0% found this document useful (0 votes)
0 views

1000_abstraction_colors

The document lists various software and hardware vulnerabilities, including issues related to buffer overflows, improper handling of sensitive information, and cryptographic weaknesses. Each entry is identified by a unique code and describes specific security risks or errors that can lead to exploitation. The document serves as a comprehensive reference for identifying and addressing potential security flaws in systems.

Uploaded by

Marco Chiesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

1000_abstraction_colors

The document lists various software and hardware vulnerabilities, including issues related to buffer overflows, improper handling of sensitive information, and cryptographic weaknesses. Each entry is identified by a unique code and describes specific security risks or errors that can lead to exploitation. The document serves as a comprehensive reference for identifying and addressing potential security flaws in systems.

Uploaded by

Marco Chiesa
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

128 - Wrap-around Error

131 - Incorrect Calculation of Buffer Size 467 - Use of sizeof() on a Pointer Type

1335 - Incorrect Bitwise Shift of Integer

1339 - Insufficient Precision or Accuracy of a Real Number

135 - Incorrect Calculation of Multi-Byte String Length

190 - Integer Overflow or Wraparound 680 - Integer Overflow to Buffer Overflow

191 - Integer Underflow (Wrap or Wraparound)

193 - Off-by-one Error

1247 - Improper Protection Against Voltage and Clock Glitches

1261 - Improper Handling of Single Event Upsets

1384 - Improper Handling of Physical or Environmental Conditions 1332 - Improper Handling of Faults that Lead to Instruction Skips

1351 - Improper Handling of Hardware Behavior in Exceptionally Cold


Environments

252 - Unchecked Return Value 690 - Unchecked Return Value to NULL Pointer Dereference

273 - Improper Check for Dropped Privileges

274 - Improper Handling of Insufficient Privileges

280 - Improper Handling of Insufficient Permissions or Privileges

12 - ASP.NET Misconfiguration: Missing Custom Error Page

1223 - Race Condition for Write-Once Attributes

1298 - Hardware Logic Contains Race Conditions

1265 - Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls

1279 - Cryptographic Operations are run Before Supporting Units are Ready

1281 - Sequence of Processor Instructions Leads to Unexpected Behavior

362 - Concurrent Execution using Shared Resource w

1190 - DMA Device Enabled Too Early in Boot Phase

1193 - Power-On of Untrusted Execution Core Before Enabling Fabric Access


Control

1280 - Access Control Check Implemented After Asset is Accessed

180 - Incorrect Behavior Order: Validate Before Canonicalize

179 - Incorrect Behavior Order: Early Validation

181 - Incorrect Behavior Order: Validate Before Filter

248 - Uncaught Exception 600 - Uncaught Exception in Servlet

1322 - Use of Blocking Code in Single-threaded, Non-blocking Context

1039 - Automated Recognition Mechanism with Inadequate Detection or Handling


of Adversarial Input Perturbations

1248 - Semiconductor Defects in Hardware Logic with Security-Sensitive


Implications

1253 - Incorrect Selection of Fuse Values

313 - Cleartext Storage in a File or on Disk


1269 - Product Released in Non-Release Configuration

314 - Cleartext Storage in the Registry


1278 - Missing Protection Against Hardware Reverse Engineering Using
Integrated Circuit (IC) Imaging Techniques

315 - Cleartext Storage of Sensitive Information in a Cookie

1291 - Public Key Re-Use for Signing both Debug and Production Code

692 - Incomplete Denylist to Cross-Site Scripting 316 - Cleartext Storage of Sensitive Information in Memory

1318 - Missing Support for Security Features in On-chip Fabrics or Buses

312 - Cleartext Storage of Sensitive Information 317 - Cleartext Storage of Sensitive Information in GUI

1319 - Improper Protection against Electromagnetic Fault Injection (EM-FI)

318 - Cleartext Storage of Sensitive Information in Executable

1326 - Missing Immutable Root of Trust in Hardware

526 - Cleartext Storage of Sensitive Information in an Environment Variable

1338 - Improper Protections Against Hardware Overheating

319 - Cleartext Transmission of Sensitive Information 5- J2EE Misconfiguration: Data Transmission Without Encryption

182 - Collapse of Data into Unsafe Value

1240 - Use of a Cryptographic Primitive with a Risky Implementation 614 - Sensitive Cookie in HTTPS Session Without ’Secure’ Attribute

184 - Incomplete List of Disallowed Inputs 759 - Use of a One-Way Hash without a Salt

328 - Use of Weak Hash 916 - Use of Password Hash With Insufficient Computational Effort

311 - Missing Encryption of Sensitive Data 760 - Use of a One-Way Hash with a Predictable Salt

780 - Use of RSA Algorithm without OAEP 329 - Generation of Predictable IV with CBC Mode

326 - Inadequate Encryption Strength

1204 - Generation of Weak Initialization Vector (IV) 332 - Insufficient Entropy in PRNG

327 - Use of a Broken or Risky Cryptographic Algorithm

1241 - Use of Predictable Algorithm in Random Number Generator 333 - Improper Handling of Insufficient Entropy in TRNG

331 - Insufficient Entropy 6- J2EE Misconfiguration: Insufficient Session-ID Length

330 - Use of Insufficiently Random Values 334 - Small Space of Random Values 336 - Same Seed in Pseudo-Random Number Generator (PRNG)

335 - Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) 337 - Predictable Seed in Pseudo-Random Number Generator (PRNG)

338 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) 339 - Small Seed Space in PRNG

340 - Generation of Predictable Numbers or Identifiers 341 - Predictable from Observable State

344 - Use of Invariant Value in Dynamically Changing Context 342 - Predictable Exact Value from Previous Values

1293 - Missing Source Correlation of Multiple Independent Data 343 - Predictable Value Range from Previous Values

346 - Origin Validation Error 323 - Reusing a Nonce, Key Pair in Encryption

347 - Improper Verification of Cryptographic Signature 1385 - Missing Origin Validation in WebSockets

348 - Use of Less Trusted Source

349 - Acceptance of Extraneous Untrusted Data With Trusted Data

345 - Insufficient Verification of Data Authenticity 351 - Insufficient Type Distinction

357 - Insufficient UI Warning of Dangerous Operations 352 - Cross-Site Request Forgery (CSRF)

353 - Missing Support for Integrity Check

354 - Improper Validation of Integrity Check Value

360 - Trust of System Event Data

494 - Download of Code Without Integrity Check

616 - Incomplete Identification of Uploaded File Variables (PHP)

646 - Reliance on File Name or Extension of Externally-Supplied File

649 - Reliance on Obfuscation or Encryption of Security-Relevant Inputs


without Integrity Checking

924 - Improper Enforcement of Message Integrity During Transmission in a


Communication Channel

450 - Multiple Interpretations of UI Input

1037 - Processor Optimization Removal or Modification of Security-critical


Code

733 - Compiler Optimization Removal or Modification of Security-critical


1038 - Insecure Automated Optimizations 14 - Compiler Removal of Code to Clear Buffers
Code

115 - Misinterpretation of Input

187 - Partial String Comparison

1023 - Incomplete Comparison with Missing Factors 478 - Missing Default Case in Multiple Condition Expression

1024 - Comparison of Incompatible Types 839 - Numeric Range Comparison Without Minimum Check

1025 - Comparison Using Wrong Factors 486 - Comparison of Classes by Name

1077 - Floating Point Comparison with Incorrect Operator 595 - Comparison of Object References Instead of Object Contents 597 - Use of Wrong Operator in String Comparison

183 - Permissive List of Allowed Inputs

186 - Overly Restrictive Regular Expression

185 - Incorrect Regular Expression

625 - Permissive Regular Expression 777 - Regular Expression without Anchors

120 - Buffer Copy without Checking Size of Input (’Classic Buffer Overflow’)

125 - Out-of-bounds Read

466 - Return of Pointer Value Outside of Expected Range 124 - Buffer Underwrite (’Buffer Underflow’)

786 - Access of Memory Location Before Start of Buffer 127 - Buffer Under-read

787 - Out-of-bounds Write 123 - Write-what-where Condition

788 - Access of Memory Location After End of Buffer 121 - Stack-based Buffer Overflow
119 - Improper Restriction of Operations within the Bounds of a Memory
Buffer
805 - Buffer Access with Incorrect Length Value 122 - Heap-based Buffer Overflow

822 - Untrusted Pointer Dereference 126 - Buffer Over-read

118 - Incorrect Access of Indexable Resource (’Range Error’) 823 - Use of Out-of-range Pointer Offset 806 - Buffer Access Using Size of Source Buffer

824 - Access of Uninitialized Pointer

415 - Double Free

825 - Expired Pointer Dereference

416 - Use After Free

385 - Covert Timing Channel

514 - Covert Channel 515 - Covert Storage Channel

1229 - Creation of Emergent Resource


1249 - Application-Level Admin Tool with Inconsistent View of Underlying 778 - Insufficient Logging
Operating System

1250 - Improper Preservation of Consistency Between Independent 1050 - Excessive Platform Resource Consumption within a Loop
Representations of Shared State 1251 - Mirrored Regions with Different Values

1072 - Data Resource Access without Use of Connection Pooling


222 - Truncation of Security-relevant Information

1073 - Non-SQL Invokable Control Element with Excessive Number of Data


223 - Omission of Security-relevant Information Resource Accesses

221 - Information Loss or Omission 224 - Obscured Security-relevant Information by Alternate Name 1084 - Invokable Control Element with Excessive File or Data Access
Operations

1042 - Static Member Data Element outside of a Singleton Class Element


356 - Product UI does not Warn User of Unsafe Actions
1089 - Large Data Table with Excessive Number of Indices

1046 - Creation of Immutable Text Using String Concatenation


1235 - Incorrect Use of Autoboxing and Unboxing for Performance Critical
Operations 1094 - Excessive Index Range Scan for a Data Resource

1049 - Excessive Data Query Operations in a Large Data Table

1246 - Improper Write Handling in Limited-write Non-Volatile Memories 1176 - Inefficient CPU Computation

1063 - Creation of Class Instance within a Static Code Block

1067 - Excessive Execution of Sequential Searches of Data Resource

1333 - Inefficient Regular Expression Complexity

1325 - Improperly Controlled Sequential Memory Allocation

1239 - Improper Zeroization of Hardware Register

1272 - Sensitive Information Uncleared Before Debug/Power State Transition

226 - Sensitive Information in Resource Not Removed Before Reuse 1301 - Insufficient or Incomplete Data Removal within Hardware Component 1330 - Remanent Data Readable after Memory Erase

1266 - Improper Scrubbing of Sensitive Data from Decommissioned Device 1342 - Information Exposure through Microarchitectural State after Transient
Execution

244 - Improper Clearing of Heap Memory Before Release (’Heap Inspection’)

1091 - Use of Object without Invoking Destructor Method

1021 - Improper Restriction of Rendered UI Layers or Frames

1232 - Improper Lock Behavior After Power State Transition

1234 - Hardware Internal or Debug Modes Allow Override of Locks

1058 - Invokable Control Element in Multi-Thread Context with non-Final


Static Storable or Member Element

1096 - Singleton Class Instance Creation without Proper Locking or


Synchronization

1088 - Synchronous Access of Remote Resource without Timeout

1264 - Hardware Logic with Insecure De-Synchronization between Control and


Data Channels

1051 - Initialization with Hard-Coded Network Resource Configuration Data

1052 - Excessive Use of Hard-Coded Literals in Initialization

1188 - Initialization of a Resource with an Insecure Default 453 - Insecure Default Variable Initialization

1419 - Incorrect Initialization of Resource

1221 - Incorrect Register Defaults or Module Parameters

454 - External Initialization of Trusted Variables or Data Stores

1271 - Uninitialized Value on Reset for Registers Holding Security Settings

324 - Use of a Key Past its Expiration Date

598 - Use of GET Request Method With Sensitive Query Strings

1273 - Device Unlock Credential Sharing 1300 - Improper Protection of Physical Side Channels 1255 - Comparison Logic is Vulnerable to Power Side-Channel Attacks

1295 - Debug Messages Revealing Unnecessary Information 204 - Observable Response Discrepancy 206 - Observable Internal Behavioral Discrepancy

201 - Insertion of Sensitive Information Into Sent Data 205 - Observable Behavioral Discrepancy 207 - Observable Behavioral Discrepancy With Equivalent Products

203 - Observable Discrepancy 208 - Observable Timing Discrepancy 1254 - Incorrect Comparison Logic Granularity

1282 - Assumed-Immutable Data is Stored in Writable Memory


209 - Generation of Error Message Containing Sensitive Information 210 - Self-generated Error Message Containing Sensitive Information 535 - Exposure of Information Through Shell Error Message

1327 - Binding to an Unrestricted IP Address


213 - Exposure of Sensitive Information Due to Incompatible Policies 211 - Externally-Generated Error Message Containing Sensitive Information 536 - Servlet Runtime Error Message Containing Sensitive Information

134 - Use of Externally-Controlled Format String


215 - Insertion of Sensitive Information Into Debugging Code 550 - Server-generated Error Message Containing Sensitive Information 537 - Java Runtime Error Message Containing Sensitive Information

200 - Exposure of Sensitive Information to an Unauthorized Actor


359 - Exposure of Private Personal Information to an Unauthorized Actor
214 - Invocation of Process Using Visible Sensitive Information

497 - Exposure of Sensitive System Information to an Unauthorized Control


Sphere 548 - Exposure of Information Through Directory Listing

532 - Insertion of Sensitive Information into Log File


538 - Insertion of Sensitive Information into Externally-Accessible File or
Directory

540 - Inclusion of Sensitive Information in Source Code

651 - Exposure of WSDL File Containing Sensitive Information

219 - Storage of File with Sensitive Data Under Web Root 433 - Unparsed Raw Web Content Delivery

220 - Storage of File With Sensitive Data Under FTP Root

15 - External Control of System or Configuration Setting

114 - Process Control

1421 - Exposure of Sensitive Information in Shared Microarchitectural


Structures during Transient Execution

1420 - Exposure of Sensitive Information during Transient Execution 1422 - Exposure of Sensitive Information caused by Incorrect Data Forwarding
during Transient Execution

212 - Improper Removal of Sensitive Information Before Storage or Transfer


1423 - Exposure of Sensitive Information caused by Shared Microarchitectural
Predictor State that Influences Transient Execution
243 - Creation of chroot Jail Without Changing Working Directory

1258 - Exposure of Sensitive System Information Due to Uncleared Debug


Information
24 - Path Traversal: ’../filedir’

25 - Path Traversal: ’/../filedir’

26 - Path Traversal: ’/dir/../filename’


1389 - Incorrect Parsing of Numbers with Different Radices

192 - Integer Coercion Error 27 - Path Traversal: ’dir/../../filename’

194 - Unexpected Sign Extension 28 - Path Traversal: ’..\filedir’

195 - Signed to Unsigned Conversion Error 29 - Path Traversal: ’\..\filename’

196 - Unsigned to Signed Conversion Error 30 - Path Traversal: ’\dir\..\filename’

197 - Numeric Truncation Error 31 - Path Traversal: ’dir\..\..\filename’

23 - Relative Path Traversal 32 - Path Traversal: ’...’ (Triple Dot)

33 - Path Traversal: ’....’ (Multiple Dot)

34 - Path Traversal: ’....//’

35 - Path Traversal: ’.../...//’

178 - Improper Handling of Case Sensitivity 36 - Absolute Path Traversal 37 - Path Traversal: ’/absolute/pathname/here’

22 - Improper Limitation of a Pathname to a Restricted Directory (’Path 38 - Path Traversal: ’\absolute\pathname\here’


Traversal’)

39 - Path Traversal: ’C:dirname’

40 - Path Traversal: ’\UNC\share\name\’ (Windows UNC Share)

1386 - Insecure Operation on Windows Junction / Mount Point

1321 - Improperly Controlled Modification of Object Prototype Attributes


(’Prototype Pollution’)

117 - Improper Output Neutralization for Logs 141 - Improper Neutralization of Parameter/Argument Delimiters

644 - Improper Neutralization of HTTP Headers for Scripting Syntax 142 - Improper Neutralization of Value Delimiters

116 - Improper Encoding or Escaping of Output

838 - Inappropriate Encoding for Output Context 143 - Improper Neutralization of Record Delimiters

140 - Improper Neutralization of Delimiters 144 - Improper Neutralization of Line Delimiters

147 - Improper Neutralization of Input Terminators 145 - Improper Neutralization of Section Delimiters

148 - Improper Neutralization of Input Leaders 146 - Improper Neutralization of Expression/Command Delimiters

149 - Improper Neutralization of Quoting Syntax 626 - Null Byte Interaction Error (Poison Null Byte)

150 - Improper Neutralization of Escape, Meta, or Control Sequences

151 - Improper Neutralization of Comment Delimiters

152 - Improper Neutralization of Macro Symbols

153 - Improper Neutralization of Substitution Characters

154 - Improper Neutralization of Variable Name Delimiters

155 - Improper Neutralization of Wildcards or Matching Symbols

138 - Improper Neutralization of Special Elements

156 - Improper Neutralization of Whitespace

157 - Failure to Sanitize Paired Delimiters 166 - Improper Handling of Missing Special Element

158 - Improper Neutralization of Null Byte or NUL Character 167 - Improper Handling of Additional Special Element

159 - Improper Handling of Invalid Use of Special Elements 168 - Improper Handling of Inconsistent Special Elements

160 - Improper Neutralization of Leading Special Elements 161 - Improper Neutralization of Multiple Leading Special Elements

162 - Improper Neutralization of Trailing Special Elements 163 - Improper Neutralization of Multiple Trailing Special Elements

164 - Improper Neutralization of Internal Special Elements 165 - Improper Neutralization of Multiple Internal Special Elements

464 - Addition of Data Structure Sentinel

791 - Incomplete Filtering of Special Elements


790 - Improper Filtering of Special Elements

105 - Struts: Form Field Without Validator


173 - Improper Handling of Alternate Encoding

1426 - Improper Validation of Generative AI Output


106 - Struts: Plug-in Framework not in Use
175 - Improper Handling of Mixed Encoding

170 - Improper Null Termination 108 - Struts: Unvalidated Action Form


176 - Improper Handling of Unicode Encoding

172 - Encoding Error


109 - Struts: Validator Turned Off
177 - Improper Handling of URL Encoding (Hex Encoding)

1174 - ASP.NET Misconfiguration: Improper Model Validation


1173 - Improper Use of Validation Framework

554 - ASP.NET Misconfiguration: Not Using Input Validation Framework

1284 - Improper Validation of Specified Quantity in Input


606 - Unchecked Input for Loop Condition

1285 - Improper Validation of Specified Index, Position, or Offset in Input

129 - Improper Validation of Array Index

20 - Improper Input Validation 1286 - Improper Validation of Syntactic Correctness of Input


781 - Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control
Code
1287 - Improper Validation of Specified Type of Input

112 - Missing XML Validation


1288 - Improper Validation of Consistency within Input

230 - Improper Handling of Missing Values


1289 - Improper Validation of Unsafe Equivalence in Input

231 - Improper Handling of Extra Values


622 - Improper Validation of Function Hook Arguments

232 - Improper Handling of Undefined Values


229 - Improper Handling of Values

228 - Improper Handling of Syntactically Invalid Structure 234 - Failure to Handle Missing Parameter

233 - Improper Handling of Parameters


235 - Improper Handling of Extra Parameters

236 - Improper Handling of Undefined Parameters

237 - Improper Handling of Structural Elements 238 - Improper Handling of Incomplete Structural Elements

241 - Improper Handling of Unexpected Data Type 239 - Failure to Handle Incomplete Element

240 - Improper Handling of Inconsistent Structural Elements 130 - Improper Handling of Length Parameter Inconsistency

1427 - Improper Neutralization of Input Used for LLM Prompting

1236 - Improper Neutralization of Formula Elements in a CSV File

113 - Improper Neutralization of CRLF Sequences in HTTP Headers (’HTTP


Request/Response Splitting’)

1336 - Improper Neutralization of Special Elements Used in a Template Engine

102 - Struts: Duplicate Validation Forms

1053 - Missing Documentation for Design

1041 - Use of Redundant Code


1110 - Incomplete Design Documentation

1044 - Architecture with Number of Horizontal Layers Outside of Expected


Range 1111 - Incomplete I/O Documentation

1048 - Invokable Control Element with Large Number of Outward Calls 1112 - Incomplete Documentation of Program Execution

1059 - Insufficient Technical Documentation 1118 - Insufficient Documentation of Error Handling Techniques

1054 - Invocation of a Control Element at an Unnecessarily Deep Horizontal


Layer

1057 - Data Access Operations Outside of Expected Data Manager Component

1062 - Parent Class with References to Child Class

1085 - Invokable Control Element with Excessive Volume of Commented-out Code


1061 - Insufficient Encapsulation 1083 - Data Access from Outside Expected Data Manager Component

1099 - Inconsistent Naming Conventions for Identifiers


1090 - Method Containing Access of a Member Element from Another Class

1106 - Insufficient Use of Symbolic Constants


1100 - Insufficient Isolation of System-Dependent Functions

1107 - Insufficient Isolation of Symbolic Constant Definitions


1045 - Parent Class with a Virtual Destructor and a Child Class without a
Virtual Destructor

1109 - Use of Same Variable for Multiple Purposes

1070 - Serializable Data Element Containing non-Serializable Item Elements

1113 - Inappropriate Comment Style

1078 - Inappropriate Source Code Style or Formatting

1114 - Inappropriate Whitespace Style

1079 - Parent Class without Virtual Destructor Method

1115 - Source Code Element without Standard Prologue

1082 - Class Instance Self Destruction Control Element


1065 - Runtime Resource Management Control Element in a Component Built to
Run on Application Servers 1116 - Inaccurate Comments

1087 - Class with Virtual Method without a Virtual Destructor


1066 - Missing Serialization Control Element 1117 - Callable with Insufficient Behavioral Summary

1097 - Persistent Storable Data Element without Associated Comparison


Control Element
1068 - Inconsistency Between Implementation and Documented Design 546 - Suspicious Comment

1098 - Data Element containing Pointer Item without Proper Copy Control
1076 - Insufficient Adherence to Expected Conventions Element 547 - Use of Hard-coded, Security-relevant Constants

1108 - Excessive Reliance on Global Variables

586 - Explicit Call to Finalize()

594 - J2EE Framework: Saving Unserializable Objects to Disk

1043 - Data Element Aggregating an Excessively Large Number of Non-Primitive


Elements

1055 - Multiple Inheritance from Concrete Classes

1092 - Use of Same Invokable Control Element in Multiple Architectural Layers

1074 - Class with Excessively Deep Inheritance

1093 - Excessively Complex Data Representation

1086 - Class with Excessive Number of Child Classes

1047 - Modules with Circular Dependencies

1056 - Invokable Control Element with Variadic Parameters

1060 - Excessive Number of Inefficient Server-Side Data Accesses

1064 - Invokable Control Element with Signature Containing an Excessive


Number of Parameters

1075 - Unconditional Control Flow Transfer outside of Switch Block

1080 - Source Code File with Excessive Number of Lines of Code

1101 - Reliance on Runtime Component in Generated Code 1095 - Loop Condition Value Update within the Loop

1120 - Excessive Code Complexity 1119 - Excessive Use of Unconditional Branching

1121 - Excessive McCabe Cyclomatic Complexity

1122 - Excessive Halstead Complexity

1123 - Excessive Use of Self-Modifying Code

1126 - Declaration of Variable with Unnecessarily Wide Scope 1124 - Excessively Deep Nesting

1127 - Compilation with Insufficient Warnings or Errors 1125 - Excessive Attack Surface

1164 - Irrelevant Code 107 - Struts: Unused Validation Form

1069 - Empty Exception Block

1177 - Use of Prohibited Code 1071 - Empty Code Block

585 - Empty Synchronized Block

1209 - Failure to Disable Reserved Bits 110 - Struts: Validator Without Form Field

1357 - Reliance on Insufficiently Trustworthy Component 561 - Dead Code

563 - Assignment to Variable without Use

242 - Use of Inherently Dangerous Function

676 - Use of Potentially Dangerous Function 785 - Use of Path Manipulation Function without Maximum-sized Buffer

1104 - Use of Unmaintained Third Party Components

1277 - Firmware Not Updateable

1329 - Reliance on Component That is Not Updateable

1310 - Missing Ability to Patch ROM Code

11 - ASP.NET Misconfiguration: Creating Debug Binary

103 - Struts: Incomplete validate() Method Definition

104 - Struts: Form Bean Does Not Extend Validation Class

253 - Incorrect Check of Function Return Value

325 - Missing Cryptographic Step

358 - Improperly Implemented Security Check for Standard

1341 - Multiple Releases of Same Resource or Handle

174 - Double Decoding of the Same Data

111 - Direct Use of Unsafe JNI

245 - J2EE Bad Practices: Direct Management of Connections

1192 - Improper Identifier for IP Block used in System-On-Chip (SOC)


246 - J2EE Bad Practices: Direct Use of Sockets

1395 - Dependency on Vulnerable Third-Party Component

1189 - Improper Isolation of Shared Resources on System-on-a-Chip (SoC) 1303 - Non-Transparent Sharing of Microarchitectural Resources

1331 - Improper Isolation of Shared Resources in Network On Chip (NoC)

1245 - Improper Finite State Machines (FSMs) in Hardware Logic

1007 - Insufficient Visual Distinction of Homoglyphs Presented to User

1102 - Reliance on Machine-Dependent Data Representation

1103 - Use of Platform-Dependent Third Party Components

1105 - Insufficient Encapsulation of Machine-Dependent Functionality 188 - Reliance on Data/Memory Layout 198 - Use of Incorrect Byte Ordering

1191 - On-Chip Debug and Test Interface With Improper Access Control

1222 - Insufficient Granularity of Address Regions Protected by Register


1220 - Insufficient Granularity of Access Control Locks

1224 - Improper Restriction of Write-Once Bit Fields

1231 - Improper Prevention of Lock Bit Modification

1233 - Security-Sensitive Hardware Controls with Missing Lock Bit Protection

1242 - Inclusion of Undocumented Features or Chicken Bits

1252 - CPU Hardware Not Configured to Support Exclusivity of Write and


Execute Operations

1257 - Improper Access Control Applied to Mirrored or Aliased Memory Regions

1259 - Improper Restriction of Security Token Assignment

1260 - Improper Handling of Overlap Between Protected Memory Ranges

1262 - Improper Access Control for Register Interface

1263 - Improper Physical Access Control 1243 - Sensitive Non-Volatile Information Not Protected During Debug

1267 - Policy Uses Obsolete Encoding

1268 - Policy Privileges are not Assigned Consistently Between Control and
Data Agents

1270 - Generation of Incorrect Security Tokens

1274 - Improper Access Control for Volatile Memory Containing Boot Code

1276 - Hardware Child Block Incorrectly Connected to Parent System

1283 - Mutable Attestation or Measurement Reporting Data

1290 - Incorrect Decoding of Security Identifiers

284 - Improper Access Control 1292 - Incorrect Conversion of Security Identifiers

1302 - Missing Source Identifier in Entity Transactions on a System-On-Chip


1294 - Insecure Security Identifier Mechanism
(SOC)

1296 - Incorrect Chaining or Granularity of Debug Components

1304 - Improperly Preserved Integrity of Hardware Configuration State During


a Power Save/Restore Operation

1311 - Improper Translation of Security Attributes by Fabric Bridge

1312 - Missing Protection for Mirrored Regions in On-Chip Fabric Firewall

1313 - Hardware Allows Activation of Test or Debug Logic at Runtime


1022 - Use of Web Link to Untrusted Target with window.opener Access

1315 - Improper Setting of Bus Controlling Capability in Fabric End-point


250 - Execution with Unnecessary Privileges 520 - .NET Misconfiguration: Use of Impersonation

1316 - Fabric-Address Map Allows Programming of Unwarranted Overlaps of


Protected and Unprotected Ranges 266 - Incorrect Privilege Assignment 556 - ASP.NET Misconfiguration: Use of Identity Impersonation

1317 - Improper Access Control in Fabric Bridge 267 - Privilege Defined With Unsafe Actions 9- J2EE Misconfiguration: Weak Access Permissions for EJB Methods

1320 - Improper Protection for Outbound Error Messages and Alert Signals 268 - Privilege Chaining 623 - Unsafe ActiveX Control Marked Safe For Scripting

1323 - Improper Management of Sensitive Trace Data 270 - Privilege Context Switching Error

272 - Least Privilege Violation


1334 - Unauthorized Error Injection Can Degrade Hardware Redundancy 271 - Privilege Dropping / Lowering Errors

202 - Exposure of Sensitive Information Through Data Queries


269 - Improper Privilege Management 648 - Incorrect Use of Privileged APIs

612 - Improper Authorization of Index Containing Sensitive Information


282 - Improper Ownership Management 283 - Unverified Ownership

1004 - Sensitive Cookie Without ’HttpOnly’ Flag


708 - Incorrect Ownership Assignment

276 - Incorrect Default Permissions


1230 - Exposure of Sensitive Information Through Metadata

277 - Insecure Inherited Permissions


1256 - Improper Restriction of Software Interfaces to Hardware Features

278 - Insecure Preserved Inherited Permissions


1297 - Unprotected Confidential Information on Device is Accessible by OSAT
Vendors
279 - Incorrect Execution-Assigned Permissions

1328 - Security Version Number Mutable to Older Versions


281 - Improper Preservation of Permissions
285 - Improper Authorization

732 - Incorrect Permission Assignment for Critical Resource


766 - Critical Data Element Declared Public

1314 - Missing Write Protection for Parametric Data Values

862 - Missing Authorization

425 - Direct Request (’Forced Browsing’)

939 - Improper Authorization in Handler for Custom URL Scheme

286 - Incorrect User Management


1244 - Internal Asset Exposed to Unsafe Debug Access Level or State

863 - Incorrect Authorization


551 - Incorrect Behavior Order: Authorization Before Parsing and
Canonicalization
926 - Improper Export of Android Application Components

639 - Authorization Bypass Through User-Controlled Key


927 - Use of Implicit Intent for Sensitive Communication

647 - Use of Non-Canonical URL Paths for Authorization Decisions


842 - Placement of User into Incorrect Group

804 - Guessable CAPTCHA

1393 - Use of Default Password

942 - Permissive Cross-domain Policy with Untrusted Domains 1392 - Use of Default Credentials

1394 - Use of Default Cryptographic Key

1391 - Use of Weak Credentials 521 - Weak Password Requirements

259 - Use of Hard-coded Password


262 - Not Using Password Aging 798 - Use of Hard-coded Credentials

321 - Use of Hard-coded Cryptographic Key


263 - Password Aging with Long Expiration

289 - Authentication Bypass by Alternate Name 291 - Reliance on IP Address for Authentication

290 - Authentication Bypass by Spoofing 293 - Using Referer Field for Authentication

294 - Authentication Bypass by Capture-replay 350 - Reliance on Reverse DNS Resolution for a Security-Critical Action

301 - Reflection Attack in an Authentication Protocol

302 - Authentication Bypass by Assumed-Immutable Data

303 - Incorrect Implementation of Authentication Algorithm 304 - Missing Critical Step in Authentication

1390 - Weak Authentication 305 - Authentication Bypass by Primary Weakness

307 - Improper Restriction of Excessive Authentication Attempts

256 - Plaintext Storage of a Password

308 - Use of Single-factor Authentication

257 - Storing Passwords in a Recoverable Format 13 - ASP.NET Misconfiguration: Password in Configuration File

309 - Use of Password System for Primary Authentication

260 - Password in Configuration File 258 - Empty Password in Configuration File

522 - Insufficiently Protected Credentials

261 - Weak Encoding for Password 555 - J2EE Misconfiguration: Plaintext Password in Configuration File

603 - Use of Client-Side Authentication

523 - Unprotected Transport of Credentials

620 - Unverified Password Change

549 - Missing Password Field Masking

640 - Weak Password Recovery Mechanism for Forgotten Password

836 - Use of Password Hash Instead of Password for Authentication

296 - Improper Following of a Certificate’s Chain of Trust

287 - Improper Authentication 295 - Improper Certificate Validation

298 - Improper Validation of Certificate Expiration

306 - Missing Authentication for Critical Function

299 - Improper Check for Certificate Revocation 370 - Missing Check for Certificate Revocation after Initial Check

645 - Overly Restrictive Account Lockout Mechanism

599 - Missing Validation of OpenSSL Certificate

749 - Exposed Dangerous Method or Function 618 - Exposed Unsafe ActiveX Method

288 - Authentication Bypass Using an Alternate Path or Channel

782 - Exposed IOCTL with Insufficient Access Control

322 - Key Exchange without Entity Authentication

1275 - Sensitive Cookie with Improper SameSite Attribute

297 - Improper Validation of Certificate with Host Mismatch

300 - Channel Accessible by Non-Endpoint

923 - Improper Restriction of Communication Channel to Intended Endpoints 1299 - Missing Protection Mechanism for Alternate Hardware Interface

419 - Unprotected Primary Channel

420 - Unprotected Alternate Channel

940 - Improper Verification of Source of a Communication Channel

941 - Incorrectly Specified Destination in a Communication Channel

You might also like