Difference between revisions of "ASDR TOC Vulnerabilities"

From OWASP
Jump to: navigation, search
Line 25: Line 25:
 
# [[Doubly freeing memory]]
 
# [[Doubly freeing memory]]
 
# [[Duplicate key in associative list (alist)]]
 
# [[Duplicate key in associative list (alist)]]
# [[EJB Bad Practices: Use of AWT/Swing]]
 
# [[EJB Bad Practices: Use of Class Loader]]
 
# [[EJB Bad Practices: Use of java.io]]
 
# [[EJB Bad Practices: Use of Sockets]]
 
# [[EJB Bad Practices: Use of Synchronization Primitives]]
 
 
# [[Empty Catch Block]]
 
# [[Empty Catch Block]]
 
# [[Empty String Password]]
 
# [[Empty String Password]]

Revision as of 05:29, 14 February 2009

Back to TOC

  1. Access control enforced by presentation layer
  2. Addition of data-structure sentinel
  3. Allowing password aging
  4. ASP.NET Misconfigurations
  5. Assigning instead of comparing
  6. Authentication Bypass via Assumed-Immutable Data
  7. Behavioral problems
  8. Buffer Overflow
  9. Buffer underwrite
  10. Capture-replay
  11. Catch NullPointerException
  12. Comparing classes by name
  13. Comparing instead of assigning
  14. Comprehensive list of Threats to Authentication Procedures and Data
  15. Covert timing channel
  16. CRLF Injection
  17. Cross Site Scripting Flaw
  18. Dangerous Function
  19. Deletion of data-structure sentinel
  20. Deserialization of untrusted data
  21. Directory Restriction Error
  22. Double Free
  23. Doubly freeing memory
  24. Duplicate key in associative list (alist)
  25. Empty Catch Block
  26. Empty String Password
  27. Failure of true random number generator
  28. Failure to account for default case in switch
  29. Failure to add integrity check value
  30. Failure to check for certificate revocation
  31. Failure to check integrity check value
  32. Failure to check whether privileges were dropped successfully
  33. Failure to deallocate data
  34. Failure to drop privileges when reasonable
  35. Failure to encrypt data
  36. Failure to follow guideline/specification
  37. Failure to follow chain of trust in certificate validation
  38. Failure to protect stored data from modification
  39. Failure to provide confidentiality for stored data
  40. Failure to validate certificate expiration
  41. Failure to validate host-specific certificate data
  42. File Access Race Condition: TOCTOU
  43. Format String
  44. Guessed or visible temporary file
  45. Hard-Coded Password
  46. Heap Inspection
  47. Heap overflow
  48. Ignored function return value
  49. Illegal Pointer Value
  50. Improper cleanup on thrown exception
  51. Improper error handling
  52. Improper string length checking
  53. Improper temp file opening
  54. Incorrect block delimitation
  55. Information Leakage
  56. Injection problem
  57. Insecure Compiler Optimization
  58. Insecure Randomness
  59. Insecure Temporary File
  60. Insecure Third Party Domain Access
  61. Insufficient Entropy
  62. Insufficient entropy in pseudo-random number generator
  63. Integer coercion error
  64. Integer overflow
  65. Invoking untrusted mobile code
  66. J2EE Bad Practices: getConnection()
  67. J2EE Bad Practices: JSP Expressions
  68. J2EE Bad Practices: Sockets
  69. J2EE Bad Practices: System.exit()
  70. J2EE Misconfiguration: Insecure Transport
  71. J2EE Misconfiguration: Insufficient Session-ID Length
  72. J2EE Misconfiguration: Missing Error Handling
  73. J2EE Misconfiguration: Unsafe Bean Declaration
  74. J2EE Misconfiguration: Weak Access Permissions
  75. Key exchange without entity authentication
  76. Least Privilege Violation
  77. Leftover Debug Code
  78. Log Forging
  79. Log injection
  80. Member Field Race Condition
  81. Memory leak
  82. Miscalculated null termination
  83. Misinterpreted function return value
  84. Missing parameter
  85. Missing XML Validation
  86. Mutable object returned
  87. Non-cryptographic pseudo-random number generator
  88. Not allowing password aging
  89. Not using a random initialization vector with cipher block chaining mode
  90. Null Dereference
  91. Object Model Violation: Just One of equals() and hashCode() Defined
  92. Often Misused: Authentication
  93. Often Misused: Exception Handling
  94. Often Misused: File System
  95. Often Misused: Privilege Management
  96. Often Misused: String Management
  97. Omitted break statement
  98. Open forward
  99. Open redirect
  100. Overflow of static internal buffer
  101. Overly-Broad Catch Block
  102. Overly-Broad Throws Declaration
  103. Passing mutable objects to an untrusted method
  104. Password Management: Hardcoded Password
  105. Password Management: Weak Cryptography
  106. Password Plaintext Storage
  107. PHP File Inclusion
  108. Poor Logging Practice: Logger Not Declared Static Final
  109. Poor Logging Practice: Multiple Loggers
  110. Poor Logging Practice: Use of a System Output Stream
  111. Poor Style: Confusing Naming
  112. Poor Style: Empty Synchronized Block
  113. Poor Style: Explicit call to finalize()
  114. Poor Style: Identifier Contains Dollar Symbol ($)
  115. Portability Flaw
  116. Privacy Violation
  117. PRNG Seed Error
  118. Process Control
  119. Publicizing of private data when using inner classes
  120. Race condition in checking for certificate revocation
  121. Race condition in signal handler
  122. Race condition in switch
  123. Race condition within a thread
  124. Race Conditions
  125. Reflection attack in an auth protocol
  126. Reflection injection
  127. Relative path library search
  128. Reliance on data layout
  129. Relying on package-level scope
  130. Resource exhaustion
  131. Return Inside Finally Block
  132. Reusing a nonce, key pair in encryption
  133. Sign extension error
  134. Signed to unsigned conversion error
  135. Stack overflow
  136. State synchronization error
  137. Storing passwords in a recoverable format
  138. String Termination Error
  139. Struts: Duplicate Validation Forms
  140. Struts: Erroneous validate() Method
  141. Struts: Form Does Not Extend Validation Class
  142. Struts: Form Field Without Validator
  143. Struts: Plug-in Framework Not In Use
  144. Struts: Unused Validation Form
  145. Struts: Unvalidated Action Form
  146. Struts: Validator Turned Off
  147. Struts: Validator Without Form Field
  148. Symbolic name not mapping to correct object
  149. Template:Vulnerability
  150. Truncation error
  151. Trust Boundary Violation
  152. Trust of system event data
  153. Trusting self-reported DNS name
  154. Trusting self-reported IP address
  155. Uncaught exception
  156. Unchecked array indexing
  157. Unchecked Return Value: Missing Check against Null
  158. Undefined Behavior
  159. Uninitialized Variable
  160. Unintentional pointer scaling
  161. Unreleased Resource
  162. Unrestricted File Upload
  163. Unsafe function call from a signal handler
  164. Unsafe JNI
  165. Unsafe Mobile Code: Access Violation
  166. Unsafe Mobile Code: Dangerous Array Declaration
  167. Unsafe Mobile Code: Dangerous Public Field
  168. Unsafe Mobile Code: Inner Class
  169. Unsafe Mobile Code: Public finalize() Method
  170. Unsafe Reflection
  171. Unsigned to signed conversion error
  172. Use of hard-coded password
  173. Use of Obsolete Methods
  174. Use of sizeof() on a pointer type
  175. Using a broken or risky cryptographic algorithm
  176. Using a key past its expiration date
  177. Using freed memory
  178. Using password systems
  179. Using referer field for authentication or authorization
  180. Using single-factor authentication
  181. Using the wrong operator
  182. Validation performed in client
  183. Wrap-around error
  184. Write-what-where condition

Back to TOC