |
Improper Neutralization of Invalid Characters in Identifiers in Web Pages |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
87 |
Improper Neutralization of Alternate XSS Syntax |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
88 |
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
89 |
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
|
Major |
Observed_Examples, References |
|
Minor |
Applicable_Platforms |
90 |
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
91 |
XML Injection (aka Blind XPath Injection) |
|
Major |
None |
|
Minor |
Applicable_Platforms |
93 |
Improper Neutralization of CRLF Sequences ('CRLF Injection') |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
94 |
Improper Control of Generation of Code ('Code Injection') |
|
Major |
Observed_Examples |
|
Minor |
None |
95 |
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') |
|
Major |
Observed_Examples |
|
Minor |
None |
96 |
Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') |
|
Major |
Relationships, Taxonomy_Mappings |
|
Minor |
Observed_Examples |
97 |
Improper Neutralization of Server-Side Includes (SSI) Within a Web Page |
|
Major |
None |
|
Minor |
Applicable_Platforms |
98 |
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') |
|
Major |
References |
|
Minor |
Observed_Examples |
99 |
Improper Control of Resource Identifiers ('Resource Injection') |
|
Major |
None |
|
Minor |
Applicable_Platforms |
112 |
Missing XML Validation |
|
Major |
None |
|
Minor |
Applicable_Platforms |
113 |
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') |
|
Major |
Demonstrative_Examples, Related_Attack_Patterns |
|
Minor |
Applicable_Platforms, Description, Observed_Examples |
114 |
Process Control |
|
Major |
None |
|
Minor |
Applicable_Platforms |
115 |
Misinterpretation of Input |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
116 |
Improper Encoding or Escaping of Output |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
117 |
Improper Output Neutralization for Logs |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
118 |
Incorrect Access of Indexable Resource ('Range Error') |
|
Major |
None |
|
Minor |
Applicable_Platforms |
119 |
Improper Restriction of Operations within the Bounds of a Memory Buffer |
|
Major |
Relationships, Taxonomy_Mappings |
|
Minor |
Observed_Examples |
120 |
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
|
Major |
References |
|
Minor |
Observed_Examples |
121 |
Stack-based Buffer Overflow |
|
Major |
None |
|
Minor |
Observed_Examples |
122 |
Heap-based Buffer Overflow |
|
Major |
None |
|
Minor |
Observed_Examples |
123 |
Write-what-where Condition |
|
Major |
Relationships, Taxonomy_Mappings |
|
Minor |
None |
124 |
Buffer Underwrite ('Buffer Underflow') |
|
Major |
None |
|
Minor |
Observed_Examples |
125 |
Out-of-bounds Read |
|
Major |
Applicable_Platforms, Relationships, Taxonomy_Mappings |
|
Minor |
Observed_Examples |
126 |
Buffer Over-read |
|
Major |
None |
|
Minor |
Observed_Examples |
129 |
Improper Validation of Array Index |
|
Major |
References, Relationships, Taxonomy_Mappings |
|
Minor |
Applicable_Platforms, Observed_Examples |
130 |
Improper Handling of Length Parameter Inconsistency |
|
Major |
Taxonomy_Mappings |
|
Minor |
Applicable_Platforms, Observed_Examples |
131 |
Incorrect Calculation of Buffer Size |
|
Major |
References |
|
Minor |
Observed_Examples |
134 |
Use of Externally-Controlled Format String |
|
Major |
None |
|
Minor |
Observed_Examples |
138 |
Improper Neutralization of Special Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
141 |
Improper Neutralization of Parameter/Argument Delimiters |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
142 |
Improper Neutralization of Value Delimiters |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
143 |
Improper Neutralization of Record Delimiters |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
144 |
Improper Neutralization of Line Delimiters |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
145 |
Improper Neutralization of Section Delimiters |
|
Major |
None |
|
Minor |
Applicable_Platforms |
146 |
Improper Neutralization of Expression/Command Delimiters |
|
Major |
None |
|
Minor |
Applicable_Platforms |
147 |
Improper Neutralization of Input Terminators |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
149 |
Improper Neutralization of Quoting Syntax |
|
Major |
None |
|
Minor |
Observed_Examples |
150 |
Improper Neutralization of Escape, Meta, or Control Sequences |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
151 |
Improper Neutralization of Comment Delimiters |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
152 |
Improper Neutralization of Macro Symbols |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
153 |
Improper Neutralization of Substitution Characters |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
154 |
Improper Neutralization of Variable Name Delimiters |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
155 |
Improper Neutralization of Wildcards or Matching Symbols |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
156 |
Improper Neutralization of Whitespace |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
157 |
Failure to Sanitize Paired Delimiters |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
158 |
Improper Neutralization of Null Byte or NUL Character |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
159 |
Improper Handling of Invalid Use of Special Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms |
160 |
Improper Neutralization of Leading Special Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms |
161 |
Improper Neutralization of Multiple Leading Special Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms |
162 |
Improper Neutralization of Trailing Special Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms |
163 |
Improper Neutralization of Multiple Trailing Special Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms |
164 |
Improper Neutralization of Internal Special Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms |
165 |
Improper Neutralization of Multiple Internal Special Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms |
166 |
Improper Handling of Missing Special Element |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
167 |
Improper Handling of Additional Special Element |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
168 |
Improper Handling of Inconsistent Special Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms |
170 |
Improper Null Termination |
|
Major |
None |
|
Minor |
Observed_Examples |
172 |
Encoding Error |
|
Major |
None |
|
Minor |
Applicable_Platforms |
173 |
Improper Handling of Alternate Encoding |
|
Major |
None |
|
Minor |
Applicable_Platforms |
174 |
Double Decoding of the Same Data |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
175 |
Improper Handling of Mixed Encoding |
|
Major |
None |
|
Minor |
Applicable_Platforms |
176 |
Improper Handling of Unicode Encoding |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
177 |
Improper Handling of URL Encoding (Hex Encoding) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
178 |
Improper Handling of Case Sensitivity |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
179 |
Incorrect Behavior Order: Early Validation |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
180 |
Incorrect Behavior Order: Validate Before Canonicalize |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
181 |
Incorrect Behavior Order: Validate Before Filter |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
182 |
Collapse of Data into Unsafe Value |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
183 |
Permissive List of Allowed Inputs |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
184 |
Incomplete List of Disallowed Inputs |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
185 |
Incorrect Regular Expression |
|
Major |
Demonstrative_Examples, Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
186 |
Overly Restrictive Regular Expression |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
187 |
Partial String Comparison |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
189 |
Numeric Errors |
|
Major |
References, Relationships |
|
Minor |
None |
190 |
Integer Overflow or Wraparound |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
191 |
Integer Underflow (Wrap or Wraparound) |
|
Major |
None |
|
Minor |
Observed_Examples |
193 |
Off-by-one Error |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
194 |
Unexpected Sign Extension |
|
Major |
None |
|
Minor |
Observed_Examples |
195 |
Signed to Unsigned Conversion Error |
|
Major |
None |
|
Minor |
Observed_Examples |
197 |
Numeric Truncation Error |
|
Major |
None |
|
Minor |
Observed_Examples |
198 |
Use of Incorrect Byte Ordering |
|
Major |
None |
|
Minor |
Applicable_Platforms |
200 |
Exposure of Sensitive Information to an Unauthorized Actor |
|
Major |
Demonstrative_Examples, Maintenance_Notes, Observed_Examples, References |
|
Minor |
Applicable_Platforms |
201 |
Insertion of Sensitive Information Into Sent Data |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
202 |
Exposure of Sensitive Information Through Data Queries |
|
Major |
None |
|
Minor |
Applicable_Platforms |
203 |
Observable Discrepancy |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
204 |
Observable Response Discrepancy |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
205 |
Observable Behavioral Discrepancy |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
206 |
Observable Internal Behavioral Discrepancy |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
207 |
Observable Behavioral Discrepancy With Equivalent Products |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
208 |
Observable Timing Discrepancy |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
209 |
Generation of Error Message Containing Sensitive Information |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms, Observed_Examples |
210 |
Self-generated Error Message Containing Sensitive Information |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
211 |
Externally-Generated Error Message Containing Sensitive Information |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
212 |
Improper Removal of Sensitive Information Before Storage or Transfer |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
213 |
Exposure of Sensitive Information Due to Incompatible Policies |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
214 |
Invocation of Process Using Visible Sensitive Information |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
215 |
Insertion of Sensitive Information Into Debugging Code |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
219 |
Storage of File with Sensitive Data Under Web Root |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
220 |
Storage of File With Sensitive Data Under FTP Root |
|
Major |
None |
|
Minor |
Applicable_Platforms |
221 |
Information Loss or Omission |
|
Major |
None |
|
Minor |
Applicable_Platforms |
222 |
Truncation of Security-relevant Information |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
223 |
Omission of Security-relevant Information |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
224 |
Obscured Security-relevant Information by Alternate Name |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
226 |
Sensitive Information in Resource Not Removed Before Reuse |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
230 |
Improper Handling of Missing Values |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
231 |
Improper Handling of Extra Values |
|
Major |
None |
|
Minor |
Applicable_Platforms |
232 |
Improper Handling of Undefined Values |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
234 |
Failure to Handle Missing Parameter |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
235 |
Improper Handling of Extra Parameters |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
236 |
Improper Handling of Undefined Parameters |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
238 |
Improper Handling of Incomplete Structural Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms |
239 |
Failure to Handle Incomplete Element |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
240 |
Improper Handling of Inconsistent Structural Elements |
|
Major |
None |
|
Minor |
Applicable_Platforms |
241 |
Improper Handling of Unexpected Data Type |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
249 |
DEPRECATED: Often Misused: Path Manipulation |
|
Major |
Description |
|
Minor |
None |
250 |
Execution with Unnecessary Privileges |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
252 |
Unchecked Return Value |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
253 |
Incorrect Check of Function Return Value |
|
Major |
None |
|
Minor |
Applicable_Platforms |
255 |
Credentials Management Errors |
|
Major |
References |
|
Minor |
None |
256 |
Plaintext Storage of a Password |
|
Major |
Demonstrative_Examples, Observed_Examples, References |
|
Minor |
Applicable_Platforms |
257 |
Storing Passwords in a Recoverable Format |
|
Major |
None |
|
Minor |
Applicable_Platforms |
258 |
Empty Password in Configuration File |
|
Major |
None |
|
Minor |
Applicable_Platforms |
259 |
Use of Hard-coded Password |
|
Major |
Demonstrative_Examples, Observed_Examples, References |
|
Minor |
Applicable_Platforms |
260 |
Password in Configuration File |
|
Major |
None |
|
Minor |
Applicable_Platforms |
261 |
Weak Encoding for Password |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms |
262 |
Not Using Password Aging |
|
Major |
Description, Potential_Mitigations, References, Relationships |
|
Minor |
Applicable_Platforms |
263 |
Password Aging with Long Expiration |
|
Major |
Description, Potential_Mitigations, References, Relationships |
|
Minor |
Applicable_Platforms |
264 |
Permissions, Privileges, and Access Controls |
|
Major |
Maintenance_Notes, References |
|
Minor |
None |
266 |
Incorrect Privilege Assignment |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
267 |
Privilege Defined With Unsafe Actions |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
268 |
Privilege Chaining |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
269 |
Improper Privilege Management |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
270 |
Privilege Context Switching Error |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
271 |
Privilege Dropping / Lowering Errors |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
272 |
Least Privilege Violation |
|
Major |
None |
|
Minor |
Applicable_Platforms |
273 |
Improper Check for Dropped Privileges |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
274 |
Improper Handling of Insufficient Privileges |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
276 |
Incorrect Default Permissions |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
277 |
Insecure Inherited Permissions |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
278 |
Insecure Preserved Inherited Permissions |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
279 |
Incorrect Execution-Assigned Permissions |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
280 |
Improper Handling of Insufficient Permissions or Privileges |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
281 |
Improper Preservation of Permissions |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
282 |
Improper Ownership Management |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
283 |
Unverified Ownership |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
284 |
Improper Access Control |
|
Major |
References |
|
Minor |
Observed_Examples |
285 |
Improper Authorization |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
286 |
Incorrect User Management |
|
Major |
None |
|
Minor |
Applicable_Platforms |
287 |
Improper Authentication |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples, References, Relationships |
|
Minor |
None |
288 |
Authentication Bypass Using an Alternate Path or Channel |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
289 |
Authentication Bypass by Alternate Name |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
290 |
Authentication Bypass by Spoofing |
|
Major |
Relationships |
|
Minor |
Observed_Examples |
291 |
Reliance on IP Address for Authentication |
|
Major |
None |
|
Minor |
Applicable_Platforms |
293 |
Using Referer Field for Authentication |
|
Major |
None |
|
Minor |
Applicable_Platforms |
294 |
Authentication Bypass by Capture-replay |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
295 |
Improper Certificate Validation |
|
Major |
Observed_Examples, References |
|
Minor |
Applicable_Platforms |
296 |
Improper Following of a Certificate's Chain of Trust |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
297 |
Improper Validation of Certificate with Host Mismatch |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
298 |
Improper Validation of Certificate Expiration |
|
Major |
None |
|
Minor |
Applicable_Platforms |
299 |
Improper Check for Certificate Revocation |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
300 |
Channel Accessible by Non-Endpoint |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
301 |
Reflection Attack in an Authentication Protocol |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
302 |
Authentication Bypass by Assumed-Immutable Data |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
303 |
Incorrect Implementation of Authentication Algorithm |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
304 |
Missing Critical Step in Authentication |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
305 |
Authentication Bypass by Primary Weakness |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
306 |
Missing Authentication for Critical Function |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Observed_Examples, Potential_Mitigations, References, Relationship_Notes, Relationships |
|
Minor |
None |
307 |
Improper Restriction of Excessive Authentication Attempts |
|
Major |
Demonstrative_Examples, Description, Observed_Examples, References, Relationships |
|
Minor |
Applicable_Platforms |
308 |
Use of Single-factor Authentication |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms |
309 |
Use of Password System for Primary Authentication |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms |
310 |
Cryptographic Issues |
|
Major |
Maintenance_Notes, References |
|
Minor |
None |
311 |
Missing Encryption of Sensitive Data |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
312 |
Cleartext Storage of Sensitive Information |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Observed_Examples, Potential_Mitigations, References |
|
Minor |
None |
313 |
Cleartext Storage in a File or on Disk |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
314 |
Cleartext Storage in the Registry |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
315 |
Cleartext Storage of Sensitive Information in a Cookie |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
316 |
Cleartext Storage of Sensitive Information in Memory |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
317 |
Cleartext Storage of Sensitive Information in GUI |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
318 |
Cleartext Storage of Sensitive Information in Executable |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
319 |
Cleartext Transmission of Sensitive Information |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples, References |
|
Minor |
None |
321 |
Use of Hard-coded Cryptographic Key |
|
Major |
Demonstrative_Examples, Observed_Examples, References |
|
Minor |
Applicable_Platforms |
322 |
Key Exchange without Entity Authentication |
|
Major |
None |
|
Minor |
Applicable_Platforms |
323 |
Reusing a Nonce, Key Pair in Encryption |
|
Major |
None |
|
Minor |
Applicable_Platforms |
324 |
Use of a Key Past its Expiration Date |
|
Major |
None |
|
Minor |
Applicable_Platforms |
325 |
Missing Cryptographic Step |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
326 |
Inadequate Encryption Strength |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
327 |
Use of a Broken or Risky Cryptographic Algorithm |
|
Major |
Demonstrative_Examples, Observed_Examples, References |
|
Minor |
Applicable_Platforms |
328 |
Use of Weak Hash |
|
Major |
Demonstrative_Examples, Observed_Examples, References |
|
Minor |
Applicable_Platforms |
329 |
Generation of Predictable IV with CBC Mode |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
330 |
Use of Insufficiently Random Values |
|
Major |
Observed_Examples, Relationships |
|
Minor |
Applicable_Platforms |
331 |
Insufficient Entropy |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
332 |
Insufficient Entropy in PRNG |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
333 |
Improper Handling of Insufficient Entropy in TRNG |
|
Major |
None |
|
Minor |
Applicable_Platforms |
334 |
Small Space of Random Values |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
335 |
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
336 |
Same Seed in Pseudo-Random Number Generator (PRNG) |
|
Major |
None |
|
Minor |
Applicable_Platforms |
337 |
Predictable Seed in Pseudo-Random Number Generator (PRNG) |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
338 |
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
339 |
Small Seed Space in PRNG |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
341 |
Predictable from Observable State |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
342 |
Predictable Exact Value from Previous Values |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
343 |
Predictable Value Range from Previous Values |
|
Major |
None |
|
Minor |
Applicable_Platforms |
344 |
Use of Invariant Value in Dynamically Changing Context |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
345 |
Insufficient Verification of Data Authenticity |
|
Major |
None |
|
Minor |
Applicable_Platforms |
346 |
Origin Validation Error |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
347 |
Improper Verification of Cryptographic Signature |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
348 |
Use of Less Trusted Source |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
349 |
Acceptance of Extraneous Untrusted Data With Trusted Data |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
350 |
Reliance on Reverse DNS Resolution for a Security-Critical Action |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
351 |
Insufficient Type Distinction |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
352 |
Cross-Site Request Forgery (CSRF) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
353 |
Missing Support for Integrity Check |
|
Major |
None |
|
Minor |
Applicable_Platforms |
354 |
Improper Validation of Integrity Check Value |
|
Major |
None |
|
Minor |
Applicable_Platforms |
356 |
Product UI does not Warn User of Unsafe Actions |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
357 |
Insufficient UI Warning of Dangerous Operations |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
358 |
Improperly Implemented Security Check for Standard |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
359 |
Exposure of Private Personal Information to an Unauthorized Actor |
|
Major |
None |
|
Minor |
Applicable_Platforms |
360 |
Trust of System Event Data |
|
Major |
None |
|
Minor |
Applicable_Platforms |
362 |
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
|
Major |
Observed_Examples, References |
|
Minor |
None |
363 |
Race Condition Enabling Link Following |
|
Major |
None |
|
Minor |
Applicable_Platforms |
364 |
Signal Handler Race Condition |
|
Major |
None |
|
Minor |
Observed_Examples |
367 |
Time-of-check Time-of-use (TOCTOU) Race Condition |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
368 |
Context Switching Race Condition |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
369 |
Divide By Zero |
|
Major |
References |
|
Minor |
Observed_Examples |
370 |
Missing Check for Certificate Revocation after Initial Check |
|
Major |
None |
|
Minor |
Applicable_Platforms |
372 |
Incomplete Internal State Distinction |
|
Major |
None |
|
Minor |
Applicable_Platforms |
377 |
Insecure Temporary File |
|
Major |
None |
|
Minor |
Applicable_Platforms |
378 |
Creation of Temporary File With Insecure Permissions |
|
Major |
None |
|
Minor |
Applicable_Platforms |
379 |
Creation of Temporary File in Directory with Insecure Permissions |
|
Major |
None |
|
Minor |
Applicable_Platforms |
384 |
Session Fixation |
|
Major |
None |
|
Minor |
Applicable_Platforms |
385 |
Covert Timing Channel |
|
Major |
Maintenance_Notes |
|
Minor |
Applicable_Platforms |
386 |
Symbolic Name not Mapping to Correct Object |
|
Major |
None |
|
Minor |
Applicable_Platforms |
390 |
Detection of Error Condition Without Action |
|
Major |
None |
|
Minor |
Applicable_Platforms |
391 |
Unchecked Error Condition |
|
Major |
None |
|
Minor |
Applicable_Platforms |
392 |
Missing Report of Error Condition |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
393 |
Return of Wrong Status Code |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
394 |
Unexpected Status Code or Return Value |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
399 |
Resource Management Errors |
|
Major |
References |
|
Minor |
None |
400 |
Uncontrolled Resource Consumption |
|
Major |
Observed_Examples, Relationships |
|
Minor |
Applicable_Platforms |
401 |
Missing Release of Memory after Effective Lifetime |
|
Major |
Taxonomy_Mappings |
|
Minor |
Observed_Examples |
403 |
Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak') |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
404 |
Improper Resource Shutdown or Release |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
405 |
Asymmetric Resource Consumption (Amplification) |
|
Major |
None |
|
Minor |
Applicable_Platforms |
406 |
Insufficient Control of Network Message Volume (Network Amplification) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
407 |
Inefficient Algorithmic Complexity |
|
Major |
Alternate_Terms, Observed_Examples, Relationships |
|
Minor |
Applicable_Platforms |
408 |
Incorrect Behavior Order: Early Amplification |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
409 |
Improper Handling of Highly Compressed Data (Data Amplification) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
410 |
Insufficient Resource Pool |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
412 |
Unrestricted Externally Accessible Lock |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
413 |
Improper Resource Locking |
|
Major |
None |
|
Minor |
Applicable_Platforms |
414 |
Missing Lock Check |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
415 |
Double Free |
|
Major |
None |
|
Minor |
Observed_Examples |
416 |
Use After Free |
|
Major |
Description, Relationships, Taxonomy_Mappings |
|
Minor |
Observed_Examples |
419 |
Unprotected Primary Channel |
|
Major |
None |
|
Minor |
Applicable_Platforms |
420 |
Unprotected Alternate Channel |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
421 |
Race Condition During Access to Alternate Channel |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
422 |
Unprotected Windows Messaging Channel ('Shatter') |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
424 |
Improper Protection of Alternate Path |
|
Major |
None |
|
Minor |
Applicable_Platforms |
425 |
Direct Request ('Forced Browsing') |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
426 |
Untrusted Search Path |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
427 |
Uncontrolled Search Path Element |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
428 |
Unquoted Search Path or Element |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
430 |
Deployment of Wrong Handler |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
431 |
Missing Handler |
|
Major |
None |
|
Minor |
Applicable_Platforms |
432 |
Dangerous Signal Handler not Disabled During Sensitive Operations |
|
Major |
None |
|
Minor |
Applicable_Platforms |
433 |
Unparsed Raw Web Content Delivery |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
434 |
Unrestricted Upload of File with Dangerous Type |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
435 |
Improper Interaction Between Multiple Correctly-Behaving Entities |
|
Major |
None |
|
Minor |
Applicable_Platforms |
436 |
Interpretation Conflict |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
437 |
Incomplete Model of Endpoint Features |
|
Major |
None |
|
Minor |
Applicable_Platforms |
439 |
Behavioral Change in New Version or Environment |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
440 |
Expected Behavior Violation |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
441 |
Unintended Proxy or Intermediary ('Confused Deputy') |
|
Major |
Related_Attack_Patterns |
|
Minor |
Applicable_Platforms, Observed_Examples |
444 |
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
|
Major |
Related_Attack_Patterns |
|
Minor |
Applicable_Platforms, Common_Consequences, Observed_Examples, References |
446 |
UI Discrepancy for Security Feature |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
447 |
Unimplemented or Unsupported Feature in UI |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
448 |
Obsolete Feature in UI |
|
Major |
None |
|
Minor |
Applicable_Platforms |
449 |
The UI Performs the Wrong Action |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
450 |
Multiple Interpretations of UI Input |
|
Major |
None |
|
Minor |
Applicable_Platforms |
451 |
User Interface (UI) Misrepresentation of Critical Information |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
453 |
Insecure Default Variable Initialization |
|
Major |
None |
|
Minor |
Applicable_Platforms |
454 |
External Initialization of Trusted Variables or Data Stores |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
455 |
Non-exit on Failed Initialization |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
456 |
Missing Initialization of a Variable |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
457 |
Use of Uninitialized Variable |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
459 |
Incomplete Cleanup |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
469 |
Use of Pointer Subtraction to Determine Size |
|
Major |
Relationships, Taxonomy_Mappings |
|
Minor |
None |
470 |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |
|
Major |
None |
|
Minor |
Observed_Examples |
471 |
Modification of Assumed-Immutable Data (MAID) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
472 |
External Control of Assumed-Immutable Web Parameter |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
473 |
PHP External Variable Modification |
|
Major |
None |
|
Minor |
Observed_Examples |
474 |
Use of Function with Inconsistent Implementations |
|
Major |
None |
|
Minor |
Applicable_Platforms |
475 |
Undefined Behavior for Input to API |
|
Major |
None |
|
Minor |
Applicable_Platforms |
476 |
NULL Pointer Dereference |
|
Major |
Alternate_Terms, Applicable_Platforms, Observed_Examples |
|
Minor |
None |
477 |
Use of Obsolete Function |
|
Major |
None |
|
Minor |
Applicable_Platforms |
478 |
Missing Default Case in Multiple Condition Expression |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Description, Name, Potential_Mitigations |
|
Minor |
None |
479 |
Signal Handler Use of a Non-reentrant Function |
|
Major |
None |
|
Minor |
Observed_Examples |
480 |
Use of Incorrect Operator |
|
Major |
None |
|
Minor |
Applicable_Platforms |
483 |
Incorrect Block Delimitation |
|
Major |
None |
|
Minor |
Observed_Examples |
488 |
Exposure of Data Element to Wrong Session |
|
Major |
None |
|
Minor |
Applicable_Platforms |
489 |
Active Debug Code |
|
Major |
None |
|
Minor |
Applicable_Platforms |
492 |
Use of Inner Class Containing Sensitive Data |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
494 |
Download of Code Without Integrity Check |
|
Major |
References, Related_Attack_Patterns |
|
Minor |
Applicable_Platforms, Observed_Examples |
497 |
Exposure of Sensitive System Information to an Unauthorized Control Sphere |
|
Major |
Related_Attack_Patterns |
|
Minor |
Applicable_Platforms |
501 |
Trust Boundary Violation |
|
Major |
None |
|
Minor |
Applicable_Platforms |
502 |
Deserialization of Untrusted Data |
|
Major |
Applicable_Platforms |
|
Minor |
Observed_Examples |
507 |
Trojan Horse |
|
Major |
Related_Attack_Patterns |
|
Minor |
None |
511 |
Logic/Time Bomb |
|
Major |
None |
|
Minor |
Applicable_Platforms |
514 |
Covert Channel |
|
Major |
Maintenance_Notes |
|
Minor |
None |
515 |
Covert Storage Channel |
|
Major |
Maintenance_Notes |
|
Minor |
None |
521 |
Weak Password Requirements |
|
Major |
Observed_Examples, Potential_Mitigations, Relationships |
|
Minor |
Applicable_Platforms |
522 |
Insufficiently Protected Credentials |
|
Major |
Demonstrative_Examples, Observed_Examples, References, Relationships |
|
Minor |
None |
532 |
Insertion of Sensitive Information into Log File |
|
Major |
None |
|
Minor |
Observed_Examples |
538 |
Insertion of Sensitive Information into Externally-Accessible File or Directory |
|
Major |
None |
|
Minor |
Applicable_Platforms |
546 |
Suspicious Comment |
|
Major |
None |
|
Minor |
Applicable_Platforms |
561 |
Dead Code |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
570 |
Expression is Always False |
|
Major |
None |
|
Minor |
Applicable_Platforms |
571 |
Expression is Always True |
|
Major |
None |
|
Minor |
Applicable_Platforms |
573 |
Improper Following of Specification by Caller |
|
Major |
None |
|
Minor |
Observed_Examples |
582 |
Array Declared Public, Final, and Static |
|
Major |
Taxonomy_Mappings |
|
Minor |
None |
593 |
Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created |
|
Major |
Relationships |
|
Minor |
None |
595 |
Comparison of Object References Instead of Object Contents |
|
Major |
None |
|
Minor |
Applicable_Platforms |
601 |
URL Redirection to Untrusted Site ('Open Redirect') |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
602 |
Client-Side Enforcement of Server-Side Security |
|
Major |
Demonstrative_Examples, Description, Observed_Examples, References, Relationships |
|
Minor |
Applicable_Platforms |
603 |
Use of Client-Side Authentication |
|
Major |
Demonstrative_Examples, Observed_Examples, References, Relationships |
|
Minor |
None |
605 |
Multiple Binds to the Same Port |
|
Major |
None |
|
Minor |
Applicable_Platforms |
611 |
Improper Restriction of XML External Entity Reference |
|
Major |
None |
|
Minor |
Observed_Examples |
612 |
Improper Authorization of Index Containing Sensitive Information |
|
Major |
None |
|
Minor |
Applicable_Platforms |
614 |
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute |
|
Major |
None |
|
Minor |
Observed_Examples |
615 |
Inclusion of Sensitive Information in Source Code Comments |
|
Major |
None |
|
Minor |
Observed_Examples |
616 |
Incomplete Identification of Uploaded File Variables (PHP) |
|
Major |
None |
|
Minor |
Observed_Examples |
617 |
Reachable Assertion |
|
Major |
None |
|
Minor |
Observed_Examples |
618 |
Exposed Unsafe ActiveX Method |
|
Major |
None |
|
Minor |
Observed_Examples |
620 |
Unverified Password Change |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
621 |
Variable Extraction Error |
|
Major |
None |
|
Minor |
Observed_Examples |
622 |
Improper Validation of Function Hook Arguments |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
623 |
Unsafe ActiveX Control Marked Safe For Scripting |
|
Major |
None |
|
Minor |
Observed_Examples |
624 |
Executable Regular Expression Error |
|
Major |
None |
|
Minor |
Observed_Examples |
625 |
Permissive Regular Expression |
|
Major |
Demonstrative_Examples |
|
Minor |
Observed_Examples |
626 |
Null Byte Interaction Error (Poison Null Byte) |
|
Major |
None |
|
Minor |
Observed_Examples |
627 |
Dynamic Variable Evaluation |
|
Major |
None |
|
Minor |
Observed_Examples |
628 |
Function Call with Incorrectly Specified Arguments |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
636 |
Not Failing Securely ('Failing Open') |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
637 |
Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism') |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
638 |
Not Using Complete Mediation |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
639 |
Authorization Bypass Through User-Controlled Key |
|
Major |
None |
|
Minor |
Applicable_Platforms |
640 |
Weak Password Recovery Mechanism for Forgotten Password |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms |
641 |
Improper Restriction of Names for Files and Other Resources |
|
Major |
None |
|
Minor |
Applicable_Platforms |
642 |
External Control of Critical State Data |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
643 |
Improper Neutralization of Data within XPath Expressions ('XPath Injection') |
|
Major |
None |
|
Minor |
Applicable_Platforms |
644 |
Improper Neutralization of HTTP Headers for Scripting Syntax |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
645 |
Overly Restrictive Account Lockout Mechanism |
|
Major |
None |
|
Minor |
Applicable_Platforms |
646 |
Reliance on File Name or Extension of Externally-Supplied File |
|
Major |
None |
|
Minor |
Applicable_Platforms |
647 |
Use of Non-Canonical URL Paths for Authorization Decisions |
|
Major |
None |
|
Minor |
Applicable_Platforms |
648 |
Incorrect Use of Privileged APIs |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
649 |
Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
650 |
Trusting HTTP Permission Methods on the Server Side |
|
Major |
None |
|
Minor |
Applicable_Platforms |
651 |
Exposure of WSDL File Containing Sensitive Information |
|
Major |
None |
|
Minor |
Applicable_Platforms |
652 |
Improper Neutralization of Data within XQuery Expressions ('XQuery Injection') |
|
Major |
None |
|
Minor |
Applicable_Platforms |
653 |
Improper Isolation or Compartmentalization |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
654 |
Reliance on a Single Factor in a Security Decision |
|
Major |
References |
|
Minor |
Applicable_Platforms |
655 |
Insufficient Psychological Acceptability |
|
Major |
References |
|
Minor |
Applicable_Platforms |
656 |
Reliance on Security Through Obscurity |
|
Major |
Demonstrative_Examples, References |
|
Minor |
Applicable_Platforms, Observed_Examples |
657 |
Violation of Secure Design Principles |
|
Major |
References |
|
Minor |
None |
663 |
Use of a Non-reentrant Function in a Concurrent Context |
|
Major |
None |
|
Minor |
Observed_Examples |
664 |
Improper Control of a Resource Through its Lifetime |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms |
665 |
Improper Initialization |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
667 |
Improper Locking |
|
Major |
None |
|
Minor |
Observed_Examples |
668 |
Exposure of Resource to Wrong Sphere |
|
Major |
References |
|
Minor |
None |
669 |
Incorrect Resource Transfer Between Spheres |
|
Major |
Relationships |
|
Minor |
None |
670 |
Always-Incorrect Control Flow Implementation |
|
Major |
None |
|
Minor |
Observed_Examples |
672 |
Operation on a Resource after Expiration or Release |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
674 |
Uncontrolled Recursion |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms, Observed_Examples |
675 |
Multiple Operations on Resource in Single-Operation Context |
|
Major |
None |
|
Minor |
Applicable_Platforms |
676 |
Use of Potentially Dangerous Function |
|
Major |
None |
|
Minor |
Observed_Examples |
680 |
Integer Overflow to Buffer Overflow |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
681 |
Incorrect Conversion between Numeric Types |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
682 |
Incorrect Calculation |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
683 |
Function Call With Incorrect Order of Arguments |
|
Major |
None |
|
Minor |
Observed_Examples |
688 |
Function Call With Incorrect Variable or Reference as Argument |
|
Major |
None |
|
Minor |
Observed_Examples |
689 |
Permission Race Condition During Resource Copy |
|
Major |
None |
|
Minor |
Observed_Examples |
690 |
Unchecked Return Value to NULL Pointer Dereference |
|
Major |
None |
|
Minor |
Observed_Examples |
691 |
Insufficient Control Flow Management |
|
Major |
None |
|
Minor |
Applicable_Platforms |
692 |
Incomplete Denylist to Cross-Site Scripting |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
693 |
Protection Mechanism Failure |
|
Major |
None |
|
Minor |
Applicable_Platforms |
694 |
Use of Multiple Resources with Duplicate Identifier |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
696 |
Incorrect Behavior Order |
|
Major |
None |
|
Minor |
Observed_Examples |
697 |
Incorrect Comparison |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
698 |
Execution After Redirect (EAR) |
|
Major |
References |
|
Minor |
Observed_Examples |
703 |
Improper Check or Handling of Exceptional Conditions |
|
Major |
None |
|
Minor |
Applicable_Platforms |
704 |
Incorrect Type Conversion or Cast |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms |
705 |
Incorrect Control Flow Scoping |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
706 |
Use of Incorrectly-Resolved Name or Reference |
|
Major |
None |
|
Minor |
Applicable_Platforms |
707 |
Improper Neutralization |
|
Major |
None |
|
Minor |
Applicable_Platforms |
708 |
Incorrect Ownership Assignment |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
710 |
Improper Adherence to Coding Standards |
|
Major |
None |
|
Minor |
Applicable_Platforms |
732 |
Incorrect Permission Assignment for Critical Resource |
|
Major |
Demonstrative_Examples, Observed_Examples, References |
|
Minor |
Applicable_Platforms |
733 |
Compiler Optimization Removal or Modification of Security-critical Code |
|
Major |
None |
|
Minor |
Observed_Examples |
749 |
Exposed Dangerous Method or Function |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
754 |
Improper Check for Unusual or Exceptional Conditions |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
755 |
Improper Handling of Exceptional Conditions |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
757 |
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') |
|
Major |
None |
|
Minor |
Observed_Examples |
758 |
Reliance on Undefined, Unspecified, or Implementation-Defined Behavior |
|
Major |
None |
|
Minor |
Observed_Examples |
759 |
Use of a One-Way Hash without a Salt |
|
Major |
None |
|
Minor |
Observed_Examples |
760 |
Use of a One-Way Hash with a Predictable Salt |
|
Major |
None |
|
Minor |
Observed_Examples |
761 |
Free of Pointer not at Start of Buffer |
|
Major |
None |
|
Minor |
Observed_Examples |
765 |
Multiple Unlocks of a Critical Resource |
|
Major |
None |
|
Minor |
Observed_Examples |
766 |
Critical Data Element Declared Public |
|
Major |
None |
|
Minor |
Observed_Examples |
770 |
Allocation of Resources Without Limits or Throttling |
|
Major |
Observed_Examples, References |
|
Minor |
Applicable_Platforms |
771 |
Missing Reference to Active Allocated Resource |
|
Major |
Relationships, Taxonomy_Mappings |
|
Minor |
None |
772 |
Missing Release of Resource after Effective Lifetime |
|
Major |
Relationships, Taxonomy_Mappings |
|
Minor |
Observed_Examples |
773 |
Missing Reference to Active File Descriptor or Handle |
|
Major |
Relationships, Taxonomy_Mappings |
|
Minor |
None |
775 |
Missing Release of File Descriptor or Handle after Effective Lifetime |
|
Major |
Relationships, Taxonomy_Mappings |
|
Minor |
Observed_Examples |
776 |
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') |
|
Major |
None |
|
Minor |
Observed_Examples |
777 |
Regular Expression without Anchors |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
None |
778 |
Insufficient Logging |
|
Major |
Demonstrative_Examples, Potential_Mitigations |
|
Minor |
Applicable_Platforms, Observed_Examples |
779 |
Logging of Excessive Data |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
781 |
Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code |
|
Major |
None |
|
Minor |
Observed_Examples |
782 |
Exposed IOCTL with Insufficient Access Control |
|
Major |
None |
|
Minor |
Observed_Examples |
783 |
Operator Precedence Logic Error |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
784 |
Reliance on Cookies without Validation and Integrity Checking in a Security Decision |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
786 |
Access of Memory Location Before Start of Buffer |
|
Major |
None |
|
Minor |
Observed_Examples |
787 |
Out-of-bounds Write |
|
Major |
Applicable_Platforms |
|
Minor |
Observed_Examples |
788 |
Access of Memory Location After End of Buffer |
|
Major |
None |
|
Minor |
Observed_Examples |
789 |
Memory Allocation with Excessive Size Value |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
798 |
Use of Hard-coded Credentials |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples, References, Relationships |
|
Minor |
None |
799 |
Improper Control of Interaction Frequency |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
804 |
Guessable CAPTCHA |
|
Major |
Description, Relationships |
|
Minor |
Applicable_Platforms |
805 |
Buffer Access with Incorrect Length Value |
|
Major |
References |
|
Minor |
Observed_Examples |
807 |
Reliance on Untrusted Inputs in a Security Decision |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
822 |
Untrusted Pointer Dereference |
|
Major |
None |
|
Minor |
Observed_Examples |
823 |
Use of Out-of-range Pointer Offset |
|
Major |
None |
|
Minor |
Observed_Examples |
824 |
Access of Uninitialized Pointer |
|
Major |
None |
|
Minor |
Observed_Examples |
825 |
Expired Pointer Dereference |
|
Major |
None |
|
Minor |
Observed_Examples |
826 |
Premature Release of Resource During Expected Lifetime |
|
Major |
None |
|
Minor |
Observed_Examples |
827 |
Improper Control of Document Type Definition |
|
Major |
None |
|
Minor |
Observed_Examples |
828 |
Signal Handler with Functionality that is not Asynchronous-Safe |
|
Major |
None |
|
Minor |
Observed_Examples |
829 |
Inclusion of Functionality from Untrusted Control Sphere |
|
Major |
References, Related_Attack_Patterns |
|
Minor |
Observed_Examples |
832 |
Unlock of a Resource that is not Locked |
|
Major |
None |
|
Minor |
Observed_Examples |
833 |
Deadlock |
|
Major |
None |
|
Minor |
Observed_Examples |
834 |
Excessive Iteration |
|
Major |
None |
|
Minor |
Observed_Examples |
835 |
Loop with Unreachable Exit Condition ('Infinite Loop') |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
836 |
Use of Password Hash Instead of Password for Authentication |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
837 |
Improper Enforcement of a Single, Unique Action |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
838 |
Inappropriate Encoding for Output Context |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
839 |
Numeric Range Comparison Without Minimum Check |
|
Major |
None |
|
Minor |
Observed_Examples |
840 |
Business Logic Errors |
|
Major |
Terminology_Notes |
|
Minor |
None |
841 |
Improper Enforcement of Behavioral Workflow |
|
Major |
None |
|
Minor |
Observed_Examples |
842 |
Placement of User into Incorrect Group |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
843 |
Access of Resource Using Incompatible Type ('Type Confusion') |
|
Major |
None |
|
Minor |
Observed_Examples |
862 |
Missing Authorization |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
863 |
Incorrect Authorization |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
908 |
Use of Uninitialized Resource |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
909 |
Missing Initialization of Resource |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
910 |
Use of Expired File Descriptor |
|
Major |
None |
|
Minor |
Applicable_Platforms |
911 |
Improper Update of Reference Count |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
914 |
Improper Control of Dynamically-Identified Variables |
|
Major |
None |
|
Minor |
Observed_Examples |
915 |
Improperly Controlled Modification of Dynamically-Determined Object Attributes |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
916 |
Use of Password Hash With Insufficient Computational Effort |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
917 |
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') |
|
Major |
None |
|
Minor |
Observed_Examples |
918 |
Server-Side Request Forgery (SSRF) |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
920 |
Improper Restriction of Power Consumption |
|
Major |
None |
|
Minor |
Applicable_Platforms |
921 |
Storage of Sensitive Data in a Mechanism without Access Control |
|
Major |
None |
|
Minor |
Applicable_Platforms |
922 |
Insecure Storage of Sensitive Information |
|
Major |
Common_Consequences, Relationship_Notes |
|
Minor |
Applicable_Platforms |
923 |
Improper Restriction of Communication Channel to Intended Endpoints |
|
Major |
Related_Attack_Patterns, Relationships |
|
Minor |
Applicable_Platforms |
924 |
Improper Enforcement of Message Integrity During Transmission in a Communication Channel |
|
Major |
None |
|
Minor |
Applicable_Platforms |
925 |
Improper Verification of Intent by Broadcast Receiver |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms |
926 |
Improper Export of Android Application Components |
|
Major |
Background_Details |
|
Minor |
Applicable_Platforms |
927 |
Use of Implicit Intent for Sensitive Communication |
|
Major |
None |
|
Minor |
Applicable_Platforms |
939 |
Improper Authorization in Handler for Custom URL Scheme |
|
Major |
None |
|
Minor |
Observed_Examples |
940 |
Improper Verification of Source of a Communication Channel |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
941 |
Incorrectly Specified Destination in a Communication Channel |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
942 |
Permissive Cross-domain Policy with Untrusted Domains |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
943 |
Improper Neutralization of Special Elements in Data Query Logic |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
970 |
SFP Secondary Cluster: Faulty Buffer Access |
|
Major |
Relationships |
|
Minor |
None |
971 |
SFP Secondary Cluster: Faulty Pointer Use |
|
Major |
Relationships |
|
Minor |
None |
982 |
SFP Secondary Cluster: Failure to Release Resource |
|
Major |
Relationships |
|
Minor |
None |
983 |
SFP Secondary Cluster: Faulty Resource Use |
|
Major |
Relationships |
|
Minor |
None |
990 |
SFP Secondary Cluster: Tainted Input to Command |
|
Major |
Relationships |
|
Minor |
None |
998 |
SFP Secondary Cluster: Glitch in Computation |
|
Major |
Relationships |
|
Minor |
None |
999 |
DEPRECATED: Weaknesses without Software Fault Patterns |
|
Major |
Description, Name, Type, View_Audience, View_Filter |
|
Minor |
None |
1003 |
Weaknesses for Simplified Mapping of Published Vulnerabilities |
|
Major |
Relationships |
|
Minor |
None |
1004 |
Sensitive Cookie Without 'HttpOnly' Flag |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1007 |
Insufficient Visual Distinction of Homoglyphs Presented to User |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms, Description, Observed_Examples |
1021 |
Improper Restriction of Rendered UI Layers or Frames |
|
Major |
None |
|
Minor |
Observed_Examples |
1023 |
Incomplete Comparison with Missing Factors |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1024 |
Comparison of Incompatible Types |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1025 |
Comparison Using Wrong Factors |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1037 |
Processor Optimization Removal or Modification of Security-critical Code |
|
Major |
Applicable_Platforms, Maintenance_Notes |
|
Minor |
Observed_Examples |
1038 |
Insecure Automated Optimizations |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1039 |
Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1041 |
Use of Redundant Code |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Potential_Mitigations |
|
Minor |
None |
1059 |
Insufficient Technical Documentation |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1069 |
Empty Exception Block |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Potential_Mitigations |
|
Minor |
None |
1104 |
Use of Unmaintained Third Party Components |
|
Major |
References |
|
Minor |
None |
1116 |
Inaccurate Comments |
|
Major |
Applicable_Platforms, Demonstrative_Examples, Potential_Mitigations |
|
Minor |
None |
1173 |
Improper Use of Validation Framework |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1189 |
Improper Isolation of Shared Resources on System-on-a-Chip (SoC) |
|
Major |
Detection_Factors |
|
Minor |
Applicable_Platforms, Observed_Examples |
1190 |
DMA Device Enabled Too Early in Boot Phase |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1191 |
On-Chip Debug and Test Interface With Improper Access Control |
|
Major |
Description, Related_Attack_Patterns |
|
Minor |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples, References |
1192 |
System-on-Chip (SoC) Using Components without Unique, Immutable Identifiers |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1195 |
Manufacturing and Life Cycle Management Concerns |
|
Major |
Relationships |
|
Minor |
None |
1203 |
Peripherals, On-chip Fabric, and Interface/IO Problems |
|
Major |
Relationships |
|
Minor |
None |
1204 |
Generation of Weak Initialization Vector (IV) |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples, References |
1206 |
Power, Clock, Thermal, and Reset Concerns |
|
Major |
Name |
|
Minor |
None |
1208 |
Cross-Cutting Problems |
|
Major |
Relationships |
|
Minor |
None |
1209 |
Failure to Disable Reserved Bits |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1220 |
Insufficient Granularity of Access Control |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1221 |
Incorrect Register Defaults or Module Parameters |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1222 |
Insufficient Granularity of Address Regions Protected by Register Locks |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1223 |
Race Condition for Write-Once Attributes |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1224 |
Improper Restriction of Write-Once Bit Fields |
|
Major |
Demonstrative_Examples |
|
Minor |
None |
1229 |
Creation of Emergent Resource |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1230 |
Exposure of Sensitive Information Through Metadata |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1231 |
Improper Prevention of Lock Bit Modification |
|
Major |
None |
|
Minor |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples |
1232 |
Improper Lock Behavior After Power State Transition |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1233 |
Security-Sensitive Hardware Controls with Missing Lock Bit Protection |
|
Major |
None |
|
Minor |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples |
1234 |
Hardware Internal or Debug Modes Allow Override of Locks |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1235 |
Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1236 |
Improper Neutralization of Formula Elements in a CSV File |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1239 |
Improper Zeroization of Hardware Register |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1240 |
Use of a Cryptographic Primitive with a Risky Implementation |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1242 |
Inclusion of Undocumented Features or Chicken Bits |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1243 |
Sensitive Non-Volatile Information Not Protected During Debug |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms |
1244 |
Internal Asset Exposed to Unsafe Debug Access Level or State |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1245 |
Improper Finite State Machines (FSMs) in Hardware Logic |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1246 |
Improper Write Handling in Limited-write Non-Volatile Memories |
|
Major |
Demonstrative_Examples, Relationships, Research_Gaps |
|
Minor |
Applicable_Platforms |
1247 |
Improper Protection Against Voltage and Clock Glitches |
|
Major |
Demonstrative_Examples, References |
|
Minor |
Applicable_Platforms, Observed_Examples |
1248 |
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1249 |
Application-Level Admin Tool with Inconsistent View of Underlying Operating System |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1250 |
Improper Preservation of Consistency Between Independent Representations of Shared State |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1251 |
Mirrored Regions with Different Values |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1253 |
Incorrect Selection of Fuse Values |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1254 |
Incorrect Comparison Logic Granularity |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms, Observed_Examples |
1255 |
Comparison Logic is Vulnerable to Power Side-Channel Attacks |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms, Observed_Examples |
1256 |
Improper Restriction of Software Interfaces to Hardware Features |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1258 |
Exposure of Sensitive System Information Due to Uncleared Debug Information |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1259 |
Improper Restriction of Security Token Assignment |
|
Major |
None |
|
Minor |
Applicable_Platforms, Demonstrative_Examples |
1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1261 |
Improper Handling of Single Event Upsets |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1262 |
Improper Access Control for Register Interface |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1263 |
Improper Physical Access Control |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms |
1264 |
Hardware Logic with Insecure De-Synchronization between Control and Data Channels |
|
Major |
Maintenance_Notes |
|
Minor |
Applicable_Platforms, Observed_Examples |
1265 |
Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls |
|
Major |
References |
|
Minor |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples, Potential_Mitigations |
1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1267 |
Policy Uses Obsolete Encoding |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1268 |
Policy Privileges are not Assigned Consistently Between Control and Data Agents |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1269 |
Product Released in Non-Release Configuration |
|
Major |
None |
|
Minor |
Applicable_Platforms, Description, Observed_Examples |
1270 |
Generation of Incorrect Security Tokens |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1271 |
Uninitialized Value on Reset for Registers Holding Security Settings |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1272 |
Sensitive Information Uncleared Before Debug/Power State Transition |
|
Major |
Applicable_Platforms |
|
Minor |
Observed_Examples |
1273 |
Device Unlock Credential Sharing |
|
Major |
Description |
|
Minor |
Applicable_Platforms, Demonstrative_Examples |
1274 |
Improper Access Control for Volatile Memory Containing Boot Code |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1275 |
Sensitive Cookie with Improper SameSite Attribute |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1276 |
Hardware Child Block Incorrectly Connected to Parent System |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1277 |
Firmware Not Updateable |
|
Major |
Related_Attack_Patterns |
|
Minor |
Applicable_Platforms, Observed_Examples |
1278 |
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
|
Major |
Relationships |
|
Minor |
Applicable_Platforms |
1279 |
Cryptographic Operations are run Before Supporting Units are Ready |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1280 |
Access Control Check Implemented After Asset is Accessed |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1281 |
Sequence of Processor Instructions Leads to Unexpected Behavior |
|
Major |
Applicable_Platforms, Demonstrative_Examples |
|
Minor |
Description, Observed_Examples |
1282 |
Assumed-Immutable Data is Stored in Writable Memory |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1283 |
Mutable Attestation or Measurement Reporting Data |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1284 |
Improper Validation of Specified Quantity in Input |
|
Major |
Observed_Examples, Relationships |
|
Minor |
Applicable_Platforms |
1285 |
Improper Validation of Specified Index, Position, or Offset in Input |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1286 |
Improper Validation of Syntactic Correctness of Input |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
1287 |
Improper Validation of Specified Type of Input |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1288 |
Improper Validation of Consistency within Input |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1289 |
Improper Validation of Unsafe Equivalence in Input |
|
Major |
Observed_Examples |
|
Minor |
Applicable_Platforms |
1290 |
Incorrect Decoding of Security Identifiers |
|
Major |
Demonstrative_Examples, Related_Attack_Patterns |
|
Minor |
Applicable_Platforms, Description |
1291 |
Public Key Re-Use for Signing both Debug and Production Code |
|
Major |
None |
|
Minor |
Applicable_Platforms, Description |
1292 |
Incorrect Conversion of Security Identifiers |
|
Major |
Demonstrative_Examples, Related_Attack_Patterns |
|
Minor |
Applicable_Platforms |
1293 |
Missing Source Correlation of Multiple Independent Data |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1294 |
Insecure Security Identifier Mechanism |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1295 |
Debug Messages Revealing Unnecessary Information |
|
Major |
References |
|
Minor |
Applicable_Platforms, Demonstrative_Examples, Description, Observed_Examples |
1296 |
Incorrect Chaining or Granularity of Debug Components |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1297 |
Unprotected Confidential Information on Device is Accessible by OSAT Vendors |
|
Major |
None |
|
Minor |
Applicable_Platforms, Potential_Mitigations |
1299 |
Missing Protection Mechanism for Alternate Hardware Interface |
|
Major |
None |
|
Minor |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples |
1300 |
Improper Protection of Physical Side Channels |
|
Major |
References, Relationships |
|
Minor |
Applicable_Platforms, Observed_Examples |
1301 |
Insufficient or Incomplete Data Removal within Hardware Component |
|
Major |
None |
|
Minor |
Applicable_Platforms, References |
1302 |
Missing Security Identifier |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1303 |
Non-Transparent Sharing of Microarchitectural Resources |
|
Major |
Demonstrative_Examples, Maintenance_Notes |
|
Minor |
Applicable_Platforms, Description |
1304 |
Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation |
|
Major |
None |
|
Minor |
Applicable_Platforms, Potential_Mitigations |
1310 |
Missing Ability to Patch ROM Code |
|
Major |
References, Related_Attack_Patterns |
|
Minor |
Applicable_Platforms |
1311 |
Improper Translation of Security Attributes by Fabric Bridge |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms |
1312 |
Missing Protection for Mirrored Regions in On-Chip Fabric Firewall |
|
Major |
None |
|
Minor |
Applicable_Platforms, Demonstrative_Examples |
1313 |
Hardware Allows Activation of Test or Debug Logic at Runtime |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1314 |
Missing Write Protection for Parametric Data Values |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1315 |
Improper Setting of Bus Controlling Capability in Fabric End-point |
|
Major |
None |
|
Minor |
Applicable_Platforms, Demonstrative_Examples |
1316 |
Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges |
|
Major |
References |
|
Minor |
Applicable_Platforms, Demonstrative_Examples, Observed_Examples |
1317 |
Improper Access Control in Fabric Bridge |
|
Major |
Demonstrative_Examples, Description, Detection_Factors, Name, Potential_Mitigations |
|
Minor |
Applicable_Platforms, Observed_Examples |
1318 |
Missing Support for Security Features in On-chip Fabrics or Buses |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1319 |
Improper Protection against Electromagnetic Fault Injection (EM-FI) |
|
Major |
Potential_Mitigations, References, Relationships |
|
Minor |
Applicable_Platforms |
1320 |
Improper Protection for Outbound Error Messages and Alert Signals |
|
Major |
Name |
|
Minor |
Applicable_Platforms |
1321 |
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |
|
Major |
None |
|
Minor |
Observed_Examples |
1323 |
Improper Management of Sensitive Trace Data |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1324 |
Sensitive Information Accessible by Physical Probing of JTAG Interface |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1325 |
Improperly Controlled Sequential Memory Allocation |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1326 |
Missing Immutable Root of Trust in Hardware |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1327 |
Binding to an Unrestricted IP Address |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1328 |
Security Version Number Mutable to Older Versions |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1329 |
Reliance on Component That is Not Updateable |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1330 |
Remanent Data Readable after Memory Erase |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1331 |
Improper Isolation of Shared Resources in Network On Chip (NoC) |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1332 |
Improper Handling of Faults that Lead to Instruction Skips |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
1333 |
Inefficient Regular Expression Complexity |
|
Major |
Observed_Examples, Relationships |
|
Minor |
Applicable_Platforms |
1334 |
Unauthorized Error Injection Can Degrade Hardware Redundancy |
|
Major |
None |
|
Minor |
Applicable_Platforms |
1335 |
Incorrect Bitwise Shift of Integer |
|
Major |
Demonstrative_Examples, Observed_Examples |
|
Minor |
Applicable_Platforms |
1336 |
Improper Neutralization of Special Elements Used in a Template Engine |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |
1338 |
Improper Protections Against Hardware Overheating |
|
Major |
Related_Attack_Patterns |
|
Minor |
Applicable_Platforms |
1339 |
Insufficient Precision or Accuracy of a Real Number |
|
Major |
Demonstrative_Examples |
|
Minor |
Applicable_Platforms, Description, Observed_Examples |
1341 |
Multiple Releases of Same Resource or Handle |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
1342 |
Information Exposure through Microarchitectural State after Transient Execution |
|
Major |
Demonstrative_Examples, Maintenance_Notes, Related_Attack_Patterns |
|
Minor |
Applicable_Platforms, Observed_Examples |
1345 |
OWASP Top Ten 2021 Category A01:2021 - Broken Access Control |
|
Major |
References |
|
Minor |
None |
1346 |
OWASP Top Ten 2021 Category A02:2021 - Cryptographic Failures |
|
Major |
References |
|
Minor |
None |
1347 |
OWASP Top Ten 2021 Category A03:2021 - Injection |
|
Major |
References |
|
Minor |
None |
1348 |
OWASP Top Ten 2021 Category A04:2021 - Insecure Design |
|
Major |
References |
|
Minor |
None |
1349 |
OWASP Top Ten 2021 Category A05:2021 - Security Misconfiguration |
|
Major |
References |
|
Minor |
None |
1351 |
Improper Handling of Hardware Behavior in Exceptionally Cold Environments |
|
Major |
References, Related_Attack_Patterns |
|
Minor |
Applicable_Platforms |
1352 |
OWASP Top Ten 2021 Category A06:2021 - Vulnerable and Outdated Components |
|
Major |
References |
|
Minor |
None |
1353 |
OWASP Top Ten 2021 Category A07:2021 - Identification and Authentication Failures |
|
Major |
References |
|
Minor |
None |
1354 |
OWASP Top Ten 2021 Category A08:2021 - Software and Data Integrity Failures |
|
Major |
References |
|
Minor |
None |
1355 |
OWASP Top Ten 2021 Category A09:2021 - Security Logging and Monitoring Failures |
|
Major |
References |
|
Minor |
None |
1356 |
OWASP Top Ten 2021 Category A10:2021 - Server-Side Request Forgery (SSRF) |
|
Major |
References |
|
Minor |
None |
1357 |
Reliance on Uncontrolled Component |
|
Major |
References |
|
Minor |
Applicable_Platforms, Observed_Examples |
1384 |
Improper Handling of Physical or Environmental Conditions |
|
Major |
References |
|
Minor |
None |
1385 |
Missing Origin Validation in WebSockets |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples, References |
1386 |
Insecure Operation on Windows Junction / Mount Point |
|
Major |
None |
|
Minor |
Applicable_Platforms, Observed_Examples |