ASDR TOC Vulnerabilities

From OWASP
Revision as of 13:04, 10 February 2009 by KirstenS (Talk | contribs)

Jump to: navigation, search

Back to TOC

  1. Access control enforced by presentation layer
  2. Accidental leaking of sensitive information through data queries
  3. Accidental leaking of sensitive information through error messages
  4. Accidental leaking of sensitive information through sent data
  5. Addition of data-structure sentinel
  6. Allowing password aging
  7. ASP.NET Misconfigurations
  8. Assigning instead of comparing
  9. Authentication Bypass via Assumed-Immutable Data
  10. Behavioral problems
  11. Buffer Overflow
  12. Buffer underwrite
  13. Capture-replay
  14. Catch NullPointerException
  15. Code Correctness: Call to System.gc()
  16. Code Correctness: Call to Thread.run()
  17. Code Correctness: Class Does Not Implement Cloneable
  18. Code Correctness: Double-Checked Locking
  19. Code Correctness: Erroneous finalize() Method
  20. Code Correctness: Erroneous String Compare
  21. Code Correctness: Misspelled Method Name
  22. Code Correctness: null Argument to equals()
  23. Comparing classes by name
  24. Comparing instead of assigning
  25. Comprehensive list of Threats to Authentication Procedures and Data
  26. Covert timing channel
  27. CRLF Injection
  28. Cross Site Scripting Flaw
  29. Dangerous Function
  30. Dead Code: Broken Override
  31. Dead Code: Expression is Always False
  32. Dead Code: Expression is Always True
  33. Dead Code: Unused Field
  34. Dead Code: Unused Method
  35. Deletion of data-structure sentinel
  36. Deserialization of untrusted data
  37. Directory Restriction Error
  38. Double Free
  39. Doubly freeing memory
  40. Duplicate key in associative list (alist)
  41. EJB Bad Practices: Use of AWT/Swing
  42. EJB Bad Practices: Use of Class Loader
  43. EJB Bad Practices: Use of java.io
  44. EJB Bad Practices: Use of Sockets
  45. EJB Bad Practices: Use of Synchronization Primitives
  46. Empty Catch Block
  47. Empty String Password
  48. Failure of true random number generator
  49. Failure to account for default case in switch
  50. Failure to add integrity check value
  51. Failure to check for certificate revocation
  52. Failure to check integrity check value
  53. Failure to check whether privileges were dropped successfully
  54. Failure to deallocate data
  55. Failure to drop privileges when reasonable
  56. Failure to encrypt data
  57. Failure to follow chain of trust in certificate validation
  58. Failure to protect stored data from modification
  59. Failure to provide confidentiality for stored data
  60. Failure to validate certificate expiration
  61. Failure to validate host-specific certificate data
  62. File Access Race Condition: TOCTOU
  63. Format String
  64. Guessed or visible temporary file
  65. Hard-Coded Password
  66. Heap Inspection
  67. Heap overflow
  68. Ignored function return value
  69. Illegal Pointer Value
  70. Improper cleanup on thrown exception
  71. Improper error handling
  72. Improper string length checking
  73. Improper temp file opening
  74. Incorrect block delimitation
  75. Information leak through class cloning
  76. Information leak through serialization
  77. Injection problem
  78. Insecure Compiler Optimization
  79. Insecure Randomness
  80. Insecure Temporary File
  81. Insecure Third Party Domain Access
  82. Insufficient Entropy
  83. Insufficient entropy in pseudo-random number generator
  84. Integer coercion error
  85. Integer overflow
  86. Invoking untrusted mobile code
  87. J2EE Bad Practices: getConnection()
  88. J2EE Bad Practices: JSP Expressions
  89. J2EE Bad Practices: Sockets
  90. J2EE Bad Practices: System.exit()
  91. J2EE Misconfiguration: Insecure Transport
  92. J2EE Misconfiguration: Insufficient Session-ID Length
  93. J2EE Misconfiguration: Missing Error Handling
  94. J2EE Misconfiguration: Unsafe Bean Declaration
  95. J2EE Misconfiguration: Weak Access Permissions
  96. Key exchange without entity authentication
  97. Least Privilege Violation
  98. Leftover Debug Code
  99. Log Forging
  100. Log injection
  101. Member Field Race Condition
  102. Memory leak
  103. Miscalculated null termination
  104. Misinterpreted function return value
  105. Missing parameter
  106. Missing XML Validation
  107. Mutable object returned
  108. Non-cryptographic pseudo-random number generator
  109. Not allowing password aging
  110. Not using a random initialization vector with cipher block chaining mode
  111. Null Dereference
  112. Object Model Violation: Just One of equals() and hashCode() Defined
  113. Often Misused: Authentication
  114. Often Misused: Exception Handling
  115. Often Misused: File System
  116. Often Misused: Privilege Management
  117. Often Misused: String Management
  118. Omitted break statement
  119. Open forward
  120. Open redirect
  121. Overflow of static internal buffer
  122. Overly-Broad Catch Block
  123. Overly-Broad Throws Declaration
  124. Passing mutable objects to an untrusted method
  125. Password Management: Hardcoded Password
  126. Password Management: Weak Cryptography
  127. Password Plaintext Storage
  128. PHP File Inclusion
  129. Poor Logging Practice: Logger Not Declared Static Final
  130. Poor Logging Practice: Multiple Loggers
  131. Poor Logging Practice: Use of a System Output Stream
  132. Poor Style: Confusing Naming
  133. Poor Style: Empty Synchronized Block
  134. Poor Style: Explicit call to finalize()
  135. Poor Style: Identifier Contains Dollar Symbol ($)
  136. Portability Flaw
  137. Privacy Violation
  138. PRNG Seed Error
  139. Process Control
  140. Publicizing of private data when using inner classes
  141. Race condition in checking for certificate revocation
  142. Race condition in signal handler
  143. Race condition in switch
  144. Race condition within a thread
  145. Race Conditions
  146. Reflection attack in an auth protocol
  147. Reflection injection
  148. Relative path library search
  149. Reliance on data layout
  150. Relying on package-level scope
  151. Resource exhaustion
  152. Return Inside Finally Block
  153. Reusing a nonce, key pair in encryption
  154. Sign extension error
  155. Signed to unsigned conversion error
  156. Stack overflow
  157. State synchronization error
  158. Storing passwords in a recoverable format
  159. String Termination Error
  160. Struts: Duplicate Validation Forms
  161. Struts: Erroneous validate() Method
  162. Struts: Form Does Not Extend Validation Class
  163. Struts: Form Field Without Validator
  164. Struts: Plug-in Framework Not In Use
  165. Struts: Unused Validation Form
  166. Struts: Unvalidated Action Form
  167. Struts: Validator Turned Off
  168. Struts: Validator Without Form Field
  169. Symbolic name not mapping to correct object
  170. System Information Leak
  171. System Information Leak: Missing Catch Block
  172. Template:Vulnerability
  173. Truncation error
  174. Trust Boundary Violation
  175. Trust of system event data
  176. Trusting self-reported DNS name
  177. Trusting self-reported IP address
  178. Uncaught exception
  179. Unchecked array indexing
  180. Unchecked Return Value: Missing Check against Null
  181. Undefined Behavior
  182. Uninitialized Variable
  183. Unintentional pointer scaling
  184. Unreleased Resource
  185. Unrestricted File Upload
  186. Unsafe function call from a signal handler
  187. Unsafe JNI
  188. Unsafe Mobile Code: Access Violation
  189. Unsafe Mobile Code: Dangerous Array Declaration
  190. Unsafe Mobile Code: Dangerous Public Field
  191. Unsafe Mobile Code: Inner Class
  192. Unsafe Mobile Code: Public finalize() Method
  193. Unsafe Reflection
  194. Unsigned to signed conversion error
  195. Use of hard-coded password
  196. Use of Obsolete Methods
  197. Use of sizeof() on a pointer type
  198. Using a broken or risky cryptographic algorithm
  199. Using a key past its expiration date
  200. Using freed memory
  201. Using password systems
  202. Using referer field for authentication or authorization
  203. Using single-factor authentication
  204. Using the wrong operator
  205. Validation performed in client
  206. Wrap-around error
  207. Write-what-where condition

Back to TOC