ASDR TOC Vulnerabilities

From OWASP
Revision as of 16:29, 28 January 2009 by KirstenS (Talk | contribs)

Jump to: navigation, search


This page was marked to be reviewed for deletion.


Back to TOC

  1. Access control enforced by presentation layer
  2. Accidental leaking of sensitive information through data queries
  3. Accidental leaking of sensitive information through error messages
  4. Accidental leaking of sensitive information through sent data
  5. Addition of data-structure sentinel
  6. Allowing password aging
  7. ASP.NET Misconfiguration: Creating Debug Binary
  8. ASP.NET Misconfiguration: Missing Custom Error Handling
  9. ASP.NET Misconfiguration: Password in Configuration File
  10. Assigning instead of comparing
  11. Authentication Bypass via Assumed-Immutable Data
  12. Behavioral problems
  13. Buffer Overflow
  14. Buffer underwrite
  15. Capture-replay
  16. Catch NullPointerException
  17. Code Correctness: Call to System.gc()
  18. Code Correctness: Call to Thread.run()
  19. Code Correctness: Class Does Not Implement Cloneable
  20. Code Correctness: Double-Checked Locking
  21. Code Correctness: Erroneous finalize() Method
  22. Code Correctness: Erroneous String Compare
  23. Code Correctness: Misspelled Method Name
  24. Code Correctness: null Argument to equals()
  25. Comparing classes by name
  26. Comparing instead of assigning
  27. Comprehensive list of Threats to Authentication Procedures and Data
  28. Covert timing channel
  29. CRLF Injection
  30. Cross Site Scripting Flaw
  31. Dangerous Function
  32. Dead Code: Broken Override
  33. Dead Code: Expression is Always False
  34. Dead Code: Expression is Always True
  35. Dead Code: Unused Field
  36. Dead Code: Unused Method
  37. Deletion of data-structure sentinel
  38. Deserialization of untrusted data
  39. Directory Restriction Error
  40. Double Free
  41. Doubly freeing memory
  42. Duplicate key in associative list (alist)
  43. Early Amplification
  44. EJB Bad Practices: Use of AWT/Swing
  45. EJB Bad Practices: Use of Class Loader
  46. EJB Bad Practices: Use of java.io
  47. EJB Bad Practices: Use of Sockets
  48. EJB Bad Practices: Use of Synchronization Primitives
  49. Empty Catch Block
  50. Empty String Password
  51. Error Conditions, Return Values, Status Codes
  52. Error Message Infoleaks
  53. Escape, Meta, or Control Character / Sequence
  54. Expected behavior violation
  55. External behavioral inconsistency infoleak
  56. External initialization of trusted variables or values
  57. Extra Parameter Error
  58. Extra Special Element
  59. Extra Unhandled Features
  60. Extra Value Error
  61. Fails poorly due to insufficient permissions
  62. Failure of true random number generator
  63. Failure to account for default case in switch
  64. Failure to add integrity check value
  65. Failure to check for certificate revocation
  66. Failure to check integrity check value
  67. Failure to check whether privileges were dropped successfully
  68. Failure to deallocate data
  69. Failure to drop privileges when reasonable
  70. Failure to encrypt data
  71. Failure to follow chain of trust in certificate validation
  72. Failure to protect stored data from modification
  73. Failure to provide confidentiality for stored data
  74. Failure to validate certificate expiration
  75. Failure to validate host-specific certificate data
  76. File Access Race Condition: TOCTOU
  77. Format String
  78. General Special Element Problems
  79. Grouping Element / Paired Delimiter
  80. Guessed or visible temporary file
  81. Hard-Coded Password
  82. Heap Inspection
  83. Heap overflow
  84. Ignored function return value
  85. Illegal Pointer Value
  86. Improper cleanup on thrown exception
  87. Improper error handling
  88. Improper Handler Deployment
  89. Improper Null Termination
  90. Improper resource shutdown or release
  91. Improper string length checking
  92. Improper temp file opening
  93. Improperly Implemented Security Check for Standard
  94. Improperly Trusted Reverse DNS
  95. Improperly Verified Signature
  96. Incomplete Blacklist
  97. Incomplete Cleanup
  98. Incomplete Element
  99. Incomplete Internal State Distinction
  100. Inconsistent Implementations
  101. Inconsistent Special Elements
  102. Incorrect block delimitation
  103. Incorrect initialization
  104. Incorrect Privilege Assignment
  105. Infoleak Using Debug Information
  106. Information Leak (information disclosure)
  107. Information leak through class cloning
  108. Information leak through serialization
  109. Information loss or omission
  110. Initialization and Cleanup Errors
  111. Injection problem
  112. Input Terminator
  113. Insecure Compiler Optimization
  114. Insecure Default Permissions
  115. Insecure default variable initialization
  116. Insecure execution-assigned permissions
  117. Insecure inherited permissions
  118. Insecure preserved inherited permissions
  119. Insecure Randomness
  120. Insecure Temporary File
  121. Insecure Third Party Domain Access
  122. Installation Issues
  123. Insufficient Entropy
  124. Insufficient entropy in pseudo-random number generator
  125. Insufficient privileges
  126. Insufficient Resource Locking
  127. Insufficient Resource Pool
  128. Insufficient Type Distinction
  129. Insufficient UI warning of dangerous operations
  130. Insufficient Verification of Data
  131. Integer coercion error
  132. Integer overflow
  133. Intended information leak
  134. Interaction Errors
  135. Internal behavioral inconsistency infoleak
  136. Internal Special Element
  137. Invalid Characters in Identifiers
  138. Invoking untrusted mobile code
  139. J2EE Bad Practices: getConnection()
  140. J2EE Bad Practices: JSP Expressions
  141. J2EE Bad Practices: Sockets
  142. J2EE Bad Practices: System.exit()
  143. J2EE Bad Practices: Threads
  144. J2EE Misconfiguration: Insecure Transport
  145. J2EE Misconfiguration: Insufficient Session-ID Length
  146. J2EE Misconfiguration: Missing Error Handling
  147. J2EE Misconfiguration: Unsafe Bean Declaration
  148. J2EE Misconfiguration: Weak Access Permissions
  149. J2EE Time and State Issues
  150. Key exchange without entity authentication
  151. Key management errors
  152. Leading Special Element
  153. Least Privilege Violation
  154. Leftover Debug Code
  155. Length Parameter Inconsistency
  156. Line Delimiter
  157. Log Forging
  158. Log injection
  159. Mac virtual file problems
  160. Macro symbol
  161. Member Field Race Condition
  162. Memory leak
  163. Miscalculated null termination
  164. Misinterpretation error
  165. Misinterpreted function return value
  166. Missing access control
  167. Missing critical step in authentication
  168. Missing element error
  169. Missing error status code
  170. Missing handler
  171. Missing initialization
  172. Missing lock check
  173. Missing parameter
  174. Missing required cryptographic step
  175. Missing special element
  176. Missing value error
  177. Missing XML Validation
  178. Mixed encoding
  179. Modification of assumed-immutable data
  180. Multiple failed authentication attempts not prevented
  181. Multiple internal special element
  182. Multiple interpretation error (MIE)
  183. Multiple interpretations of UI input
  184. Multiple Leading Special Elements
  185. Multiple Trailing Special Elements
  186. Mutable object returned
  187. Mutable objects passed by reference
  188. No authentication for critical function
  189. Non-cryptographic pseudo-random number generator
  190. Non-exit on failed initialization
  191. Non-replicating
  192. Not allowing password aging
  193. Not using a random initialization vector with cipher block chaining mode
  194. Null character / null byte
  195. Null Dereference
  196. Numeric Byte Ordering Error
  197. Numeric Errors
  198. Object Model Violation: Just One of equals() and hashCode() Defined
  199. Obscured Security-relevant Information by Alternate Name
  200. Obsolete feature in UI
  201. Off-by-one Error
  202. Often Misused: Authentication
  203. Often Misused: Exception Handling
  204. Often Misused: File System
  205. Often Misused: Path Manipulation
  206. Often Misused: Privilege Management
  207. Often Misused: String Management
  208. Omission of Security-relevant Information
  209. Omitted break statement
  210. Open forward
  211. Open redirect
  212. Origin Validation Error
  213. Other length calculation error
  214. Out-of-bounds Read
  215. Overflow of static internal buffer
  216. Overly Restrictive Regular Expression
  217. Overly-Broad Catch Block
  218. Overly-Broad Throws Declaration
  219. Ownership errors
  220. Parameter Problems
  221. Partial Comparison
  222. Passing mutable objects to an untrusted method
  223. Password Management: Hardcoded Password
  224. Password Management: Weak Cryptography
  225. Password Plaintext Storage
  226. Patch Issues
  227. Path Equivalence
  228. Path Issue - asterisk wildcard - filedir*
  229. Path Issue - backslash absolute path - /absolute/pathname/here
  230. Path Issue - directory doubled dot dot backslash
  231. Path Issue - directory doubled dot dot slash
  232. Path Issue - dirname/fakechild/
  233. Path Issue - dot dot backslash
  234. Path Issue - doubled dot dot slash
  235. Path Issue - doubled triple dot slash
  236. Path Issue - drive letter or Windows volume - 'C:dirname'
  237. Path Issue - internal dot - 'file.ordir'
  238. Path Issue - internal space - file(SPACE)name
  239. Path Issue - leading directory dot dot backslash
  240. Path Issue - leading directory dot dot slash
  241. Path Issue - leading dot dot backslash
  242. Path Issue - leading dot dot slash
  243. Path Issue - leading space
  244. Path Issue - multiple dot
  245. Path Issue - multiple internal backslash
  246. Path Issue - multiple leading slash
  247. Path Issue - multiple trailing dot
  248. Path Issue - multiple trailing slash
  249. Path Issue - single dot directory
  250. Path Issue - slash absolute path
  251. Path Issue - trailing backslash
  252. Path Issue - trailing dot
  253. Path Issue - trailing slash
  254. Path Issue - trailing space
  255. Path Issue - triple dot
  256. Path Issue - Windows 8.3 Filename
  257. Path Issue - Windows UNC share - '/UNC/share/name/'
  258. Pathname Traversal and Equivalence Errors
  259. Permission errors
  260. Permission preservation failure
  261. Permissions, Privileges, and ACLs
  262. Permissive Whitelist
  263. PHP External Variable Modification
  264. PHP File Inclusion
  265. Plaintext Storage in Cookie
  266. Plaintext Storage in Executable
  267. Plaintext Storage in File or on Disk
  268. Plaintext Storage in GUI
  269. Plaintext Storage in Memory
  270. Plaintext Storage of Sensitive Information
  271. Pointer Issues
  272. Poor Logging Practice: Logger Not Declared Static Final
  273. Poor Logging Practice: Multiple Loggers
  274. Poor Logging Practice: Use of a System Output Stream
  275. Poor Style: Confusing Naming
  276. Poor Style: Empty Synchronized Block
  277. Poor Style: Explicit call to finalize()
  278. Poor Style: Identifier Contains Dollar Symbol ($)
  279. Portability Flaw
  280. Porting Issues
  281. Predictability problems
  282. Predictable Exact Value from Previous Values
  283. Predictable from Observable State
  284. Predictable Seed in PRNG
  285. Predictable Value Range from Previous Values
  286. Privacy Violation
  287. Private Array-Typed Field Returned From A Public Method
  288. Privilege / sandbox errors
  289. Privilege Chaining
  290. Privilege Context Switching Error
  291. Privilege Dropping / Lowering Errors
  292. Privilege Management Error
  293. PRNG Seed Error
  294. Process Control
  295. Process information infoleak to other processes
  296. Product UI does not warn user of unsafe actions
  297. Product-External Error Message Infoleak
  298. Product-Generated Error Message Infoleak
  299. Proxied Trusted Channel
  300. Public Data Assigned to Private Array-Typed Field
  301. Publicizing of private data when using inner classes
  302. Quoting Element
  303. Race condition enabling link following
  304. Race condition in checking for certificate revocation
  305. Race condition in signal handler
  306. Race condition in switch
  307. Race condition within a thread
  308. Race Conditions
  309. Randomness and Predictability
  310. Record Delimiter
  311. Reflection attack in an auth protocol
  312. Reflection injection
  313. Regular Expression Error
  314. Relative path library search
  315. Reliance on data layout
  316. Relying on package-level scope
  317. Representation Errors
  318. Requirements Issues
  319. Resource exhaustion
  320. Resource leaks
  321. Resource Locking problems
  322. Resource Management Errors
  323. Response discrepancy infoleak
  324. Return Inside Finally Block
  325. Reusing a nonce, key pair in encryption
  326. Reversible One-Way Hash
  327. Same Seed in PRNG
  328. Section Delimiter
  329. Sensitive Data Under FTP Root
  330. Sensitive Data Under Web Root
  331. Sensitive Information Uncleared Before Use
  332. Session Fixation
  333. Sign extension error
  334. Signal Errors
  335. Signed to unsigned conversion error
  336. Small Seed Space in PRNG
  337. Small Space of Random Values
  338. Stack overflow
  339. State synchronization error
  340. Static Value in Unpredictable Context
  341. Storing passwords in a recoverable format
  342. String Termination Error
  343. Struts: Duplicate Validation Forms
  344. Struts: Erroneous validate() Method
  345. Struts: Form Bean Does Not Extend Validation Class
  346. Struts: Form Does Not Extend Validation Class
  347. Struts: Form Field Without Validator
  348. Struts: Plug-in Framework Not In Use
  349. Struts: Unused Validation Form
  350. Struts: Unvalidated Action Form
  351. Struts: Validator Turned Off
  352. Struts: Validator Without Form Field
  353. Substitution Character
  354. Symbolic name not mapping to correct object
  355. System Configuration Issues
  356. System Information Leak
  357. System Information Leak: Missing Catch Block
  358. System Operations Issues
  359. Technology-specific Environment Issues
  360. Technology-Specific Input Validation Problems
  361. Technology-Specific Special Elements
  362. Technology-Specific Time and State Issues
  363. Template:Vulnerability
  364. Temporary File Issues
  365. Testing Issues
  366. The UI performs the wrong action
  367. Time and State
  368. Time of check, time of use race condition
  369. Time of Introduction
  370. Time-of-check Time-of-use race condition
  371. Timing discrepancy infoleak
  372. Trailing Special Element
  373. Trapdoor
  374. Truncation error
  375. Truncation of Security-relevant Information
  376. Trust Boundary Violation
  377. Trust of system event data
  378. Trusting self-reported DNS name
  379. Trusting self-reported IP address
  380. UI Misrepresentation of Critical Information
  381. Uncaught exception
  382. Unchecked array indexing
  383. Unchecked Return Value: Missing Check against Null
  384. Uncontrolled Search Path Element
  385. Undefined Behavior
  386. Undefined Parameter Error
  387. Undefined Value Error
  388. Unexpected Status Code or Return Value
  389. Unimplemented or unsupported feature in UI
  390. Uninitialized Variable
  391. Unintended proxy/intermediary
  392. Unintentional pointer scaling
  393. UNIX file descriptor leak
  394. UNIX hard link
  395. UNIX Path Link problems
  396. UNIX symbolic link (symlink) following
  397. Unparsed Raw Web Content Delivery
  398. Unprotected Alternate Channel
  399. Unprotected Primary Channel
  400. Unquoted Search Path or Element
  401. Unreleased Resource
  402. Unrestricted Critical Resource Lock
  403. Unrestricted File Upload
  404. Unsafe function call from a signal handler
  405. Unsafe JNI
  406. Unsafe Mobile Code: Access Violation
  407. Unsafe Mobile Code: Dangerous Array Declaration
  408. Unsafe Mobile Code: Dangerous Public Field
  409. Unsafe Mobile Code: Inner Class
  410. Unsafe Mobile Code: Public finalize() Method
  411. Unsafe Privilege
  412. Unsafe Reflection
  413. Unsigned to signed conversion error
  414. Untrusted Data Appended with Trusted Data
  415. Unverified Ownership
  416. URL Encoding (Hex Encoding)
  417. Use of hard-coded password
  418. Use of Less Trusted Source
  419. Use of Obsolete Methods
  420. Use of sizeof() on a pointer type
  421. User interface inconsistency
  422. User Interface Quality Errors
  423. User Interface Security Errors
  424. User management errors
  425. Using a broken or risky cryptographic algorithm
  426. Using a key past its expiration date
  427. Using freed memory
  428. Using password systems
  429. Using referer field for authentication or authorization
  430. Using single-factor authentication
  431. Using the wrong operator
  432. Validate-Before-Canonicalize
  433. Validate-Before-Filter
  434. Validation performed in client
  435. Value Delimiter
  436. Value Problems
  437. Variable Name Delimiter
  438. Virtual Files
  439. Weak credentials
  440. Weak Encryption
  441. Wrap-around error
  442. Write-what-where condition
  443. Wrong Data Type
  444. Wrong Status Code

Back to TOC