0% found this document useful (0 votes)
46 views21 pages

Weakness

The document lists various potential security weaknesses and vulnerabilities categorized by their respective Common Weakness Enumeration (CWE) and Common Attack Pattern Enumeration and Classification (CAPEC) identifiers. It includes a wide range of issues such as authentication bypass, buffer overflows, and path traversal, among others. Users are prompted to select the most relevant type of weakness or report multiple distinct weaknesses.

Uploaded by

lipehew309
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
46 views21 pages

Weakness

The document lists various potential security weaknesses and vulnerabilities categorized by their respective Common Weakness Enumeration (CWE) and Common Attack Pattern Enumeration and Classification (CAPEC) identifiers. It includes a wide range of issues such as authentication bypass, buffer overflows, and path traversal, among others. Users are prompted to select the most relevant type of weakness or report multiple distinct weaknesses.

Uploaded by

lipehew309
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 21

Weakness

Select the type of the potential issue you have discovered. Can't pick just one?
Select the best match or submit a separate report for each distinct weakness.

Absolute Path Traversal(CWE-36)

Absolute Path Traversal(CAPEC-597)

Acceptance of Extraneous Untrusted Data With Trusted Data(CWE-349)

Access Control Check Implemented After Asset is Accessed(CWE-1280)

Accessing Functionality Not Properly Constrained by ACLs(CAPEC-1)

Accessing/Intercepting/Modifying HTTP Cookies(CAPEC-31)

Access of Memory Location After End of Buffer(CWE-788)

Access of Memory Location Before Start of Buffer(CWE-786)

Access of Uninitialized Pointer(CWE-824)

Access to Critical Private Variable via Public Method(CWE-767)

Account Footprinting(CAPEC-575)

Action Spoofing(CAPEC-173)

Active OS Fingerprinting(CAPEC-312)

Adding a Space to a File Extension(CAPEC-649)

Addition of Data Structure Sentinel(CWE-464)

Add Malicious File to Shared Webroot(CAPEC-563)

Adversary in the Browser (AiTB)(CAPEC-662)

Adversary in the Middle (AiTM)(CAPEC-94)

AJAX Footprinting(CAPEC-85)

Allocation of File Descriptors or Handles Without Limits or Throttling(CWE-774)

Allocation of Resources Without Limits or Throttling(CWE-770)

Alteration of a Software Update(CAPEC-669)

Altered Component Firmware(CAPEC-638)

Altered Installed BIOS(CAPEC-532)

Alternative Execution Due to Deceptive Filenames(CAPEC-635)

Always-Incorrect Control Flow Implementation(CWE-670)

Amplification(CAPEC-490)

Analysis of Packet Timing and Sizes(CAPEC-621)


Android Activity Hijack(CAPEC-501)

Android Intent Intercept(CAPEC-499)

Application API Button Hijacking(CAPEC-388)

Application API Message Manipulation via Man-in-the-Middle(CAPEC-384)

Application API Navigation Remapping(CAPEC-386)

Application Fingerprinting(CAPEC-541)

Application-Level Admin Tool with Inconsistent View of Underlying Operating


System(CWE-1249)

Architecture with Number of Horizontal Layers Outside of Expected Range(CWE-1044)

Argument Injection(CAPEC-6)

Array Declared Public, Final, and Static(CWE-582)

Array Index Underflow(CWE-129)

Artificially Inflate File Sizes(CAPEC-572)

ASIC With Malicious Functionality(CAPEC-539)

ASP.NET Misconfiguration: Creating Debug Binary(CWE-11)

ASP.NET Misconfiguration: Improper Model Validation(CWE-1174)

ASP.NET Misconfiguration: Missing Custom Error Page(CWE-12)

ASP.NET Misconfiguration: Not Using Input Validation Framework(CWE-554)

ASP.NET Misconfiguration: Password in Configuration File(CWE-13)

ASP.NET Misconfiguration: Use of Identity Impersonation(CWE-556)

Assigning instead of Comparing(CWE-481)

Assignment of a Fixed Address to a Pointer(CWE-587)

Assignment to Variable without Use(CWE-563)

Assumed-Immutable Data is Stored in Writable Memory(CWE-1282)

Asymmetric Resource Consumption (Amplification)(CWE-405)

Attempt to Access Child of a Non-structure Pointer(CWE-588)

Audit Log Manipulation(CAPEC-268)

Authentication Abuse(CAPEC-114)

Authentication Bypass(CAPEC-115)

Authentication Bypass by Alternate Name(CWE-289)


Authentication Bypass by Assumed-Immutable Data(CWE-302)

Authentication Bypass by Capture-replay(CWE-294)

Authentication Bypass by Primary Weakness(CWE-305)

Authentication Bypass by Spoofing(CWE-290)

Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are
Created(CWE-593)

Authentication Bypass Using an Alternate Path or Channel(CWE-288)

Authorization Bypass Through User-Controlled SQL Primary Key(CWE-566)

Automated Recognition Mechanism with Inadequate Detection or Handling of


Adversarial Input Perturbations(CWE-1039)

Avoid Security Tool Identification by Adding Data(CAPEC-655)

Behavioral Change in New Version or Environment(CWE-439)

BGP Route Disabling(CAPEC-584)

Binding to an Unrestricted IP Address(CWE-1327)

BitSquatting(CAPEC-611)

Black Box Reverse Engineering(CAPEC-189)

Blind SQL Injection(CAPEC-7)

Block Access to Libraries(CAPEC-96)

Blockage(CAPEC-603)

Block Logging to Central Repository(CAPEC-571)

Blue Boxing(CAPEC-5)

BlueSmacking(CAPEC-666)

Bluetooth Impersonation AttackS (BIAS)(CAPEC-667)

Browser Fingerprinting(CAPEC-472)

Browser in the Middle (BiTM)(CAPEC-701)

Brute Force(CAPEC-112)

Buffer Access Using Size of Source Buffer(CWE-806)

Buffer Access with Incorrect Length Value(CWE-805)

Buffer Manipulation(CAPEC-123)

Buffer Overflow in an API Call(CAPEC-8)


Buffer Overflow in Local Command-Line Utilities(CAPEC-9)

Buffer Overflow via Environment Variables(CAPEC-10)

Buffer Overflow via Parameter Expansion(CAPEC-47)

Buffer Overflow via Symbolic Links(CAPEC-45)

Buffer Over-read(CWE-126)

Buffer Underflow(CWE-124)

Buffer Under-read(CWE-127)

Business Logic Errors(CWE-840)

Bypassing ATA Password Security(CAPEC-402)

Bypassing Electronic Locks and Access Controls(CAPEC-395)

Bypassing of Intermediate Forms in Multiple-Form Sets(CAPEC-140)

Bypassing Physical Locks(CAPEC-391)

Bypassing Physical Security(CAPEC-390)

Cache Poisoning(CAPEC-141)

Callable with Insufficient Behavioral Summary(CWE-1117)

Calling Micro-Services Directly(CAPEC-179)

Call to Non-ubiquitous API(CWE-589)

Call to Thread run() instead of start()(CWE-572)

Capture Credentials via Keylogger(CAPEC-568)

Carry-Off GPS Attack(CAPEC-628)

Cause Web Server Misclassification(CAPEC-11)

Cellular Broadcast Message Request(CAPEC-618)

Cellular Data Injection(CAPEC-610)

Cellular Jamming(CAPEC-605)

Cellular Rogue Base Station(CAPEC-617)

Cellular Traffic Intercept(CAPEC-609)

Checksum Spoofing(CAPEC-145)

Choosing Message Identifier(CAPEC-12)

Classic Buffer Overflow(CWE-120)

Class Instance Self Destruction Control Element(CWE-1082)


Class with Excessively Deep Inheritance(CWE-1074)

Class with Excessive Number of Child Classes(CWE-1086)

Class with Virtual Method without a Virtual Destructor(CWE-1087)

Cleartext Storage in a File or on Disk(CWE-313)

Cleartext Storage in the Registry(CWE-314)

Cleartext Storage of Sensitive Information(CWE-312)

Cleartext Storage of Sensitive Information in a Cookie(CWE-315)

Cleartext Storage of Sensitive Information in Executable(CWE-318)

Cleartext Storage of Sensitive Information in GUI(CWE-317)

Cleartext Storage of Sensitive Information in Memory(CWE-316)

Cleartext Transmission of Sensitive Information(CWE-319)

Client-Server Protocol Manipulation(CAPEC-220)

Client-Side Enforcement of Server-Side Security(CWE-602)

Client-side Injection-induced Buffer Overflow(CAPEC-14)

Cloneable Class Containing Sensitive Information(CWE-498)

clone() Method Without super.clone()(CWE-580)

Cloning Magnetic Strip Cards(CAPEC-397)

Cloning RFID Cards or Chips(CAPEC-399)

Code Inclusion(CAPEC-175)

Code Injection(CAPEC-242)

Code Injection(CWE-94)

Collapse of Data into Unsafe Value(CWE-182)

Collect Data as Provided by Users(CAPEC-569)

Collect Data from Clipboard(CAPEC-637)

Collect Data from Common Resource Locations(CAPEC-150)

Collect Data from Registries(CAPEC-647)

Collect Data from Screen Capture(CAPEC-648)

Command Delimiters(CAPEC-15)

Command Injection(CAPEC-248)
Command Injection - Generic(CWE-77)

Command Line Execution through SQL Injection(CAPEC-108)

Command Shell in Externally Accessible Directory(CWE-553)

Communication Channel Manipulation(CAPEC-216)

Comparing instead of Assigning(CWE-482)

Comparison Logic is Vulnerable to Power Side-Channel Attacks(CWE-1255)

Comparison of Classes by Name(CWE-486)

Comparison of Incompatible Types(CWE-1024)

Comparison of Object References Instead of Object Contents(CWE-595)

Comparison Using Wrong Factors(CWE-1025)

Compilation with Insufficient Warnings or Errors(CWE-1127)

Compiler Optimization Removal or Modification of Security-critical Code(CWE-733)

Compiler Removal of Code to Clear Buffers(CWE-14)

Compromising Emanations Attack(CAPEC-623)

Concurrent Execution using Shared Resource with Improper Synchronization ('Race


Condition')(CWE-362)

Configuration/Environment Manipulation(CAPEC-176)

Connection Reset(CAPEC-595)

Contaminate Resource(CAPEC-548)

Content Spoofing(CAPEC-148)

Content Spoofing Via Application API Manipulation(CAPEC-389)

Context Switching Race Condition(CWE-368)

Contradictory Destinations in Traffic Routing Schemes(CAPEC-481)

Counterfeit GPS Signals(CAPEC-627)

Counterfeit Hardware Component Inserted During Product Assembly(CAPEC-520)

Counterfeit Organizations(CAPEC-544)

Counterfeit Websites(CAPEC-543)

Covert Channel(CWE-514)

Covert Storage Channel(CWE-515)

Covert Timing Channel(CWE-385)


CPU Hardware Not Configured to Support Exclusivity of Write and Execute
Operations(CWE-1252)

Create files with the same name as files protected with a higher
classification(CAPEC-177)

Create Malicious Client(CAPEC-202)

Creating a Rogue Certification Authority Certificate(CAPEC-459)

Creation of chroot Jail Without Changing Working Directory(CWE-243)

Creation of Class Instance within a Static Code Block(CWE-1063)

Creation of Emergent Resource(CWE-1229)

Creation of Immutable Text Using String Concatenation(CWE-1046)

Creation of Temporary File in Directory with Insecure Permissions(CWE-379)

Creation of Temporary File With Insecure Permissions(CWE-378)

Credential Prompt Impersonation(CAPEC-654)

Credential Stuffing(CAPEC-600)

Critical Data Element Declared Public(CWE-766)

Critical Public Variable Without Final Modifier(CWE-493)

CRLF Injection(CWE-93)

Cross-Domain Search Timing(CAPEC-462)

Cross Frame Scripting (XFS)(CAPEC-587)

Cross-Site Flashing(CAPEC-178)

Cross Site Identification(CAPEC-467)

Cross Site Request Forgery(CAPEC-62)

Cross-Site Request Forgery (CSRF)(CWE-352)

Cross-Site Scripting (XSS)(CAPEC-63)

Cross-site Scripting (XSS) - DOM(CWE-79)

Cross-site Scripting (XSS) - Generic(CWE-79)

Cross-site Scripting (XSS) - Reflected(CWE-79)

Cross-site Scripting (XSS) - Stored(CWE-79)

Cross Site Tracing(CAPEC-107)

Cross Zone Scripting(CAPEC-104)

Cryptanalysis(CAPEC-97)
Cryptanalysis of Cellular Encryption(CAPEC-608)

Cryptographic Issues - Generic(CWE-310)

Cryptographic Operations are run Before Supporting Units are Ready(CWE-1279)

Dangerous Signal Handler not Disabled During Sensitive Operations(CWE-432)

Dangling Database Cursor ('Cursor Injection')(CWE-619)

Data Access from Outside Expected Data Manager Component(CWE-1083)

Data Access Operations Outside of Expected Data Manager Component(CWE-1057)

Data Element Aggregating an Excessively Large Number of Non-Primitive Elements(CWE-


1043)

Data Element containing Pointer Item without Proper Copy Control Element(CWE-1098)

Data Injected During Configuration(CAPEC-536)

Data Interchange Protocol Manipulation(CAPEC-277)

Data Resource Access without Use of Connection Pooling(CWE-1072)

Data Serialization External Entities Blowup(CAPEC-221)

Dead Code(CWE-561)

Deadlock(CWE-833)

Debug Messages Revealing Unnecessary Information(CWE-1295)

Declaration of Catch for Generic Exception(CWE-396)

Declaration of Throws for Generic Exception(CWE-397)

Declaration of Variable with Unnecessarily Wide Scope(CWE-1126)

Deletion of Data Structure Sentinel(CWE-463)

Uncontrolled Resource Consumption(CWE-400)

Dependency on Vulnerable Third-Party Component(CWE-1395)

Deployment of Wrong Handler(CWE-430)

DEPRECATED: Abuse of Transaction Data Structure(CAPEC-257)

DEPRECATED: Apple '.DS_Store'(CWE-71)

DEPRECATED: Authentication Bypass Issues(CWE-592)

DEPRECATED: Bypassing Card or Badge-Based Systems(CAPEC-396)

DEPRECATED: Catching exception throw/signal from privileged block(CAPEC-236)

DEPRECATED: Code Injection(CAPEC-241)


DEPRECATED: Containment Errors (Container Errors)(CWE-216)

DEPRECATED: Covert Timing Channel(CWE-516)

DEPRECATED: Degradation(CAPEC-602)

DEPRECATED: Directory Traversal(CAPEC-213)

DEPRECATED: DTD Injection in a SOAP Message(CAPEC-254)

DEPRECATED: Dump Password Hashes(CAPEC-566)

DEPRECATED: Environment Variable Manipulation(CAPEC-264)

DEPRECATED: Failure to Protect Stored Data from Modification(CWE-217)

DEPRECATED: Failure to provide confidentiality for stored data(CWE-218)

DEPRECATED: Fuzzing for garnering J2EE/.NET-based stack traces, for application


mapping(CAPEC-214)

DEPRECATED: General Information Management Problems(CWE-225)

DEPRECATED: Global variable manipulation(CAPEC-265)

DEPRECATED: HTTP response splitting(CWE-443)

DEPRECATED: ICMP Echo Request Ping(CAPEC-288)

DEPRECATED: ICMP Fingerprinting Probes(CAPEC-316)

DEPRECATED: Implementing a callback to system routine (old AWT Queue)(CAPEC-235)

DEPRECATED: Improper Sanitization of Custom Special Characters(CWE-92)

DEPRECATED: Incorrect Initialization(CWE-458)

DEPRECATED: Incorrect Semantic Object Comparison(CWE-596)

DEPRECATED: Information Exposure Through Cleanup Log Files(CWE-542)

DEPRECATED: Information Exposure Through Debug Log Files(CWE-534)

DEPRECATED: Information Exposure Through Server Log Files(CWE-533)

DEPRECATED: Information Gathering from Non-Traditional Sources(CAPEC-409)

DEPRECATED: Information Gathering from Traditional Sources(CAPEC-408)

DEPRECATED: Infrastructure-based footprinting(CAPEC-289)

DEPRECATED: IP Fingerprinting Probes(CAPEC-314)

DEPRECATED: Leveraging web tools (e.g. Mozilla's GreaseMonkey, Firebug) to change


application behavior(CAPEC-211)

DEPRECATED: Lifting credential(s)/key material embedded in client distributions


(thick or thin)(CAPEC-205)
DEPRECATED: Linux Terminal Injection(CAPEC-249)

DEPRECATED: Malicious Logic Insertion via Counterfeit Hardware(CAPEC-453)

DEPRECATED: Malicious Logic Insertion via Inclusion of Counterfeit Hardware


Components(CAPEC-455)

DEPRECATED: Malware Propagation via Infected Peripheral Device(CAPEC-451)

DEPRECATED: Malware Propagation via USB Stick(CAPEC-449)

DEPRECATED: Malware Propagation via USB U3 Autorun(CAPEC-450)

DEPRECATED: Manipulate Canonicalization(CAPEC-266)

DEPRECATED: Miscalculated Null Termination(CWE-132)

DEPRECATED: Modification of Existing Components with Counterfeit Hardware(CAPEC-


454)

DEPRECATED: Obtain Data via Utilities(CAPEC-567)

DEPRECATED: Often Misused: Path Manipulation(CWE-249)

DEPRECATED: OS Fingerprinting(CAPEC-311)

DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an


Authorized Client During Dynamic Update(CAPEC-258)

DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an


Authorized Client During Initial Distribution(CAPEC-260)

DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an


Authorized Client During Patching(CAPEC-259)

DEPRECATED: Pretexting(CAPEC-411)

DEPRECATED: Proxied Trusted Channel(CWE-423)

DEPRECATED: Race Condition in Switch(CWE-365)

DEPRECATED: Registry Manipulation(CAPEC-269)

DEPRECATED: Reliance on DNS Lookups in a Security Decision(CWE-247)

DEPRECATED: Removing/short-circuiting 'guard logic'(CAPEC-56)

DEPRECATED: Schedule Software To Run(CAPEC-557)

DEPRECATED: Signature-Based Avoidance(CAPEC-570)

DEPRECATED: SOAP Parameter Tampering(CAPEC-280)

DEPRECATED: Social Information Gathering Attacks(CAPEC-404)

DEPRECATED: Social Information Gathering via Research(CAPEC-405)

DEPRECATED: State Synchronization Error(CWE-373)


DEPRECATED: Subversion of Authorization Checks: Cache Filtering, Programmatic
Security, etc.(CAPEC-239)

DEPRECATED: Target Influence via Micro-Expressions(CAPEC-430)

DEPRECATED: Target Influence via Neuro-Linguistic Programming (NLP)(CAPEC-431)

DEPRECATED: Target Influence via Perception of Concession(CAPEC-419)

DEPRECATED: Target Influence via Voice in NLP(CAPEC-432)

DEPRECATED: TCP/IP Fingerprinting Probes(CAPEC-315)

DEPRECATED: Trusting Self-reported DNS Name(CWE-292)

DEPRECATED: Uncontrolled File Descriptor Consumption(CWE-769)

DEPRECATED: Use of Dynamic Class Loading(CWE-545)

DEPRECATED: Use of Uninitialized Resource(CWE-1187)

DEPRECATED: Using URL/codebase / G.A.C. (code source) to convince sandbox of


privilege(CAPEC-238)

DEPRECATED: Variable Manipulation(CAPEC-171)

DEPRECATED: Violating Implicit Assumptions Regarding XML Content (aka XML Denial of
Service (XDoS))(CAPEC-82)

DEPRECATED: XML Client-Side Attack(CAPEC-484)

DEPRECATED: XML Parser Attack(CAPEC-99)

DEPRECATED: XSS in IMG Tags(CAPEC-91)

DEPRECATED: XSS through Log Files(CAPEC-106)

DEPRECATED: XSS Using Flash(CAPEC-246)

Deserialization of Untrusted Data(CWE-502)

Design Alteration(CAPEC-447)

Design for FPGA Maliciously Altered(CAPEC-674)

Detection of Error Condition Without Action(CWE-390)

Detect Unpublicized Web Pages(CAPEC-143)

Detect Unpublicized Web Services(CAPEC-144)

Developer Signing Maliciously Altered Software(CAPEC-673)

Development Alteration(CAPEC-444)

Device Unlock Credential Sharing(CWE-1273)

DHCP Spoofing(CAPEC-697)
Dictionary-based Password Attack(CAPEC-16)

Directory Indexing(CAPEC-127)

Direct Use of Unsafe JNI(CWE-111)

Disable Security Software(CAPEC-578)

Disabling Network Hardware(CAPEC-583)

Divide By Zero(CWE-369)

DLL Side-Loading(CAPEC-641)

DMA Device Enabled Too Early in Boot Phase(CWE-1190)

DNS Blocking(CAPEC-589)

DNS Cache Poisoning(CAPEC-142)

DNS Domain Seizure(CAPEC-585)

DNS Rebinding(CAPEC-275)

DNS Spoofing(CAPEC-598)

DNS Zone Transfers(CAPEC-291)

Documentation Alteration to Cause Errors in System Design(CAPEC-519)

Documentation Alteration to Circumvent Dial-down(CAPEC-517)

Documentation Alteration to Produce Under-performing Systems(CAPEC-518)

DOM-Based XSS(CAPEC-588)

Double-Checked Locking(CWE-609)

Doubled Character XSS Manipulations(CWE-85)

Double Decoding of the Same Data(CWE-174)

Double Encoding(CAPEC-120)

Double Free(CWE-415)

Download of Code Without Integrity Check(CWE-494)

Drop Encryption Level(CAPEC-620)

DTD Injection(CAPEC-228)

Dumpster Diving(CAPEC-406)

Duplicate Key in Associative List (Alist)(CWE-462)

Dynamic Variable Evaluation(CWE-627)


Eavesdropping(CAPEC-651)

Eavesdropping on a Monitor(CAPEC-699)

EJB Bad Practices: Use of AWT Swing(CWE-575)

EJB Bad Practices: Use of Class Loader(CWE-578)

EJB Bad Practices: Use of Java I/O(CWE-576)

EJB Bad Practices: Use of Sockets(CWE-577)

EJB Bad Practices: Use of Synchronization Primitives(CWE-574)

Electromagnetic Side-Channel Attack(CAPEC-622)

Email Injection(CAPEC-134)

Embedded Malicious Code(CWE-506)

Embedding NULL Bytes(CAPEC-52)

Embedding Scripts within Scripts(CAPEC-19)

Embed Virus into DLL(CAPEC-448)

Empty Code Block(CWE-1071)

Empty Exception Block(CWE-1069)

Empty Password in Configuration File(CWE-258)

Empty Synchronized Block(CWE-585)

Encoding Error(CWE-172)

Encryption Brute Forcing(CAPEC-20)

Enumerate Mail Exchange (MX) Records(CAPEC-290)

Escaping a Sandbox by Calling Code in Another Language(CAPEC-237)

Escaping Virtualization(CAPEC-480)

Establish Rogue Location(CAPEC-616)

Evercookie(CAPEC-464)

Evil Twin Wi-Fi Attack(CAPEC-615)

Excavation(CAPEC-116)

Excessive Allocation(CAPEC-130)

Excessive Attack Surface(CWE-1125)

Excessive Code Complexity(CWE-1120)

Excessive Data Query Operations in a Large Data Table(CWE-1049)


Excessive Execution of Sequential Searches of Data Resource(CWE-1067)

Excessive Halstead Complexity(CWE-1122)

Excessive Index Range Scan for a Data Resource(CWE-1094)

Excessive Iteration(CWE-834)

Excessively Complex Data Representation(CWE-1093)

Excessively Deep Nesting(CWE-1124)

Excessive McCabe Cyclomatic Complexity(CWE-1121)

Excessive Number of Inefficient Server-Side Data Accesses(CWE-1060)

Excessive Platform Resource Consumption within a Loop(CWE-1050)

Excessive Reliance on Global Variables(CWE-1108)

Excessive Use of Hard-Coded Literals in Initialization(CWE-1052)

Excessive Use of Self-Modifying Code(CWE-1123)

Excessive Use of Unconditional Branching(CWE-1119)

Executable Regular Expression Error(CWE-624)

Execution After Redirect (EAR)(CWE-698)

Execution with Unnecessary Privileges(CWE-250)

Expanding Control over the Operating System from the Database(CAPEC-470)

Expected Behavior Violation(CWE-440)

Expired Pointer Dereference(CWE-825)

Explicit Call to Finalize()(CWE-586)

Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities(CAPEC-682)

Exploitation of Improperly Configured or Implemented Memory Protections(CAPEC-679)

Exploitation of Improperly Controlled Hardware Security Identifiers(CAPEC-681)

Exploitation of Improperly Controlled Registers(CAPEC-680)

Exploitation of Thunderbolt Protection Flaws(CAPEC-665)

Exploitation of Transient Instruction Execution(CAPEC-663)

Exploitation of Trusted Identifiers(CAPEC-21)

Exploiting Incorrect Chaining or Granularity of Hardware Debug Components(CAPEC-


702)

Exploiting Incorrectly Configured Access Control Security Levels(CAPEC-180)


Exploiting Incorrectly Configured SSL/TLS(CAPEC-217)

Exploiting Multiple Input Interpretation Layers(CAPEC-43)

Exploiting Trust in Client(CAPEC-22)

Exploit Non-Production Interfaces(CAPEC-121)

Exploit Script-Based APIs(CAPEC-160)

Explore for Predictable Temporary File Names(CAPEC-149)

Exponential Data Expansion(CAPEC-197)

Exposed Dangerous Method or Function(CWE-749)

Exposed IOCTL with Insufficient Access Control(CWE-782)

Exposed Unsafe ActiveX Method(CWE-618)

Exposure of Access Control List Files to an Unauthorized Control Sphere(CWE-529)

Exposure of Backup File to an Unauthorized Control Sphere(CWE-530)

Exposure of Core Dump File to an Unauthorized Control Sphere(CWE-528)

Exposure of Data Element to Wrong Session(CWE-488)

Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')


(CWE-403)

Exposure of Information Through Shell Error Message(CWE-535)

Exposure of Resource to Wrong Sphere(CWE-668)

Exposure of Sensitive Information Due to Incompatible Policies(CWE-213)

Exposure of Sensitive Information Through Data Queries(CWE-202)

Exposure of Sensitive Information Through Environmental Variables(CWE-526)

Exposure of Sensitive Information Through Metadata(CWE-1230)

Exposure of Sensitive System Information Due to Uncleared Debug Information(CWE-


1258)

Exposure of Sensitive System Information to an Unauthorized Control Sphere(CWE-497)

Exposure of Version-Control Repository to an Unauthorized Control Sphere(CWE-527)

Exposure of WSDL File Containing Sensitive Information(CWE-651)

Expression is Always False(CWE-570)

Expression is Always True(CWE-571)

External Control of Assumed-Immutable Web Parameter(CWE-472)


External Control of Critical State Data(CWE-642)

External Control of File Name or Path(CWE-73)

External Control of System or Configuration Setting(CWE-15)

External Influence of Sphere Definition(CWE-673)

External Initialization of Trusted Variables or Data Stores(CWE-454)

Externally Controlled Reference to a Resource in Another Sphere(CWE-610)

Externally-Generated Error Message Containing Sensitive Information(CWE-211)

Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and


Unprotected Ranges(CWE-1316)

Failure to Disable Reserved Bits(CWE-1209)

Failure to Handle Incomplete Element(CWE-239)

Failure to Handle Missing Parameter(CWE-234)

Failure to Sanitize Paired Delimiters(CWE-157)

Failure to Sanitize Special Elements into a Different Plane (Special Element


Injection)(CWE-75)

Fake the Source of Data(CAPEC-194)

File and Directory Information Exposure(CWE-538)

File Content Injection(CAPEC-23)

File Discovery(CAPEC-497)

File Manipulation(CAPEC-165)

Files or Directories Accessible to External Parties(CWE-552)

Filter Failure through Buffer Overflow(CAPEC-24)

finalize() Method Declared Public(CWE-583)

finalize() Method Without super.finalize()(CWE-568)

Fingerprinting(CAPEC-224)

Firmware Not Updateable(CWE-1277)

Flash File Overlay(CAPEC-181)

Flash Injection(CAPEC-182)

Flash Memory Attacks(CAPEC-458)

Flash Parameter Injection(CAPEC-174)

Floating Point Comparison with Incorrect Operator(CWE-1077)


Flooding(CAPEC-125)

Footprinting(CAPEC-169)

Forced Browsing(CWE-425)

Forced Deadlock(CAPEC-25)

Forced Integer Overflow(CAPEC-92)

Forceful Browsing(CAPEC-87)

Force the System to Reset Values(CAPEC-166)

Force Use of Corrupted Files(CAPEC-263)

Format String Injection(CAPEC-135)

Free of Memory not on the Heap(CWE-590)

Free of Pointer not at Start of Buffer(CWE-761)

Functionality Bypass(CAPEC-554)

Functionality Misuse(CAPEC-212)

Function Call With Incorrect Argument Type(CWE-686)

Function Call with Incorrectly Specified Arguments(CWE-628)

Function Call With Incorrectly Specified Argument Value(CWE-687)

Function Call With Incorrect Number of Arguments(CWE-685)

Function Call With Incorrect Order of Arguments(CWE-683)

Function Call With Incorrect Variable or Reference as Argument(CWE-688)

Fuzzing(CAPEC-28)

Fuzzing for application mapping(CAPEC-215)

Fuzzing for garnering other adjacent user/sensitive data(CAPEC-261)

Generation of Incorrect Security Tokens(CWE-1270)

Generation of Predictable IV with CBC Mode(CWE-329)

Generation of Predictable Numbers or Identifiers(CWE-340)

Generation of Weak Initialization Vector (IV)(CWE-1204)

Generic Cross-Browser Cross-Domain Theft(CAPEC-468)

Group Permission Footprinting(CAPEC-576)

Guessable CAPTCHA(CWE-804)
Hardware Allows Activation of Test or Debug Logic at Runtime(CWE-1313)

Hardware Child Block Incorrectly Connected to Parent System(CWE-1276)

Hardware Component Substitution(CAPEC-531)

Hardware Component Substitution During Baselining(CAPEC-516)

Hardware Design Specifications Are Altered(CAPEC-521)

Hardware Fault Injection(CAPEC-624)

Hardware Integrity Attack(CAPEC-440)

Hardware Internal or Debug Modes Allow Override of Locks(CWE-1234)

Hardware Logic Contains Race Conditions(CWE-1298)

Hardware Logic with Insecure De-Synchronization between Control and Data


Channels(CWE-1264)

Harvesting Information via API Event Monitoring(CAPEC-383)

Heap Overflow(CWE-122)

Hidden Functionality(CWE-912)

Hiding Malicious Data or Code within Files(CAPEC-636)

Hijacking a privileged process(CAPEC-234)

Hijacking a Privileged Thread of Execution(CAPEC-30)

Homograph Attack via Homoglyphs(CAPEC-632)

Host Discovery(CAPEC-292)

HTTP DoS(CAPEC-469)

HTTP Flood(CAPEC-488)

HTTP Parameter Pollution (HPP)(CAPEC-460)

HTTP Request Smuggling(CWE-444)

HTTP Request Smuggling(CAPEC-33)

HTTP Request Splitting(CAPEC-105)

HTTP Response Smuggling(CAPEC-273)

HTTP Response Splitting(CWE-113)

HTTP Response Splitting(CAPEC-34)

HTTP Verb Tampering(CAPEC-274)

ICMP Address Mask Request(CAPEC-294)


ICMP Echo Request Ping(CAPEC-285)

ICMP Error Message Echoing Integrity Probe(CAPEC-330)

ICMP Error Message Quoting Probe(CAPEC-329)

ICMP Flood(CAPEC-487)

ICMP Fragmentation(CAPEC-496)

ICMP Information Request(CAPEC-296)

ICMP IP 'ID' Field Error Message Probe(CAPEC-332)

ICMP IP Total Length Field Probe(CAPEC-331)

Identify Shared Files/Directories on System(CAPEC-643)

Identity Spoofing(CAPEC-151)

iFrame Overlay(CAPEC-222)

IMAP/SMTP Command Injection(CAPEC-183)

Improper Access Control Applied to Mirrored or Aliased Memory Regions(CWE-1257)

Improper Access Control for Register Interface(CWE-1262)

Improper Access Control for Volatile Memory Containing Boot Code(CWE-1274)

Improper Access Control - Generic(CWE-284)

Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code(CWE-781)

Improper Adherence to Coding Standards(CWE-710)

Improper Authentication - Generic(CWE-287)

Improper Authorization(CWE-285)

Improper Authorization in Handler for Custom URL Scheme(CWE-939)

Improper Authorization of Index Containing Sensitive Information(CWE-612)

Improper Certificate Validation(CWE-295)

Improper Check for Certificate Revocation(CWE-299)

Improper Check for Dropped Privileges(CWE-273)

Improper Check for Unusual or Exceptional Conditions(CWE-754)

Improper Check or Handling of Exceptional Conditions(CWE-703)

Improper Cleanup on Thrown Exception(CWE-460)

Improper Clearing of Heap Memory Before Release ('Heap Inspection')(CWE-244)

Improper Control of a Resource Through its Lifetime(CWE-664)


Improper Control of Document Type Definition(CWE-827)

Improper Control of Dynamically-Identified Variables(CWE-914)

Improper Control of Dynamically-Managed Code Resources(CWE-913)

Improper Control of Interaction Frequency(CWE-799)

Improper Encoding or Escaping of Output(CWE-116)

Improper Enforcement of a Single, Unique Action(CWE-837)

Improper Enforcement of Behavioral Workflow(CWE-841)

Improper Enforcement of Message Integrity During Transmission in a Communication


Channel(CWE-924)

Improper Export of Android Application Components(CWE-926)

Improper Filtering of Special Elements(CWE-790)

Improper Finite State Machines (FSMs) in Hardware Logic(CWE-1245)

Improper Following of a Certificate's Chain of Trust(CWE-296)

Improper Following of Specification by Caller(CWE-573)

Improper Handling of Additional Special Element(CWE-167)

Improper Handling of Alternate Encoding(CWE-173)

Improper Handling of Apple HFS+ Alternate Data Stream Path(CWE-72)

Improper Handling of Case Sensitivity(CWE-178)

Improper Handling of Exceptional Conditions(CWE-755)

Improper Handling of Extra Parameters(CWE-235)

Improper Handling of Extra Values(CWE-231)

Improper Handling of Faults that Lead to Instruction Skips(CWE-1332)

Improper Handling of File Names that Identify Virtual Resources(CWE-66)

Improper Handling of Hardware Behavior in Exceptionally Cold Environments(CWE-1351)

Improper Handling of Highly Compressed Data (Data Amplification)(CWE-409)

Improper Handling of Incomplete Structural Elements(CWE-238)

Improper Handling of Inconsistent Special Elements(CWE-168)

Improper Handling of Inconsistent Structural Elements(CWE-240)

Improper Handling of Insufficient Entropy in TRNG(CWE-333)

Improper Handling of Insufficient Permissions or Privileges(CWE-280)


Improper Handling of Insufficient Privileges(CWE-274)

Improper Handling of Invalid Use of Special Elements(CWE-159)

Improper Handling of Length Parameter Inconsistency(CWE-130)

Improper Handling of Missing Special Element(CWE-166)

You might also like