ASDR TOC Vulnerabilities

From OWASP
Revision as of 05:24, 14 February 2009 by KirstenS (Talk | contribs)

Jump to: navigation, search

Back to TOC

  1. Access control enforced by presentation layer
  2. Addition of data-structure sentinel
  3. Allowing password aging
  4. ASP.NET Misconfigurations
  5. Assigning instead of comparing
  6. Authentication Bypass via Assumed-Immutable Data
  7. Behavioral problems
  8. Buffer Overflow
  9. Buffer underwrite
  10. Capture-replay
  11. Catch NullPointerException
  12. Comparing classes by name
  13. Comparing instead of assigning
  14. Comprehensive list of Threats to Authentication Procedures and Data
  15. Covert timing channel
  16. CRLF Injection
  17. Cross Site Scripting Flaw
  18. Dangerous Function
  19. Deletion of data-structure sentinel
  20. Deserialization of untrusted data
  21. Directory Restriction Error
  22. Double Free
  23. Doubly freeing memory
  24. Duplicate key in associative list (alist)
  25. EJB Bad Practices: Use of AWT/Swing
  26. EJB Bad Practices: Use of Class Loader
  27. EJB Bad Practices: Use of java.io
  28. EJB Bad Practices: Use of Sockets
  29. EJB Bad Practices: Use of Synchronization Primitives
  30. Empty Catch Block
  31. Empty String Password
  32. Failure of true random number generator
  33. Failure to account for default case in switch
  34. Failure to add integrity check value
  35. Failure to check for certificate revocation
  36. Failure to check integrity check value
  37. Failure to check whether privileges were dropped successfully
  38. Failure to deallocate data
  39. Failure to drop privileges when reasonable
  40. Failure to encrypt data
  41. Failure to follow guideline/specification
  42. Failure to follow chain of trust in certificate validation
  43. Failure to protect stored data from modification
  44. Failure to provide confidentiality for stored data
  45. Failure to validate certificate expiration
  46. Failure to validate host-specific certificate data
  47. File Access Race Condition: TOCTOU
  48. Format String
  49. Guessed or visible temporary file
  50. Hard-Coded Password
  51. Heap Inspection
  52. Heap overflow
  53. Ignored function return value
  54. Illegal Pointer Value
  55. Improper cleanup on thrown exception
  56. Improper error handling
  57. Improper string length checking
  58. Improper temp file opening
  59. Incorrect block delimitation
  60. Information Leakage
  61. Injection problem
  62. Insecure Compiler Optimization
  63. Insecure Randomness
  64. Insecure Temporary File
  65. Insecure Third Party Domain Access
  66. Insufficient Entropy
  67. Insufficient entropy in pseudo-random number generator
  68. Integer coercion error
  69. Integer overflow
  70. Invoking untrusted mobile code
  71. J2EE Bad Practices: getConnection()
  72. J2EE Bad Practices: JSP Expressions
  73. J2EE Bad Practices: Sockets
  74. J2EE Bad Practices: System.exit()
  75. J2EE Misconfiguration: Insecure Transport
  76. J2EE Misconfiguration: Insufficient Session-ID Length
  77. J2EE Misconfiguration: Missing Error Handling
  78. J2EE Misconfiguration: Unsafe Bean Declaration
  79. J2EE Misconfiguration: Weak Access Permissions
  80. Key exchange without entity authentication
  81. Least Privilege Violation
  82. Leftover Debug Code
  83. Log Forging
  84. Log injection
  85. Member Field Race Condition
  86. Memory leak
  87. Miscalculated null termination
  88. Misinterpreted function return value
  89. Missing parameter
  90. Missing XML Validation
  91. Mutable object returned
  92. Non-cryptographic pseudo-random number generator
  93. Not allowing password aging
  94. Not using a random initialization vector with cipher block chaining mode
  95. Null Dereference
  96. Object Model Violation: Just One of equals() and hashCode() Defined
  97. Often Misused: Authentication
  98. Often Misused: Exception Handling
  99. Often Misused: File System
  100. Often Misused: Privilege Management
  101. Often Misused: String Management
  102. Omitted break statement
  103. Open forward
  104. Open redirect
  105. Overflow of static internal buffer
  106. Overly-Broad Catch Block
  107. Overly-Broad Throws Declaration
  108. Passing mutable objects to an untrusted method
  109. Password Management: Hardcoded Password
  110. Password Management: Weak Cryptography
  111. Password Plaintext Storage
  112. PHP File Inclusion
  113. Poor Logging Practice: Logger Not Declared Static Final
  114. Poor Logging Practice: Multiple Loggers
  115. Poor Logging Practice: Use of a System Output Stream
  116. Poor Style: Confusing Naming
  117. Poor Style: Empty Synchronized Block
  118. Poor Style: Explicit call to finalize()
  119. Poor Style: Identifier Contains Dollar Symbol ($)
  120. Portability Flaw
  121. Privacy Violation
  122. PRNG Seed Error
  123. Process Control
  124. Publicizing of private data when using inner classes
  125. Race condition in checking for certificate revocation
  126. Race condition in signal handler
  127. Race condition in switch
  128. Race condition within a thread
  129. Race Conditions
  130. Reflection attack in an auth protocol
  131. Reflection injection
  132. Relative path library search
  133. Reliance on data layout
  134. Relying on package-level scope
  135. Resource exhaustion
  136. Return Inside Finally Block
  137. Reusing a nonce, key pair in encryption
  138. Sign extension error
  139. Signed to unsigned conversion error
  140. Stack overflow
  141. State synchronization error
  142. Storing passwords in a recoverable format
  143. String Termination Error
  144. Struts: Duplicate Validation Forms
  145. Struts: Erroneous validate() Method
  146. Struts: Form Does Not Extend Validation Class
  147. Struts: Form Field Without Validator
  148. Struts: Plug-in Framework Not In Use
  149. Struts: Unused Validation Form
  150. Struts: Unvalidated Action Form
  151. Struts: Validator Turned Off
  152. Struts: Validator Without Form Field
  153. Symbolic name not mapping to correct object
  154. Template:Vulnerability
  155. Truncation error
  156. Trust Boundary Violation
  157. Trust of system event data
  158. Trusting self-reported DNS name
  159. Trusting self-reported IP address
  160. Uncaught exception
  161. Unchecked array indexing
  162. Unchecked Return Value: Missing Check against Null
  163. Undefined Behavior
  164. Uninitialized Variable
  165. Unintentional pointer scaling
  166. Unreleased Resource
  167. Unrestricted File Upload
  168. Unsafe function call from a signal handler
  169. Unsafe JNI
  170. Unsafe Mobile Code: Access Violation
  171. Unsafe Mobile Code: Dangerous Array Declaration
  172. Unsafe Mobile Code: Dangerous Public Field
  173. Unsafe Mobile Code: Inner Class
  174. Unsafe Mobile Code: Public finalize() Method
  175. Unsafe Reflection
  176. Unsigned to signed conversion error
  177. Use of hard-coded password
  178. Use of Obsolete Methods
  179. Use of sizeof() on a pointer type
  180. Using a broken or risky cryptographic algorithm
  181. Using a key past its expiration date
  182. Using freed memory
  183. Using password systems
  184. Using referer field for authentication or authorization
  185. Using single-factor authentication
  186. Using the wrong operator
  187. Validation performed in client
  188. Wrap-around error
  189. Write-what-where condition

Back to TOC