Difference between revisions of "ASDR TOC Vulnerabilities"

From OWASP
Jump to: navigation, search
Line 50: Line 50:
 
# [[Empty Catch Block]]
 
# [[Empty Catch Block]]
 
# [[Empty String Password]]
 
# [[Empty String Password]]
# [[Extra Special Element]]
 
 
# [[Failure of true random number generator]]
 
# [[Failure of true random number generator]]
 
# [[Failure to account for default case in switch]]
 
# [[Failure to account for default case in switch]]

Revision as of 20:56, 2 February 2009

Back to TOC

  1. Access control enforced by presentation layer
  2. Accidental leaking of sensitive information through data queries
  3. Accidental leaking of sensitive information through error messages
  4. Accidental leaking of sensitive information through sent data
  5. Addition of data-structure sentinel
  6. Allowing password aging
  7. ASP.NET Misconfiguration: Creating Debug Binary
  8. ASP.NET Misconfiguration: Missing Custom Error Handling
  9. ASP.NET Misconfiguration: Password in Configuration File
  10. Assigning instead of comparing
  11. Authentication Bypass via Assumed-Immutable Data
  12. Behavioral problems
  13. Buffer Overflow
  14. Buffer underwrite
  15. Capture-replay
  16. Catch NullPointerException
  17. Code Correctness: Call to System.gc()
  18. Code Correctness: Call to Thread.run()
  19. Code Correctness: Class Does Not Implement Cloneable
  20. Code Correctness: Double-Checked Locking
  21. Code Correctness: Erroneous finalize() Method
  22. Code Correctness: Erroneous String Compare
  23. Code Correctness: Misspelled Method Name
  24. Code Correctness: null Argument to equals()
  25. Comparing classes by name
  26. Comparing instead of assigning
  27. Comprehensive list of Threats to Authentication Procedures and Data
  28. Covert timing channel
  29. CRLF Injection
  30. Cross Site Scripting Flaw
  31. Dangerous Function
  32. Dead Code: Broken Override
  33. Dead Code: Expression is Always False
  34. Dead Code: Expression is Always True
  35. Dead Code: Unused Field
  36. Dead Code: Unused Method
  37. Deletion of data-structure sentinel
  38. Deserialization of untrusted data
  39. Directory Restriction Error
  40. Double Free
  41. Doubly freeing memory
  42. Duplicate key in associative list (alist)
  43. EJB Bad Practices: Use of AWT/Swing
  44. EJB Bad Practices: Use of Class Loader
  45. EJB Bad Practices: Use of java.io
  46. EJB Bad Practices: Use of Sockets
  47. EJB Bad Practices: Use of Synchronization Primitives
  48. Empty Catch Block
  49. Empty String Password
  50. Failure of true random number generator
  51. Failure to account for default case in switch
  52. Failure to add integrity check value
  53. Failure to check for certificate revocation
  54. Failure to check integrity check value
  55. Failure to check whether privileges were dropped successfully
  56. Failure to deallocate data
  57. Failure to drop privileges when reasonable
  58. Failure to encrypt data
  59. Failure to follow chain of trust in certificate validation
  60. Failure to protect stored data from modification
  61. Failure to provide confidentiality for stored data
  62. Failure to validate certificate expiration
  63. Failure to validate host-specific certificate data
  64. File Access Race Condition: TOCTOU
  65. Format String
  66. Guessed or visible temporary file
  67. Hard-Coded Password
  68. Heap Inspection
  69. Heap overflow
  70. Ignored function return value
  71. Illegal Pointer Value
  72. Improper cleanup on thrown exception
  73. Improper error handling
  74. Improper string length checking
  75. Improper temp file opening
  76. Incorrect block delimitation
  77. Information leak through class cloning
  78. Information leak through serialization
  79. Injection problem
  80. Insecure Compiler Optimization
  81. Insecure Randomness
  82. Insecure Temporary File
  83. Insecure Third Party Domain Access
  84. Insufficient Entropy
  85. Insufficient entropy in pseudo-random number generator
  86. Integer coercion error
  87. Integer overflow
  88. Invoking untrusted mobile code
  89. J2EE Bad Practices: getConnection()
  90. J2EE Bad Practices: JSP Expressions
  91. J2EE Bad Practices: Sockets
  92. J2EE Bad Practices: System.exit()
  93. J2EE Misconfiguration: Insecure Transport
  94. J2EE Misconfiguration: Insufficient Session-ID Length
  95. J2EE Misconfiguration: Missing Error Handling
  96. J2EE Misconfiguration: Unsafe Bean Declaration
  97. J2EE Misconfiguration: Weak Access Permissions
  98. Key exchange without entity authentication
  99. Least Privilege Violation
  100. Leftover Debug Code
  101. Log Forging
  102. Log injection
  103. Member Field Race Condition
  104. Memory leak
  105. Miscalculated null termination
  106. Misinterpreted function return value
  107. Missing parameter
  108. Missing XML Validation
  109. Mutable object returned
  110. Non-cryptographic pseudo-random number generator
  111. Not allowing password aging
  112. Not using a random initialization vector with cipher block chaining mode
  113. Null Dereference
  114. Object Model Violation: Just One of equals() and hashCode() Defined
  115. Often Misused: Authentication
  116. Often Misused: Exception Handling
  117. Often Misused: File System
  118. Often Misused: Privilege Management
  119. Often Misused: String Management
  120. Omitted break statement
  121. Open forward
  122. Open redirect
  123. Overflow of static internal buffer
  124. Overly-Broad Catch Block
  125. Overly-Broad Throws Declaration
  126. Passing mutable objects to an untrusted method
  127. Password Management: Hardcoded Password
  128. Password Management: Weak Cryptography
  129. Password Plaintext Storage
  130. PHP File Inclusion
  131. Poor Logging Practice: Logger Not Declared Static Final
  132. Poor Logging Practice: Multiple Loggers
  133. Poor Logging Practice: Use of a System Output Stream
  134. Poor Style: Confusing Naming
  135. Poor Style: Empty Synchronized Block
  136. Poor Style: Explicit call to finalize()
  137. Poor Style: Identifier Contains Dollar Symbol ($)
  138. Portability Flaw
  139. Privacy Violation
  140. PRNG Seed Error
  141. Process Control
  142. Publicizing of private data when using inner classes
  143. Race condition in checking for certificate revocation
  144. Race condition in signal handler
  145. Race condition in switch
  146. Race condition within a thread
  147. Race Conditions
  148. Reflection attack in an auth protocol
  149. Reflection injection
  150. Relative path library search
  151. Reliance on data layout
  152. Relying on package-level scope
  153. Resource exhaustion
  154. Return Inside Finally Block
  155. Reusing a nonce, key pair in encryption
  156. Sign extension error
  157. Signed to unsigned conversion error
  158. Stack overflow
  159. State synchronization error
  160. Storing passwords in a recoverable format
  161. String Termination Error
  162. Struts: Duplicate Validation Forms
  163. Struts: Erroneous validate() Method
  164. Struts: Form Does Not Extend Validation Class
  165. Struts: Form Field Without Validator
  166. Struts: Plug-in Framework Not In Use
  167. Struts: Unused Validation Form
  168. Struts: Unvalidated Action Form
  169. Struts: Validator Turned Off
  170. Struts: Validator Without Form Field
  171. Symbolic name not mapping to correct object
  172. System Information Leak
  173. System Information Leak: Missing Catch Block
  174. Template:Vulnerability
  175. Truncation error
  176. Trust Boundary Violation
  177. Trust of system event data
  178. Trusting self-reported DNS name
  179. Trusting self-reported IP address
  180. Uncaught exception
  181. Unchecked array indexing
  182. Unchecked Return Value: Missing Check against Null
  183. Undefined Behavior
  184. Uninitialized Variable
  185. Unintentional pointer scaling
  186. Unreleased Resource
  187. Unrestricted File Upload
  188. Unsafe function call from a signal handler
  189. Unsafe JNI
  190. Unsafe Mobile Code: Access Violation
  191. Unsafe Mobile Code: Dangerous Array Declaration
  192. Unsafe Mobile Code: Dangerous Public Field
  193. Unsafe Mobile Code: Inner Class
  194. Unsafe Mobile Code: Public finalize() Method
  195. Unsafe Reflection
  196. Unsigned to signed conversion error
  197. Use of hard-coded password
  198. Use of Obsolete Methods
  199. Use of sizeof() on a pointer type
  200. Using a broken or risky cryptographic algorithm
  201. Using a key past its expiration date
  202. Using freed memory
  203. Using password systems
  204. Using referer field for authentication or authorization
  205. Using single-factor authentication
  206. Using the wrong operator
  207. Validation performed in client
  208. Wrap-around error
  209. Write-what-where condition

Back to TOC