ASDR TOC Vulnerabilities

From OWASP
Revision as of 10:24, 31 January 2009 by KirstenS (Talk | contribs)

Jump to: navigation, search

Back to TOC

  1. Access control enforced by presentation layer
  2. Accidental leaking of sensitive information through data queries
  3. Accidental leaking of sensitive information through error messages
  4. Accidental leaking of sensitive information through sent data
  5. Addition of data-structure sentinel
  6. Allowing password aging
  7. ASP.NET Misconfiguration: Creating Debug Binary
  8. ASP.NET Misconfiguration: Missing Custom Error Handling
  9. ASP.NET Misconfiguration: Password in Configuration File
  10. Assigning instead of comparing
  11. Authentication Bypass via Assumed-Immutable Data
  12. Behavioral problems
  13. Buffer Overflow
  14. Buffer underwrite
  15. Capture-replay
  16. Catch NullPointerException
  17. Code Correctness: Call to System.gc()
  18. Code Correctness: Call to Thread.run()
  19. Code Correctness: Class Does Not Implement Cloneable
  20. Code Correctness: Double-Checked Locking
  21. Code Correctness: Erroneous finalize() Method
  22. Code Correctness: Erroneous String Compare
  23. Code Correctness: Misspelled Method Name
  24. Code Correctness: null Argument to equals()
  25. Comparing classes by name
  26. Comparing instead of assigning
  27. Comprehensive list of Threats to Authentication Procedures and Data
  28. Covert timing channel
  29. CRLF Injection
  30. Cross Site Scripting Flaw
  31. Dangerous Function
  32. Dead Code: Broken Override
  33. Dead Code: Expression is Always False
  34. Dead Code: Expression is Always True
  35. Dead Code: Unused Field
  36. Dead Code: Unused Method
  37. Deletion of data-structure sentinel
  38. Deserialization of untrusted data
  39. Directory Restriction Error
  40. Double Free
  41. Doubly freeing memory
  42. Duplicate key in associative list (alist)
  43. EJB Bad Practices: Use of AWT/Swing
  44. EJB Bad Practices: Use of Class Loader
  45. EJB Bad Practices: Use of java.io
  46. EJB Bad Practices: Use of Sockets
  47. EJB Bad Practices: Use of Synchronization Primitives
  48. Empty Catch Block
  49. Empty String Password
  50. Extra Special Element
  51. Failure of true random number generator
  52. Failure to account for default case in switch
  53. Failure to add integrity check value
  54. Failure to check for certificate revocation
  55. Failure to check integrity check value
  56. Failure to check whether privileges were dropped successfully
  57. Failure to deallocate data
  58. Failure to drop privileges when reasonable
  59. Failure to encrypt data
  60. Failure to follow chain of trust in certificate validation
  61. Failure to protect stored data from modification
  62. Failure to provide confidentiality for stored data
  63. Failure to validate certificate expiration
  64. Failure to validate host-specific certificate data
  65. File Access Race Condition: TOCTOU
  66. Format String
  67. Guessed or visible temporary file
  68. Hard-Coded Password
  69. Heap Inspection
  70. Heap overflow
  71. Ignored function return value
  72. Illegal Pointer Value
  73. Improper cleanup on thrown exception
  74. Improper error handling
  75. Improper string length checking
  76. Improper temp file opening
  77. Incorrect block delimitation
  78. Information leak through class cloning
  79. Information leak through serialization
  80. Injection problem
  81. Insecure Compiler Optimization
  82. Insecure Randomness
  83. Insecure Temporary File
  84. Insecure Third Party Domain Access
  85. Insufficient Entropy
  86. Insufficient entropy in pseudo-random number generator
  87. Integer coercion error
  88. Integer overflow
  89. Invoking untrusted mobile code
  90. J2EE Bad Practices: getConnection()
  91. J2EE Bad Practices: JSP Expressions
  92. J2EE Bad Practices: Sockets
  93. J2EE Bad Practices: System.exit()
  94. J2EE Misconfiguration: Insecure Transport
  95. J2EE Misconfiguration: Insufficient Session-ID Length
  96. J2EE Misconfiguration: Missing Error Handling
  97. J2EE Misconfiguration: Unsafe Bean Declaration
  98. J2EE Misconfiguration: Weak Access Permissions
  99. Key exchange without entity authentication
  100. Least Privilege Violation
  101. Leftover Debug Code
  102. Log Forging
  103. Log injection
  104. Member Field Race Condition
  105. Memory leak
  106. Miscalculated null termination
  107. Misinterpreted function return value
  108. Missing parameter
  109. Missing XML Validation
  110. Mutable object returned
  111. Non-cryptographic pseudo-random number generator
  112. Not allowing password aging
  113. Not using a random initialization vector with cipher block chaining mode
  114. Null Dereference
  115. Object Model Violation: Just One of equals() and hashCode() Defined
  116. Often Misused: Authentication
  117. Often Misused: Exception Handling
  118. Often Misused: File System
  119. Often Misused: Privilege Management
  120. Often Misused: String Management
  121. Omitted break statement
  122. Open forward
  123. Open redirect
  124. Overflow of static internal buffer
  125. Overly-Broad Catch Block
  126. Overly-Broad Throws Declaration
  127. Passing mutable objects to an untrusted method
  128. Password Management: Hardcoded Password
  129. Password Management: Weak Cryptography
  130. Password Plaintext Storage
  131. PHP File Inclusion
  132. Poor Logging Practice: Logger Not Declared Static Final
  133. Poor Logging Practice: Multiple Loggers
  134. Poor Logging Practice: Use of a System Output Stream
  135. Poor Style: Confusing Naming
  136. Poor Style: Empty Synchronized Block
  137. Poor Style: Explicit call to finalize()
  138. Poor Style: Identifier Contains Dollar Symbol ($)
  139. Portability Flaw
  140. Privacy Violation
  141. PRNG Seed Error
  142. Process Control
  143. Publicizing of private data when using inner classes
  144. Race condition in checking for certificate revocation
  145. Race condition in signal handler
  146. Race condition in switch
  147. Race condition within a thread
  148. Race Conditions
  149. Reflection attack in an auth protocol
  150. Reflection injection
  151. Relative path library search
  152. Reliance on data layout
  153. Relying on package-level scope
  154. Resource exhaustion
  155. Return Inside Finally Block
  156. Reusing a nonce, key pair in encryption
  157. Sign extension error
  158. Signed to unsigned conversion error
  159. Stack overflow
  160. State synchronization error
  161. Storing passwords in a recoverable format
  162. String Termination Error
  163. Struts: Duplicate Validation Forms
  164. Struts: Erroneous validate() Method
  165. Struts: Form Does Not Extend Validation Class
  166. Struts: Form Field Without Validator
  167. Struts: Plug-in Framework Not In Use
  168. Struts: Unused Validation Form
  169. Struts: Unvalidated Action Form
  170. Struts: Validator Turned Off
  171. Struts: Validator Without Form Field
  172. Symbolic name not mapping to correct object
  173. System Information Leak
  174. System Information Leak: Missing Catch Block
  175. Template:Vulnerability
  176. Truncation error
  177. Trust Boundary Violation
  178. Trust of system event data
  179. Trusting self-reported DNS name
  180. Trusting self-reported IP address
  181. Uncaught exception
  182. Unchecked array indexing
  183. Unchecked Return Value: Missing Check against Null
  184. Undefined Behavior
  185. Uninitialized Variable
  186. Unintentional pointer scaling
  187. Unreleased Resource
  188. Unrestricted File Upload
  189. Unsafe function call from a signal handler
  190. Unsafe JNI
  191. Unsafe Mobile Code: Access Violation
  192. Unsafe Mobile Code: Dangerous Array Declaration
  193. Unsafe Mobile Code: Dangerous Public Field
  194. Unsafe Mobile Code: Inner Class
  195. Unsafe Mobile Code: Public finalize() Method
  196. Unsafe Reflection
  197. Unsigned to signed conversion error
  198. Use of hard-coded password
  199. Use of Obsolete Methods
  200. Use of sizeof() on a pointer type
  201. Using a broken or risky cryptographic algorithm
  202. Using a key past its expiration date
  203. Using freed memory
  204. Using password systems
  205. Using referer field for authentication or authorization
  206. Using single-factor authentication
  207. Using the wrong operator
  208. Validation performed in client
  209. Wrap-around error
  210. Write-what-where condition

Back to TOC