ASDR TOC Vulnerabilities

From OWASP
Revision as of 05:58, 11 February 2009 by KirstenS (Talk | contribs)

Jump to: navigation, search

Back to TOC

  1. Access control enforced by presentation layer
  2. Addition of data-structure sentinel
  3. Allowing password aging
  4. ASP.NET Misconfigurations
  5. Assigning instead of comparing
  6. Authentication Bypass via Assumed-Immutable Data
  7. Behavioral problems
  8. Buffer Overflow
  9. Buffer underwrite
  10. Capture-replay
  11. Catch NullPointerException
  12. Code Correctness: Call to System.gc()
  13. Code Correctness: Call to Thread.run()
  14. Code Correctness: Class Does Not Implement Cloneable
  15. Code Correctness: Double-Checked Locking
  16. Code Correctness: Erroneous finalize() Method
  17. Code Correctness: Erroneous String Compare
  18. Code Correctness: Misspelled Method Name
  19. Code Correctness: null Argument to equals()
  20. Comparing classes by name
  21. Comparing instead of assigning
  22. Comprehensive list of Threats to Authentication Procedures and Data
  23. Covert timing channel
  24. CRLF Injection
  25. Cross Site Scripting Flaw
  26. Dangerous Function
  27. Dead Code: Broken Override
  28. Dead Code: Expression is Always False
  29. Dead Code: Expression is Always True
  30. Dead Code: Unused Field
  31. Dead Code: Unused Method
  32. Deletion of data-structure sentinel
  33. Deserialization of untrusted data
  34. Directory Restriction Error
  35. Double Free
  36. Doubly freeing memory
  37. Duplicate key in associative list (alist)
  38. EJB Bad Practices: Use of AWT/Swing
  39. EJB Bad Practices: Use of Class Loader
  40. EJB Bad Practices: Use of java.io
  41. EJB Bad Practices: Use of Sockets
  42. EJB Bad Practices: Use of Synchronization Primitives
  43. Empty Catch Block
  44. Empty String Password
  45. Failure of true random number generator
  46. Failure to account for default case in switch
  47. Failure to add integrity check value
  48. Failure to check for certificate revocation
  49. Failure to check integrity check value
  50. Failure to check whether privileges were dropped successfully
  51. Failure to deallocate data
  52. Failure to drop privileges when reasonable
  53. Failure to encrypt data
  54. Failure to follow guideline/specification
  55. Failure to follow chain of trust in certificate validation
  56. Failure to protect stored data from modification
  57. Failure to provide confidentiality for stored data
  58. Failure to validate certificate expiration
  59. Failure to validate host-specific certificate data
  60. File Access Race Condition: TOCTOU
  61. Format String
  62. Guessed or visible temporary file
  63. Hard-Coded Password
  64. Heap Inspection
  65. Heap overflow
  66. Ignored function return value
  67. Illegal Pointer Value
  68. Improper cleanup on thrown exception
  69. Improper error handling
  70. Improper string length checking
  71. Improper temp file opening
  72. Incorrect block delimitation
  73. Information Leakage
  74. Injection problem
  75. Insecure Compiler Optimization
  76. Insecure Randomness
  77. Insecure Temporary File
  78. Insecure Third Party Domain Access
  79. Insufficient Entropy
  80. Insufficient entropy in pseudo-random number generator
  81. Integer coercion error
  82. Integer overflow
  83. Invoking untrusted mobile code
  84. J2EE Bad Practices: getConnection()
  85. J2EE Bad Practices: JSP Expressions
  86. J2EE Bad Practices: Sockets
  87. J2EE Bad Practices: System.exit()
  88. J2EE Misconfiguration: Insecure Transport
  89. J2EE Misconfiguration: Insufficient Session-ID Length
  90. J2EE Misconfiguration: Missing Error Handling
  91. J2EE Misconfiguration: Unsafe Bean Declaration
  92. J2EE Misconfiguration: Weak Access Permissions
  93. Key exchange without entity authentication
  94. Least Privilege Violation
  95. Leftover Debug Code
  96. Log Forging
  97. Log injection
  98. Member Field Race Condition
  99. Memory leak
  100. Miscalculated null termination
  101. Misinterpreted function return value
  102. Missing parameter
  103. Missing XML Validation
  104. Mutable object returned
  105. Non-cryptographic pseudo-random number generator
  106. Not allowing password aging
  107. Not using a random initialization vector with cipher block chaining mode
  108. Null Dereference
  109. Object Model Violation: Just One of equals() and hashCode() Defined
  110. Often Misused: Authentication
  111. Often Misused: Exception Handling
  112. Often Misused: File System
  113. Often Misused: Privilege Management
  114. Often Misused: String Management
  115. Omitted break statement
  116. Open forward
  117. Open redirect
  118. Overflow of static internal buffer
  119. Overly-Broad Catch Block
  120. Overly-Broad Throws Declaration
  121. Passing mutable objects to an untrusted method
  122. Password Management: Hardcoded Password
  123. Password Management: Weak Cryptography
  124. Password Plaintext Storage
  125. PHP File Inclusion
  126. Poor Logging Practice: Logger Not Declared Static Final
  127. Poor Logging Practice: Multiple Loggers
  128. Poor Logging Practice: Use of a System Output Stream
  129. Poor Style: Confusing Naming
  130. Poor Style: Empty Synchronized Block
  131. Poor Style: Explicit call to finalize()
  132. Poor Style: Identifier Contains Dollar Symbol ($)
  133. Portability Flaw
  134. Privacy Violation
  135. PRNG Seed Error
  136. Process Control
  137. Publicizing of private data when using inner classes
  138. Race condition in checking for certificate revocation
  139. Race condition in signal handler
  140. Race condition in switch
  141. Race condition within a thread
  142. Race Conditions
  143. Reflection attack in an auth protocol
  144. Reflection injection
  145. Relative path library search
  146. Reliance on data layout
  147. Relying on package-level scope
  148. Resource exhaustion
  149. Return Inside Finally Block
  150. Reusing a nonce, key pair in encryption
  151. Sign extension error
  152. Signed to unsigned conversion error
  153. Stack overflow
  154. State synchronization error
  155. Storing passwords in a recoverable format
  156. String Termination Error
  157. Struts: Duplicate Validation Forms
  158. Struts: Erroneous validate() Method
  159. Struts: Form Does Not Extend Validation Class
  160. Struts: Form Field Without Validator
  161. Struts: Plug-in Framework Not In Use
  162. Struts: Unused Validation Form
  163. Struts: Unvalidated Action Form
  164. Struts: Validator Turned Off
  165. Struts: Validator Without Form Field
  166. Symbolic name not mapping to correct object
  167. Template:Vulnerability
  168. Truncation error
  169. Trust Boundary Violation
  170. Trust of system event data
  171. Trusting self-reported DNS name
  172. Trusting self-reported IP address
  173. Uncaught exception
  174. Unchecked array indexing
  175. Unchecked Return Value: Missing Check against Null
  176. Undefined Behavior
  177. Uninitialized Variable
  178. Unintentional pointer scaling
  179. Unreleased Resource
  180. Unrestricted File Upload
  181. Unsafe function call from a signal handler
  182. Unsafe JNI
  183. Unsafe Mobile Code: Access Violation
  184. Unsafe Mobile Code: Dangerous Array Declaration
  185. Unsafe Mobile Code: Dangerous Public Field
  186. Unsafe Mobile Code: Inner Class
  187. Unsafe Mobile Code: Public finalize() Method
  188. Unsafe Reflection
  189. Unsigned to signed conversion error
  190. Use of hard-coded password
  191. Use of Obsolete Methods
  192. Use of sizeof() on a pointer type
  193. Using a broken or risky cryptographic algorithm
  194. Using a key past its expiration date
  195. Using freed memory
  196. Using password systems
  197. Using referer field for authentication or authorization
  198. Using single-factor authentication
  199. Using the wrong operator
  200. Validation performed in client
  201. Wrap-around error
  202. Write-what-where condition

Back to TOC