ASDR TOC Vulnerabilities

From OWASP
Revision as of 13:10, 10 February 2009 by KirstenS (Talk | contribs)

Jump to: navigation, search

Back to TOC

  1. Access control enforced by presentation layer
  2. Addition of data-structure sentinel
  3. Allowing password aging
  4. ASP.NET Misconfigurations
  5. Assigning instead of comparing
  6. Authentication Bypass via Assumed-Immutable Data
  7. Behavioral problems
  8. Buffer Overflow
  9. Buffer underwrite
  10. Capture-replay
  11. Catch NullPointerException
  12. Code Correctness: Call to System.gc()
  13. Code Correctness: Call to Thread.run()
  14. Code Correctness: Class Does Not Implement Cloneable
  15. Code Correctness: Double-Checked Locking
  16. Code Correctness: Erroneous finalize() Method
  17. Code Correctness: Erroneous String Compare
  18. Code Correctness: Misspelled Method Name
  19. Code Correctness: null Argument to equals()
  20. Comparing classes by name
  21. Comparing instead of assigning
  22. Comprehensive list of Threats to Authentication Procedures and Data
  23. Covert timing channel
  24. CRLF Injection
  25. Cross Site Scripting Flaw
  26. Dangerous Function
  27. Dead Code: Broken Override
  28. Dead Code: Expression is Always False
  29. Dead Code: Expression is Always True
  30. Dead Code: Unused Field
  31. Dead Code: Unused Method
  32. Deletion of data-structure sentinel
  33. Deserialization of untrusted data
  34. Directory Restriction Error
  35. Double Free
  36. Doubly freeing memory
  37. Duplicate key in associative list (alist)
  38. EJB Bad Practices: Use of AWT/Swing
  39. EJB Bad Practices: Use of Class Loader
  40. EJB Bad Practices: Use of java.io
  41. EJB Bad Practices: Use of Sockets
  42. EJB Bad Practices: Use of Synchronization Primitives
  43. Empty Catch Block
  44. Empty String Password
  45. Failure of true random number generator
  46. Failure to account for default case in switch
  47. Failure to add integrity check value
  48. Failure to check for certificate revocation
  49. Failure to check integrity check value
  50. Failure to check whether privileges were dropped successfully
  51. Failure to deallocate data
  52. Failure to drop privileges when reasonable
  53. Failure to encrypt data
  54. Failure to follow chain of trust in certificate validation
  55. Failure to protect stored data from modification
  56. Failure to provide confidentiality for stored data
  57. Failure to validate certificate expiration
  58. Failure to validate host-specific certificate data
  59. File Access Race Condition: TOCTOU
  60. Format String
  61. Guessed or visible temporary file
  62. Hard-Coded Password
  63. Heap Inspection
  64. Heap overflow
  65. Ignored function return value
  66. Illegal Pointer Value
  67. Improper cleanup on thrown exception
  68. Improper error handling
  69. Improper string length checking
  70. Improper temp file opening
  71. Incorrect block delimitation
  72. Information leakage
  73. Injection problem
  74. Insecure Compiler Optimization
  75. Insecure Randomness
  76. Insecure Temporary File
  77. Insecure Third Party Domain Access
  78. Insufficient Entropy
  79. Insufficient entropy in pseudo-random number generator
  80. Integer coercion error
  81. Integer overflow
  82. Invoking untrusted mobile code
  83. J2EE Bad Practices: getConnection()
  84. J2EE Bad Practices: JSP Expressions
  85. J2EE Bad Practices: Sockets
  86. J2EE Bad Practices: System.exit()
  87. J2EE Misconfiguration: Insecure Transport
  88. J2EE Misconfiguration: Insufficient Session-ID Length
  89. J2EE Misconfiguration: Missing Error Handling
  90. J2EE Misconfiguration: Unsafe Bean Declaration
  91. J2EE Misconfiguration: Weak Access Permissions
  92. Key exchange without entity authentication
  93. Least Privilege Violation
  94. Leftover Debug Code
  95. Log Forging
  96. Log injection
  97. Member Field Race Condition
  98. Memory leak
  99. Miscalculated null termination
  100. Misinterpreted function return value
  101. Missing parameter
  102. Missing XML Validation
  103. Mutable object returned
  104. Non-cryptographic pseudo-random number generator
  105. Not allowing password aging
  106. Not using a random initialization vector with cipher block chaining mode
  107. Null Dereference
  108. Object Model Violation: Just One of equals() and hashCode() Defined
  109. Often Misused: Authentication
  110. Often Misused: Exception Handling
  111. Often Misused: File System
  112. Often Misused: Privilege Management
  113. Often Misused: String Management
  114. Omitted break statement
  115. Open forward
  116. Open redirect
  117. Overflow of static internal buffer
  118. Overly-Broad Catch Block
  119. Overly-Broad Throws Declaration
  120. Passing mutable objects to an untrusted method
  121. Password Management: Hardcoded Password
  122. Password Management: Weak Cryptography
  123. Password Plaintext Storage
  124. PHP File Inclusion
  125. Poor Logging Practice: Logger Not Declared Static Final
  126. Poor Logging Practice: Multiple Loggers
  127. Poor Logging Practice: Use of a System Output Stream
  128. Poor Style: Confusing Naming
  129. Poor Style: Empty Synchronized Block
  130. Poor Style: Explicit call to finalize()
  131. Poor Style: Identifier Contains Dollar Symbol ($)
  132. Portability Flaw
  133. Privacy Violation
  134. PRNG Seed Error
  135. Process Control
  136. Publicizing of private data when using inner classes
  137. Race condition in checking for certificate revocation
  138. Race condition in signal handler
  139. Race condition in switch
  140. Race condition within a thread
  141. Race Conditions
  142. Reflection attack in an auth protocol
  143. Reflection injection
  144. Relative path library search
  145. Reliance on data layout
  146. Relying on package-level scope
  147. Resource exhaustion
  148. Return Inside Finally Block
  149. Reusing a nonce, key pair in encryption
  150. Sign extension error
  151. Signed to unsigned conversion error
  152. Stack overflow
  153. State synchronization error
  154. Storing passwords in a recoverable format
  155. String Termination Error
  156. Struts: Duplicate Validation Forms
  157. Struts: Erroneous validate() Method
  158. Struts: Form Does Not Extend Validation Class
  159. Struts: Form Field Without Validator
  160. Struts: Plug-in Framework Not In Use
  161. Struts: Unused Validation Form
  162. Struts: Unvalidated Action Form
  163. Struts: Validator Turned Off
  164. Struts: Validator Without Form Field
  165. Symbolic name not mapping to correct object
  166. System Information Leak
  167. System Information Leak: Missing Catch Block
  168. Template:Vulnerability
  169. Truncation error
  170. Trust Boundary Violation
  171. Trust of system event data
  172. Trusting self-reported DNS name
  173. Trusting self-reported IP address
  174. Uncaught exception
  175. Unchecked array indexing
  176. Unchecked Return Value: Missing Check against Null
  177. Undefined Behavior
  178. Uninitialized Variable
  179. Unintentional pointer scaling
  180. Unreleased Resource
  181. Unrestricted File Upload
  182. Unsafe function call from a signal handler
  183. Unsafe JNI
  184. Unsafe Mobile Code: Access Violation
  185. Unsafe Mobile Code: Dangerous Array Declaration
  186. Unsafe Mobile Code: Dangerous Public Field
  187. Unsafe Mobile Code: Inner Class
  188. Unsafe Mobile Code: Public finalize() Method
  189. Unsafe Reflection
  190. Unsigned to signed conversion error
  191. Use of hard-coded password
  192. Use of Obsolete Methods
  193. Use of sizeof() on a pointer type
  194. Using a broken or risky cryptographic algorithm
  195. Using a key past its expiration date
  196. Using freed memory
  197. Using password systems
  198. Using referer field for authentication or authorization
  199. Using single-factor authentication
  200. Using the wrong operator
  201. Validation performed in client
  202. Wrap-around error
  203. Write-what-where condition

Back to TOC