1000_abstraction_colors
1000_abstraction_colors
131 - Incorrect Calculation of Buffer Size 467 - Use of sizeof() on a Pointer Type
1384 - Improper Handling of Physical or Environmental Conditions 1332 - Improper Handling of Faults that Lead to Instruction Skips
252 - Unchecked Return Value 690 - Unchecked Return Value to NULL Pointer Dereference
1279 - Cryptographic Operations are run Before Supporting Units are Ready
1291 - Public Key Re-Use for Signing both Debug and Production Code
692 - Incomplete Denylist to Cross-Site Scripting 316 - Cleartext Storage of Sensitive Information in Memory
312 - Cleartext Storage of Sensitive Information 317 - Cleartext Storage of Sensitive Information in GUI
319 - Cleartext Transmission of Sensitive Information 5- J2EE Misconfiguration: Data Transmission Without Encryption
1240 - Use of a Cryptographic Primitive with a Risky Implementation 614 - Sensitive Cookie in HTTPS Session Without ’Secure’ Attribute
184 - Incomplete List of Disallowed Inputs 759 - Use of a One-Way Hash without a Salt
328 - Use of Weak Hash 916 - Use of Password Hash With Insufficient Computational Effort
311 - Missing Encryption of Sensitive Data 760 - Use of a One-Way Hash with a Predictable Salt
780 - Use of RSA Algorithm without OAEP 329 - Generation of Predictable IV with CBC Mode
1204 - Generation of Weak Initialization Vector (IV) 332 - Insufficient Entropy in PRNG
1241 - Use of Predictable Algorithm in Random Number Generator 333 - Improper Handling of Insufficient Entropy in TRNG
330 - Use of Insufficiently Random Values 334 - Small Space of Random Values 336 - Same Seed in Pseudo-Random Number Generator (PRNG)
335 - Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) 337 - Predictable Seed in Pseudo-Random Number Generator (PRNG)
338 - Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) 339 - Small Seed Space in PRNG
340 - Generation of Predictable Numbers or Identifiers 341 - Predictable from Observable State
344 - Use of Invariant Value in Dynamically Changing Context 342 - Predictable Exact Value from Previous Values
1293 - Missing Source Correlation of Multiple Independent Data 343 - Predictable Value Range from Previous Values
346 - Origin Validation Error 323 - Reusing a Nonce, Key Pair in Encryption
347 - Improper Verification of Cryptographic Signature 1385 - Missing Origin Validation in WebSockets
357 - Insufficient UI Warning of Dangerous Operations 352 - Cross-Site Request Forgery (CSRF)
1023 - Incomplete Comparison with Missing Factors 478 - Missing Default Case in Multiple Condition Expression
1024 - Comparison of Incompatible Types 839 - Numeric Range Comparison Without Minimum Check
1077 - Floating Point Comparison with Incorrect Operator 595 - Comparison of Object References Instead of Object Contents 597 - Use of Wrong Operator in String Comparison
120 - Buffer Copy without Checking Size of Input (’Classic Buffer Overflow’)
466 - Return of Pointer Value Outside of Expected Range 124 - Buffer Underwrite (’Buffer Underflow’)
786 - Access of Memory Location Before Start of Buffer 127 - Buffer Under-read
788 - Access of Memory Location After End of Buffer 121 - Stack-based Buffer Overflow
119 - Improper Restriction of Operations within the Bounds of a Memory
Buffer
805 - Buffer Access with Incorrect Length Value 122 - Heap-based Buffer Overflow
118 - Incorrect Access of Indexable Resource (’Range Error’) 823 - Use of Out-of-range Pointer Offset 806 - Buffer Access Using Size of Source Buffer
1250 - Improper Preservation of Consistency Between Independent 1050 - Excessive Platform Resource Consumption within a Loop
Representations of Shared State 1251 - Mirrored Regions with Different Values
221 - Information Loss or Omission 224 - Obscured Security-relevant Information by Alternate Name 1084 - Invokable Control Element with Excessive File or Data Access
Operations
1246 - Improper Write Handling in Limited-write Non-Volatile Memories 1176 - Inefficient CPU Computation
226 - Sensitive Information in Resource Not Removed Before Reuse 1301 - Insufficient or Incomplete Data Removal within Hardware Component 1330 - Remanent Data Readable after Memory Erase
1266 - Improper Scrubbing of Sensitive Data from Decommissioned Device 1342 - Information Exposure through Microarchitectural State after Transient
Execution
1188 - Initialization of a Resource with an Insecure Default 453 - Insecure Default Variable Initialization
1273 - Device Unlock Credential Sharing 1300 - Improper Protection of Physical Side Channels 1255 - Comparison Logic is Vulnerable to Power Side-Channel Attacks
1295 - Debug Messages Revealing Unnecessary Information 204 - Observable Response Discrepancy 206 - Observable Internal Behavioral Discrepancy
201 - Insertion of Sensitive Information Into Sent Data 205 - Observable Behavioral Discrepancy 207 - Observable Behavioral Discrepancy With Equivalent Products
203 - Observable Discrepancy 208 - Observable Timing Discrepancy 1254 - Incorrect Comparison Logic Granularity
219 - Storage of File with Sensitive Data Under Web Root 433 - Unparsed Raw Web Content Delivery
1420 - Exposure of Sensitive Information during Transient Execution 1422 - Exposure of Sensitive Information caused by Incorrect Data Forwarding
during Transient Execution
178 - Improper Handling of Case Sensitivity 36 - Absolute Path Traversal 37 - Path Traversal: ’/absolute/pathname/here’
117 - Improper Output Neutralization for Logs 141 - Improper Neutralization of Parameter/Argument Delimiters
644 - Improper Neutralization of HTTP Headers for Scripting Syntax 142 - Improper Neutralization of Value Delimiters
838 - Inappropriate Encoding for Output Context 143 - Improper Neutralization of Record Delimiters
147 - Improper Neutralization of Input Terminators 145 - Improper Neutralization of Section Delimiters
148 - Improper Neutralization of Input Leaders 146 - Improper Neutralization of Expression/Command Delimiters
149 - Improper Neutralization of Quoting Syntax 626 - Null Byte Interaction Error (Poison Null Byte)
157 - Failure to Sanitize Paired Delimiters 166 - Improper Handling of Missing Special Element
158 - Improper Neutralization of Null Byte or NUL Character 167 - Improper Handling of Additional Special Element
159 - Improper Handling of Invalid Use of Special Elements 168 - Improper Handling of Inconsistent Special Elements
160 - Improper Neutralization of Leading Special Elements 161 - Improper Neutralization of Multiple Leading Special Elements
162 - Improper Neutralization of Trailing Special Elements 163 - Improper Neutralization of Multiple Trailing Special Elements
164 - Improper Neutralization of Internal Special Elements 165 - Improper Neutralization of Multiple Internal Special Elements
228 - Improper Handling of Syntactically Invalid Structure 234 - Failure to Handle Missing Parameter
237 - Improper Handling of Structural Elements 238 - Improper Handling of Incomplete Structural Elements
241 - Improper Handling of Unexpected Data Type 239 - Failure to Handle Incomplete Element
240 - Improper Handling of Inconsistent Structural Elements 130 - Improper Handling of Length Parameter Inconsistency
1048 - Invokable Control Element with Large Number of Outward Calls 1112 - Incomplete Documentation of Program Execution
1059 - Insufficient Technical Documentation 1118 - Insufficient Documentation of Error Handling Techniques
1098 - Data Element containing Pointer Item without Proper Copy Control
1076 - Insufficient Adherence to Expected Conventions Element 547 - Use of Hard-coded, Security-relevant Constants
1101 - Reliance on Runtime Component in Generated Code 1095 - Loop Condition Value Update within the Loop
1126 - Declaration of Variable with Unnecessarily Wide Scope 1124 - Excessively Deep Nesting
1127 - Compilation with Insufficient Warnings or Errors 1125 - Excessive Attack Surface
1209 - Failure to Disable Reserved Bits 110 - Struts: Validator Without Form Field
676 - Use of Potentially Dangerous Function 785 - Use of Path Manipulation Function without Maximum-sized Buffer
1189 - Improper Isolation of Shared Resources on System-on-a-Chip (SoC) 1303 - Non-Transparent Sharing of Microarchitectural Resources
1105 - Insufficient Encapsulation of Machine-Dependent Functionality 188 - Reliance on Data/Memory Layout 198 - Use of Incorrect Byte Ordering
1191 - On-Chip Debug and Test Interface With Improper Access Control
1263 - Improper Physical Access Control 1243 - Sensitive Non-Volatile Information Not Protected During Debug
1268 - Policy Privileges are not Assigned Consistently Between Control and
Data Agents
1274 - Improper Access Control for Volatile Memory Containing Boot Code
1317 - Improper Access Control in Fabric Bridge 267 - Privilege Defined With Unsafe Actions 9- J2EE Misconfiguration: Weak Access Permissions for EJB Methods
1320 - Improper Protection for Outbound Error Messages and Alert Signals 268 - Privilege Chaining 623 - Unsafe ActiveX Control Marked Safe For Scripting
1323 - Improper Management of Sensitive Trace Data 270 - Privilege Context Switching Error
942 - Permissive Cross-domain Policy with Untrusted Domains 1392 - Use of Default Credentials
289 - Authentication Bypass by Alternate Name 291 - Reliance on IP Address for Authentication
290 - Authentication Bypass by Spoofing 293 - Using Referer Field for Authentication
294 - Authentication Bypass by Capture-replay 350 - Reliance on Reverse DNS Resolution for a Security-Critical Action
303 - Incorrect Implementation of Authentication Algorithm 304 - Missing Critical Step in Authentication
257 - Storing Passwords in a Recoverable Format 13 - ASP.NET Misconfiguration: Password in Configuration File
261 - Weak Encoding for Password 555 - J2EE Misconfiguration: Plaintext Password in Configuration File
299 - Improper Check for Certificate Revocation 370 - Missing Check for Certificate Revocation after Initial Check
749 - Exposed Dangerous Method or Function 618 - Exposed Unsafe ActiveX Method
923 - Improper Restriction of Communication Channel to Intended Endpoints 1299 - Missing Protection Mechanism for Alternate Hardware Interface