Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Not Language-Specific Weaknesses
ID:BOSS-294
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view categorizes and displays weaknesses by language class Not Language-Specific.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedV1004Sensitive Cookie Without 'HttpOnly' Flag
HasMemberAllowedB1007Insufficient Visual Distinction of Homoglyphs Presented to User
HasMemberAllowed-with-ReviewC1023Incomplete Comparison with Missing Factors
HasMemberAllowedB1024Comparison of Incompatible Types
HasMemberAllowedB1025Comparison Using Wrong Factors
HasMemberAllowedB1037Processor Optimization Removal or Modification of Security-critical Code
HasMemberAllowed-with-ReviewC1038Insecure Automated Optimizations
HasMemberAllowed-with-ReviewC1039Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
HasMemberProhibitedB1041Use of Redundant Code
HasMemberProhibitedC1059Insufficient Technical Documentation
HasMemberProhibitedV1069Empty Exception Block
HasMemberAllowedB1116Inaccurate Comments
HasMemberAllowedB112Missing XML Validation
HasMemberAllowedV113Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
HasMemberDiscouragedC114Process Control
HasMemberAllowedB115Misinterpretation of Input
HasMemberAllowed-with-ReviewC116Improper Encoding or Escaping of Output
HasMemberAllowedB117Improper Output Neutralization for Logs
HasMemberAllowedB1173Improper Use of Validation Framework
HasMemberDiscouragedC118Incorrect Access of Indexable Resource ('Range Error')
HasMemberAllowedB1189Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
HasMemberAllowedB1190DMA Device Enabled Too Early in Boot Phase
HasMemberAllowedB1191On-Chip Debug and Test Interface With Improper Access Control
HasMemberAllowedB1192Improper Identifier for IP Block used in System-On-Chip (SOC)
HasMemberAllowedB1204Generation of Weak Initialization Vector (IV)
HasMemberAllowedB1209Failure to Disable Reserved Bits
HasMemberAllowedB1220Insufficient Granularity of Access Control
HasMemberAllowedV1222Insufficient Granularity of Address Regions Protected by Register Locks
HasMemberAllowed-with-ReviewC1229Creation of Emergent Resource
HasMemberAllowedB1230Exposure of Sensitive Information Through Metadata
HasMemberAllowedB1231Improper Prevention of Lock Bit Modification
HasMemberAllowedB1232Improper Lock Behavior After Power State Transition
HasMemberAllowedB1233Security-Sensitive Hardware Controls with Missing Lock Bit Protection
HasMemberAllowedB1234Hardware Internal or Debug Modes Allow Override of Locks
HasMemberAllowedB1236Improper Neutralization of Formula Elements in a CSV File
HasMemberAllowedV1239Improper Zeroization of Hardware Register
HasMemberAllowedB1240Use of a Cryptographic Primitive with a Risky Implementation
HasMemberAllowedB1242Inclusion of Undocumented Features or Chicken Bits
HasMemberAllowedB1243Sensitive Non-Volatile Information Not Protected During Debug
HasMemberAllowedB1244Internal Asset Exposed to Unsafe Debug Access Level or State
HasMemberAllowedB1245Improper Finite State Machines (FSMs) in Hardware Logic
HasMemberAllowedB1246Improper Write Handling in Limited-write Non-Volatile Memories
HasMemberAllowedB1247Improper Protection Against Voltage and Clock Glitches
HasMemberAllowedB1248Semiconductor Defects in Hardware Logic with Security-Sensitive Implications
HasMemberAllowedB1249Application-Level Admin Tool with Inconsistent View of Underlying Operating System
HasMemberAllowedB1250Improper Preservation of Consistency Between Independent Representations of Shared State
HasMemberAllowedB1252CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
HasMemberAllowedB1253Incorrect Selection of Fuse Values
HasMemberAllowedB1254Incorrect Comparison Logic Granularity
HasMemberAllowedV1255Comparison Logic is Vulnerable to Power Side-Channel Attacks
HasMemberAllowedB1256Improper Restriction of Software Interfaces to Hardware Features
HasMemberAllowedB1257Improper Access Control Applied to Mirrored or Aliased Memory Regions
HasMemberAllowedB1258Exposure of Sensitive System Information Due to Uncleared Debug Information
HasMemberAllowedB1259Improper Restriction of Security Token Assignment
HasMemberAllowedB1260Improper Handling of Overlap Between Protected Memory Ranges
HasMemberAllowedB1261Improper Handling of Single Event Upsets
HasMemberAllowedB1262Improper Access Control for Register Interface
HasMemberAllowed-with-ReviewC1263Improper Physical Access Control
HasMemberAllowedB1264Hardware Logic with Insecure De-Synchronization between Control and Data Channels
HasMemberAllowedB1265Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls
HasMemberAllowedB1266Improper Scrubbing of Sensitive Data from Decommissioned Device
HasMemberAllowedB1267Policy Uses Obsolete Encoding
HasMemberAllowedB1268Policy Privileges are not Assigned Consistently Between Control and Data Agents
HasMemberAllowedB1270Generation of Incorrect Security Tokens
HasMemberAllowedB1271Uninitialized Value on Reset for Registers Holding Security Settings
HasMemberAllowedB1274Improper Access Control for Volatile Memory Containing Boot Code
HasMemberAllowedV1275Sensitive Cookie with Improper SameSite Attribute
HasMemberAllowedB1276Hardware Child Block Incorrectly Connected to Parent System
HasMemberAllowedB1277Firmware Not Updateable
HasMemberAllowedB1278Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
HasMemberAllowedB1279Cryptographic Operations are run Before Supporting Units are Ready
HasMemberAllowedB1280Access Control Check Implemented After Asset is Accessed
HasMemberAllowedB1281Sequence of Processor Instructions Leads to Unexpected Behavior
HasMemberAllowedB1282Assumed-Immutable Data is Stored in Writable Memory
HasMemberAllowedB1283Mutable Attestation or Measurement Reporting Data
HasMemberAllowedB1284Improper Validation of Specified Quantity in Input
HasMemberAllowedB1285Improper Validation of Specified Index, Position, or Offset in Input
HasMemberAllowedB1286Improper Validation of Syntactic Correctness of Input
HasMemberAllowedB1287Improper Validation of Specified Type of Input
HasMemberAllowedB1288Improper Validation of Consistency within Input
HasMemberAllowedB1289Improper Validation of Unsafe Equivalence in Input
HasMemberAllowedV129Improper Validation of Array Index
HasMemberAllowedB1290Incorrect Decoding of Security Identifiers
HasMemberAllowedB1291Public Key Re-Use for Signing both Debug and Production Code
HasMemberAllowedB1292Incorrect Conversion of Security Identifiers
HasMemberAllowedB1293Missing Source Correlation of Multiple Independent Data
HasMemberAllowed-with-ReviewC1294Insecure Security Identifier Mechanism
HasMemberAllowedB1295Debug Messages Revealing Unnecessary Information
HasMemberAllowedB1296Incorrect Chaining or Granularity of Debug Components
HasMemberAllowedB1297Unprotected Confidential Information on Device is Accessible by OSAT Vendors
HasMemberAllowedB1299Missing Protection Mechanism for Alternate Hardware Interface
HasMemberAllowedB130Improper Handling of Length Parameter Inconsistency
HasMemberAllowedB1300Improper Protection of Physical Side Channels
HasMemberAllowedB1301Insufficient or Incomplete Data Removal within Hardware Component
HasMemberAllowedB1302Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
HasMemberAllowedB1303Non-Transparent Sharing of Microarchitectural Resources
HasMemberAllowedB1304Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
HasMemberAllowedB1310Missing Ability to Patch ROM Code
HasMemberAllowedB1312Missing Protection for Mirrored Regions in On-Chip Fabric Firewall
HasMemberAllowedB1313Hardware Allows Activation of Test or Debug Logic at Runtime
HasMemberAllowedB1314Missing Write Protection for Parametric Data Values
HasMemberAllowedB1315Improper Setting of Bus Controlling Capability in Fabric End-point
HasMemberAllowedB1316Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges
HasMemberAllowedB1317Improper Access Control in Fabric Bridge
HasMemberAllowedB1318Missing Support for Security Features in On-chip Fabrics or Buses
HasMemberAllowedB1319Improper Protection against Electromagnetic Fault Injection (EM-FI)
HasMemberAllowedB1320Improper Protection for Outbound Error Messages and Alert Signals
HasMemberAllowedB1323Improper Management of Sensitive Trace Data
HasMemberAllowedB1325Improperly Controlled Sequential Memory Allocation
HasMemberAllowedB1326Missing Immutable Root of Trust in Hardware
HasMemberAllowedB1328Security Version Number Mutable to Older Versions
HasMemberAllowedB1329Reliance on Component That is Not Updateable
HasMemberAllowedV1330Remanent Data Readable after Memory Erase
HasMemberAllowedB1331Improper Isolation of Shared Resources in Network On Chip (NoC)
HasMemberAllowedB1332Improper Handling of Faults that Lead to Instruction Skips
HasMemberAllowedB1333Inefficient Regular Expression Complexity
HasMemberAllowedB1334Unauthorized Error Injection Can Degrade Hardware Redundancy
HasMemberAllowedB1338Improper Protections Against Hardware Overheating
HasMemberAllowedB1339Insufficient Precision or Accuracy of a Real Number
HasMemberAllowedB1341Multiple Releases of Same Resource or Handle
HasMemberAllowedB1342Information Exposure through Microarchitectural State after Transient Execution
HasMemberAllowedB1351Improper Handling of Hardware Behavior in Exceptionally Cold Environments
HasMemberDiscouragedC138Improper Neutralization of Special Elements
HasMemberAllowedV1385Missing Origin Validation in WebSockets
HasMemberAllowedB1386Insecure Operation on Windows Junction / Mount Point
HasMemberAllowedB1389Incorrect Parsing of Numbers with Different Radices
HasMemberAllowed-with-ReviewC1390Weak Authentication
HasMemberAllowed-with-ReviewC1391Use of Weak Credentials
HasMemberAllowedB1392Use of Default Credentials
HasMemberAllowedB1393Use of Default Password
HasMemberAllowedB1394Use of Default Cryptographic Key
HasMemberAllowed-with-ReviewC1395Dependency on Vulnerable Third-Party Component
HasMemberAllowedV141Improper Neutralization of Parameter/Argument Delimiters
HasMemberAllowed-with-ReviewC1419Incorrect Initialization of Resource
HasMemberAllowedV142Improper Neutralization of Value Delimiters
HasMemberAllowed-with-ReviewB1420Exposure of Sensitive Information during Transient Execution
HasMemberAllowedB1421Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution
HasMemberAllowedB1422Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution
HasMemberAllowedB1423Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution
HasMemberDiscouragedB1426Improper Validation of Generative AI Output
HasMemberAllowedB1427Improper Neutralization of Input Used for LLM Prompting
HasMemberAllowedB1428Reliance on HTTP instead of HTTPS
HasMemberAllowedB1429Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
HasMemberAllowedV143Improper Neutralization of Record Delimiters
HasMemberAllowedB1431Driving Intermediate Cryptographic State/Results to Hardware Module Outputs
HasMemberAllowedV144Improper Neutralization of Line Delimiters
HasMemberAllowedV145Improper Neutralization of Section Delimiters
HasMemberAllowedV146Improper Neutralization of Expression/Command Delimiters
HasMemberAllowedV147Improper Neutralization of Input Terminators
HasMemberAllowedV150Improper Neutralization of Escape, Meta, or Control Sequences
HasMemberAllowedV151Improper Neutralization of Comment Delimiters
HasMemberAllowedV152Improper Neutralization of Macro Symbols
HasMemberAllowedV153Improper Neutralization of Substitution Characters
HasMemberAllowedV154Improper Neutralization of Variable Name Delimiters
HasMemberAllowedV155Improper Neutralization of Wildcards or Matching Symbols
HasMemberAllowedV156Improper Neutralization of Whitespace
HasMemberAllowedV157Failure to Sanitize Paired Delimiters
HasMemberAllowedV158Improper Neutralization of Null Byte or NUL Character
HasMemberAllowed-with-ReviewC159Improper Handling of Invalid Use of Special Elements
HasMemberAllowedV160Improper Neutralization of Leading Special Elements
HasMemberAllowedV161Improper Neutralization of Multiple Leading Special Elements
HasMemberAllowedV162Improper Neutralization of Trailing Special Elements
HasMemberAllowedV163Improper Neutralization of Multiple Trailing Special Elements
HasMemberAllowedV164Improper Neutralization of Internal Special Elements
HasMemberAllowedV165Improper Neutralization of Multiple Internal Special Elements
HasMemberAllowedB166Improper Handling of Missing Special Element
HasMemberAllowedB167Improper Handling of Additional Special Element
HasMemberAllowedB168Improper Handling of Inconsistent Special Elements
HasMemberAllowed-with-ReviewC172Encoding Error
HasMemberAllowedV173Improper Handling of Alternate Encoding
HasMemberAllowedV174Double Decoding of the Same Data
HasMemberAllowedV175Improper Handling of Mixed Encoding
HasMemberAllowedV176Improper Handling of Unicode Encoding
HasMemberAllowedV177Improper Handling of URL Encoding (Hex Encoding)
HasMemberAllowedB178Improper Handling of Case Sensitivity
HasMemberAllowedB179Incorrect Behavior Order: Early Validation
HasMemberAllowedV180Incorrect Behavior Order: Validate Before Canonicalize
HasMemberAllowedV181Incorrect Behavior Order: Validate Before Filter
HasMemberAllowedB182Collapse of Data into Unsafe Value
HasMemberAllowedB183Permissive List of Allowed Inputs
HasMemberAllowedB184Incomplete List of Disallowed Inputs
HasMemberAllowed-with-ReviewC185Incorrect Regular Expression
HasMemberAllowedB186Overly Restrictive Regular Expression
HasMemberAllowedV187Partial String Comparison
HasMemberAllowedB190Integer Overflow or Wraparound
HasMemberAllowedB193Off-by-one Error
HasMemberAllowedV198Use of Incorrect Byte Ordering
HasMemberDiscouragedC20Improper Input Validation
HasMemberDiscouragedC200Exposure of Sensitive Information to an Unauthorized Actor
HasMemberAllowedB201Insertion of Sensitive Information Into Sent Data
HasMemberAllowedB202Exposure of Sensitive Information Through Data Queries
HasMemberAllowedB203Observable Discrepancy
HasMemberAllowedB204Observable Response Discrepancy
HasMemberAllowedB205Observable Behavioral Discrepancy
HasMemberAllowedV206Observable Internal Behavioral Discrepancy
HasMemberAllowedV207Observable Behavioral Discrepancy With Equivalent Products
HasMemberAllowedB208Observable Timing Discrepancy
HasMemberAllowedB209Generation of Error Message Containing Sensitive Information
HasMemberAllowedB210Self-generated Error Message Containing Sensitive Information
HasMemberAllowedB211Externally-Generated Error Message Containing Sensitive Information
HasMemberAllowedB212Improper Removal of Sensitive Information Before Storage or Transfer
HasMemberAllowedB213Exposure of Sensitive Information Due to Incompatible Policies
HasMemberAllowedB214Invocation of Process Using Visible Sensitive Information
HasMemberAllowedB215Insertion of Sensitive Information Into Debugging Code
HasMemberAllowedV219Storage of File with Sensitive Data Under Web Root
HasMemberAllowedB22Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
HasMemberAllowedV220Storage of File With Sensitive Data Under FTP Root
HasMemberAllowed-with-ReviewC221Information Loss or Omission
HasMemberAllowedB222Truncation of Security-relevant Information
HasMemberAllowedB223Omission of Security-relevant Information
HasMemberAllowedB224Obscured Security-relevant Information by Alternate Name
HasMemberAllowedB226Sensitive Information in Resource Not Removed Before Reuse
HasMemberAllowedB23Relative Path Traversal
HasMemberAllowedV230Improper Handling of Missing Values
HasMemberAllowedV231Improper Handling of Extra Values
HasMemberAllowedV232Improper Handling of Undefined Values
HasMemberDiscouragedV234Failure to Handle Missing Parameter
HasMemberAllowedV235Improper Handling of Extra Parameters
HasMemberAllowedV236Improper Handling of Undefined Parameters
HasMemberAllowedV238Improper Handling of Incomplete Structural Elements
HasMemberAllowedV239Failure to Handle Incomplete Element
HasMemberAllowedV24Path Traversal: '../filedir'
HasMemberAllowedB240Improper Handling of Inconsistent Structural Elements
HasMemberAllowedB241Improper Handling of Unexpected Data Type
HasMemberAllowedV25Path Traversal: '/../filedir'
HasMemberAllowedB250Execution with Unnecessary Privileges
HasMemberAllowedB252Unchecked Return Value
HasMemberAllowedB253Incorrect Check of Function Return Value
HasMemberAllowedB256Plaintext Storage of a Password
HasMemberAllowedB257Storing Passwords in a Recoverable Format
HasMemberAllowedV258Empty Password in Configuration File
HasMemberAllowedV259Use of Hard-coded Password
HasMemberAllowedV26Path Traversal: '/dir/../filename'
HasMemberAllowedB260Password in Configuration File
HasMemberAllowedB261Weak Encoding for Password
HasMemberAllowedB262Not Using Password Aging
HasMemberAllowedB263Password Aging with Long Expiration
HasMemberAllowedB266Incorrect Privilege Assignment
HasMemberAllowedB267Privilege Defined With Unsafe Actions
HasMemberAllowedB268Privilege Chaining
HasMemberDiscouragedC269Improper Privilege Management
HasMemberAllowedV27Path Traversal: 'dir/../../filename'
HasMemberAllowedB270Privilege Context Switching Error
HasMemberAllowed-with-ReviewC271Privilege Dropping / Lowering Errors
HasMemberAllowedB272Least Privilege Violation
HasMemberAllowedB273Improper Check for Dropped Privileges
HasMemberDiscouragedB274Improper Handling of Insufficient Privileges
HasMemberAllowedB276Incorrect Default Permissions
HasMemberAllowedV277Insecure Inherited Permissions
HasMemberAllowedV278Insecure Preserved Inherited Permissions
HasMemberAllowedV279Incorrect Execution-Assigned Permissions
HasMemberAllowedV28Path Traversal: '..\filedir'
HasMemberAllowedB280Improper Handling of Insufficient Permissions or Privileges
HasMemberAllowedB281Improper Preservation of Permissions
HasMemberAllowed-with-ReviewC282Improper Ownership Management
HasMemberAllowedB283Unverified Ownership
HasMemberDiscouragedC285Improper Authorization
HasMemberAllowed-with-ReviewC286Incorrect User Management
HasMemberDiscouragedC287Improper Authentication
HasMemberAllowedB288Authentication Bypass Using an Alternate Path or Channel
HasMemberAllowedB289Authentication Bypass by Alternate Name
HasMemberAllowedV29Path Traversal: '\..\filename'
HasMemberAllowedV291Reliance on IP Address for Authentication
HasMemberAllowedV293Using Referer Field for Authentication
HasMemberAllowedB294Authentication Bypass by Capture-replay
HasMemberAllowedB295Improper Certificate Validation
HasMemberAllowedB296Improper Following of a Certificate's Chain of Trust
HasMemberAllowedV297Improper Validation of Certificate with Host Mismatch
HasMemberAllowedV298Improper Validation of Certificate Expiration
HasMemberAllowedB299Improper Check for Certificate Revocation
HasMemberAllowedV30Path Traversal: '\dir\..\filename'
HasMemberDiscouragedC300Channel Accessible by Non-Endpoint
HasMemberAllowedB301Reflection Attack in an Authentication Protocol
HasMemberAllowedB302Authentication Bypass by Assumed-Immutable Data
HasMemberAllowedB303Incorrect Implementation of Authentication Algorithm
HasMemberAllowedB304Missing Critical Step in Authentication
HasMemberAllowedB305Authentication Bypass by Primary Weakness
HasMemberAllowedB306Missing Authentication for Critical Function
HasMemberAllowedB307Improper Restriction of Excessive Authentication Attempts
HasMemberAllowedB308Use of Single-factor Authentication
HasMemberAllowedB309Use of Password System for Primary Authentication
HasMemberAllowedV31Path Traversal: 'dir\..\..\filename'
HasMemberDiscouragedC311Missing Encryption of Sensitive Data
HasMemberAllowedB312Cleartext Storage of Sensitive Information
HasMemberAllowedV313Cleartext Storage in a File or on Disk
HasMemberAllowedV314Cleartext Storage in the Registry
HasMemberAllowedV315Cleartext Storage of Sensitive Information in a Cookie
HasMemberAllowedV316Cleartext Storage of Sensitive Information in Memory
HasMemberAllowedV317Cleartext Storage of Sensitive Information in GUI
HasMemberAllowedV318Cleartext Storage of Sensitive Information in Executable
HasMemberAllowedB319Cleartext Transmission of Sensitive Information
HasMemberAllowedV32Path Traversal: '...' (Triple Dot)
HasMemberAllowedV321Use of Hard-coded Cryptographic Key
HasMemberAllowedB322Key Exchange without Entity Authentication
HasMemberAllowedB323Reusing a Nonce, Key Pair in Encryption
HasMemberAllowedB324Use of a Key Past its Expiration Date
HasMemberAllowedB325Missing Cryptographic Step
HasMemberAllowed-with-ReviewC326Inadequate Encryption Strength
HasMemberAllowed-with-ReviewC327Use of a Broken or Risky Cryptographic Algorithm
HasMemberAllowedB328Use of Weak Hash
HasMemberAllowedV329Generation of Predictable IV with CBC Mode
HasMemberAllowedV33Path Traversal: '....' (Multiple Dot)
HasMemberDiscouragedC330Use of Insufficiently Random Values
HasMemberAllowedB331Insufficient Entropy
HasMemberAllowedV332Insufficient Entropy in PRNG
HasMemberAllowedV333Improper Handling of Insufficient Entropy in TRNG
HasMemberAllowedB334Small Space of Random Values
HasMemberAllowedB335Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
HasMemberAllowedV336Same Seed in Pseudo-Random Number Generator (PRNG)
HasMemberAllowedV337Predictable Seed in Pseudo-Random Number Generator (PRNG)
HasMemberAllowedB338Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
HasMemberAllowedV339Small Seed Space in PRNG
HasMemberAllowedV34Path Traversal: '....//'
HasMemberAllowedB341Predictable from Observable State
HasMemberAllowedB342Predictable Exact Value from Previous Values
HasMemberAllowedB343Predictable Value Range from Previous Values
HasMemberAllowedB344Use of Invariant Value in Dynamically Changing Context
HasMemberDiscouragedC345Insufficient Verification of Data Authenticity
HasMemberAllowed-with-ReviewC346Origin Validation Error
HasMemberAllowedB347Improper Verification of Cryptographic Signature
HasMemberAllowedB348Use of Less Trusted Source
HasMemberAllowedB349Acceptance of Extraneous Untrusted Data With Trusted Data
HasMemberAllowedV35Path Traversal: '.../...//'
HasMemberAllowedV350Reliance on Reverse DNS Resolution for a Security-Critical Action
HasMemberAllowedB351Insufficient Type Distinction
HasMemberAllowedC352Cross-Site Request Forgery (CSRF)
HasMemberAllowedB353Missing Support for Integrity Check
HasMemberAllowedB354Improper Validation of Integrity Check Value
HasMemberAllowedB356Product UI does not Warn User of Unsafe Actions
HasMemberAllowedB357Insufficient UI Warning of Dangerous Operations
HasMemberAllowedB358Improperly Implemented Security Check for Standard
HasMemberAllowedB359Exposure of Private Personal Information to an Unauthorized Actor
HasMemberAllowedB36Absolute Path Traversal
HasMemberAllowedB360Trust of System Event Data
HasMemberAllowedB363Race Condition Enabling Link Following
HasMemberAllowedB367Time-of-check Time-of-use (TOCTOU) Race Condition
HasMemberAllowedB368Context Switching Race Condition
HasMemberAllowedV37Path Traversal: '/absolute/pathname/here'
HasMemberAllowedV370Missing Check for Certificate Revocation after Initial Check
HasMemberDiscouragedB372Incomplete Internal State Distinction
HasMemberAllowed-with-ReviewC377Insecure Temporary File
HasMemberAllowedB378Creation of Temporary File With Insecure Permissions
HasMemberAllowedB379Creation of Temporary File in Directory with Insecure Permissions
HasMemberAllowedV38Path Traversal: '\absolute\pathname\here'
HasMemberAllowedC384Session Fixation
HasMemberAllowedB385Covert Timing Channel
HasMemberAllowedB386Symbolic Name not Mapping to Correct Object
HasMemberAllowedV39Path Traversal: 'C:dirname'
HasMemberAllowedB390Detection of Error Condition Without Action
HasMemberProhibitedB391Unchecked Error Condition
HasMemberAllowedB392Missing Report of Error Condition
HasMemberAllowedB393Return of Wrong Status Code
HasMemberAllowedB394Unexpected Status Code or Return Value
HasMemberAllowedV40Path Traversal: '\\UNC\share\name\' (Windows UNC Share)
HasMemberDiscouragedC400Uncontrolled Resource Consumption
HasMemberAllowedB403Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
HasMemberAllowed-with-ReviewC404Improper Resource Shutdown or Release
HasMemberAllowed-with-ReviewC405Asymmetric Resource Consumption (Amplification)
HasMemberAllowed-with-ReviewC406Insufficient Control of Network Message Volume (Network Amplification)
HasMemberAllowed-with-ReviewC407Inefficient Algorithmic Complexity
HasMemberAllowedB408Incorrect Behavior Order: Early Amplification
HasMemberAllowedB409Improper Handling of Highly Compressed Data (Data Amplification)
HasMemberAllowedB41Improper Resolution of Path Equivalence
HasMemberAllowedC410Insufficient Resource Pool
HasMemberAllowedB412Unrestricted Externally Accessible Lock
HasMemberAllowedB413Improper Resource Locking
HasMemberAllowedB414Missing Lock Check
HasMemberAllowedB419Unprotected Primary Channel
HasMemberAllowedV42Path Equivalence: 'filename.' (Trailing Dot)
HasMemberAllowedB420Unprotected Alternate Channel
HasMemberAllowedB421Race Condition During Access to Alternate Channel
HasMemberAllowedV422Unprotected Windows Messaging Channel ('Shatter')
HasMemberAllowed-with-ReviewC424Improper Protection of Alternate Path
HasMemberAllowedB425Direct Request ('Forced Browsing')
HasMemberAllowed-with-ReviewB426Untrusted Search Path
HasMemberAllowed-with-ReviewB427Uncontrolled Search Path Element
HasMemberAllowedB428Unquoted Search Path or Element
HasMemberAllowedV43Path Equivalence: 'filename....' (Multiple Trailing Dot)
HasMemberAllowedB430Deployment of Wrong Handler
HasMemberAllowedB431Missing Handler
HasMemberAllowedB432Dangerous Signal Handler not Disabled During Sensitive Operations
HasMemberAllowedV433Unparsed Raw Web Content Delivery
HasMemberAllowedB434Unrestricted Upload of File with Dangerous Type
HasMemberDiscouragedP435Improper Interaction Between Multiple Correctly-Behaving Entities
HasMemberAllowed-with-ReviewC436Interpretation Conflict
HasMemberAllowedB437Incomplete Model of Endpoint Features
HasMemberAllowedB439Behavioral Change in New Version or Environment
HasMemberAllowedV44Path Equivalence: 'file.name' (Internal Dot)
HasMemberAllowedB440Expected Behavior Violation
HasMemberAllowed-with-ReviewC441Unintended Proxy or Intermediary ('Confused Deputy')
HasMemberAllowedB444Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
HasMemberAllowed-with-ReviewC446UI Discrepancy for Security Feature
HasMemberAllowedB447Unimplemented or Unsupported Feature in UI
HasMemberAllowedB448Obsolete Feature in UI
HasMemberAllowedB449The UI Performs the Wrong Action
HasMemberAllowedV45Path Equivalence: 'file...name' (Multiple Internal Dot)
HasMemberAllowedB450Multiple Interpretations of UI Input
HasMemberAllowed-with-ReviewC451User Interface (UI) Misrepresentation of Critical Information
HasMemberAllowedV453Insecure Default Variable Initialization
HasMemberAllowedB454External Initialization of Trusted Variables or Data Stores
HasMemberAllowedB455Non-exit on Failed Initialization
HasMemberAllowedV456Missing Initialization of a Variable
HasMemberAllowedV457Use of Uninitialized Variable
HasMemberAllowedB459Incomplete Cleanup
HasMemberAllowedV46Path Equivalence: 'filename ' (Trailing Space)
HasMemberAllowedV47Path Equivalence: ' filename' (Leading Space)
HasMemberAllowedB471Modification of Assumed-Immutable Data (MAID)
HasMemberAllowedB472External Control of Assumed-Immutable Web Parameter
HasMemberAllowedB474Use of Function with Inconsistent Implementations
HasMemberAllowedB475Undefined Behavior for Input to API
HasMemberAllowedB477Use of Obsolete Function
HasMemberAllowedV48Path Equivalence: 'file name' (Internal Whitespace)
HasMemberAllowedB480Use of Incorrect Operator
HasMemberAllowedB488Exposure of Data Element to Wrong Session
HasMemberAllowedB489Active Debug Code
HasMemberAllowedV49Path Equivalence: 'filename/' (Trailing Slash)
HasMemberAllowedB494Download of Code Without Integrity Check
HasMemberAllowedB497Exposure of Sensitive System Information to an Unauthorized Control Sphere
HasMemberAllowedV50Path Equivalence: '//multiple/leading/slash'
HasMemberAllowedB501Trust Boundary Violation
HasMemberAllowedV51Path Equivalence: '/multiple//internal/slash'
HasMemberAllowedB511Logic/Time Bomb
HasMemberAllowedV52Path Equivalence: '/multiple/trailing/slash//'
HasMemberAllowedB521Weak Password Requirements
HasMemberAllowed-with-ReviewC522Insufficiently Protected Credentials
HasMemberAllowedV53Path Equivalence: '\multiple\\internal\backslash'
HasMemberAllowedB538Insertion of Sensitive Information into Externally-Accessible File or Directory
HasMemberAllowedV54Path Equivalence: 'filedir\' (Trailing Backslash)
HasMemberAllowedV546Suspicious Comment
HasMemberAllowedV55Path Equivalence: '/./' (Single Dot Directory)
HasMemberAllowedB552Files or Directories Accessible to External Parties
HasMemberAllowedV56Path Equivalence: 'filedir*' (Wildcard)
HasMemberAllowedB561Dead Code
HasMemberAllowedV57Path Equivalence: 'fakedir/../realdir/filename'
HasMemberAllowedB570Expression is Always False
HasMemberAllowedB571Expression is Always True
HasMemberAllowedV58Path Equivalence: Windows 8.3 Filename
HasMemberAllowedB59Improper Link Resolution Before File Access ('Link Following')
HasMemberAllowedV595Comparison of Object References Instead of Object Contents
HasMemberAllowedB601URL Redirection to Untrusted Site ('Open Redirect')
HasMemberAllowed-with-ReviewC602Client-Side Enforcement of Server-Side Security
HasMemberAllowedB603Use of Client-Side Authentication
HasMemberAllowedV605Multiple Binds to the Same Port
HasMemberAllowedC61UNIX Symbolic Link (Symlink) Following
HasMemberAllowedB612Improper Authorization of Index Containing Sensitive Information
HasMemberAllowedV62UNIX Hard Link
HasMemberAllowedB620Unverified Password Change
HasMemberAllowedV622Improper Validation of Function Hook Arguments
HasMemberAllowedB628Function Call with Incorrectly Specified Arguments
HasMemberAllowed-with-ReviewC636Not Failing Securely ('Failing Open')
HasMemberAllowed-with-ReviewC637Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')
HasMemberAllowed-with-ReviewC638Not Using Complete Mediation
HasMemberAllowedB639Authorization Bypass Through User-Controlled Key
HasMemberAllowedV64Windows Shortcut Following (.LNK)
HasMemberAllowed-with-ReviewB640Weak Password Recovery Mechanism for Forgotten Password
HasMemberAllowedB641Improper Restriction of Names for Files and Other Resources
HasMemberAllowed-with-ReviewC642External Control of Critical State Data
HasMemberAllowedB643Improper Neutralization of Data within XPath Expressions ('XPath Injection')
HasMemberAllowedV644Improper Neutralization of HTTP Headers for Scripting Syntax
HasMemberAllowedB645Overly Restrictive Account Lockout Mechanism
HasMemberAllowedV646Reliance on File Name or Extension of Externally-Supplied File
HasMemberAllowedV647Use of Non-Canonical URL Paths for Authorization Decisions
HasMemberAllowedB648Incorrect Use of Privileged APIs
HasMemberAllowedB649Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
HasMemberAllowedV65Windows Hard Link
HasMemberAllowedV650Trusting HTTP Permission Methods on the Server Side
HasMemberAllowedV651Exposure of WSDL File Containing Sensitive Information
HasMemberAllowedB652Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')
HasMemberAllowedC653Improper Isolation or Compartmentalization
HasMemberAllowedB654Reliance on a Single Factor in a Security Decision
HasMemberAllowed-with-ReviewC655Insufficient Psychological Acceptability
HasMemberAllowed-with-ReviewC656Reliance on Security Through Obscurity
HasMemberAllowedB66Improper Handling of File Names that Identify Virtual Resources
HasMemberDiscouragedP664Improper Control of a Resource Through its Lifetime
HasMemberDiscouragedC665Improper Initialization
HasMemberAllowedV67Improper Handling of Windows Device Names
HasMemberAllowed-with-ReviewC672Operation on a Resource after Expiration or Release
HasMemberAllowed-with-ReviewC674Uncontrolled Recursion
HasMemberAllowed-with-ReviewC675Multiple Operations on Resource in Single-Operation Context
HasMemberDiscouragedC680Integer Overflow to Buffer Overflow
HasMemberAllowedB681Incorrect Conversion between Numeric Types
HasMemberDiscouragedP682Incorrect Calculation
HasMemberAllowedV69Improper Handling of Windows ::DATA Alternate Data Stream
HasMemberDiscouragedP691Insufficient Control Flow Management
HasMemberDiscouragedC692Incomplete Denylist to Cross-Site Scripting
HasMemberDiscouragedP693Protection Mechanism Failure
HasMemberAllowedB694Use of Multiple Resources with Duplicate Identifier
HasMemberDiscouragedP697Incorrect Comparison
HasMemberDiscouragedP703Improper Check or Handling of Exceptional Conditions
HasMemberAllowed-with-ReviewC704Incorrect Type Conversion or Cast
HasMemberAllowed-with-ReviewC705Incorrect Control Flow Scoping
HasMemberAllowed-with-ReviewC706Use of Incorrectly-Resolved Name or Reference
HasMemberDiscouragedP707Improper Neutralization
HasMemberAllowedB708Incorrect Ownership Assignment
HasMemberDiscouragedP710Improper Adherence to Coding Standards
HasMemberAllowedV72Improper Handling of Apple HFS+ Alternate Data Stream Path
HasMemberAllowedB73External Control of File Name or Path
HasMemberAllowed-with-ReviewC732Incorrect Permission Assignment for Critical Resource
HasMemberDiscouragedC74Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
HasMemberAllowedB749Exposed Dangerous Method or Function
HasMemberDiscouragedC75Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
HasMemberAllowed-with-ReviewC754Improper Check for Unusual or Exceptional Conditions
HasMemberDiscouragedC755Improper Handling of Exceptional Conditions
HasMemberAllowedB76Improper Neutralization of Equivalent Special Elements
HasMemberAllowed-with-ReviewC77Improper Neutralization of Special Elements used in a Command ('Command Injection')
HasMemberAllowedB770Allocation of Resources Without Limits or Throttling
HasMemberAllowedB778Insufficient Logging
HasMemberAllowedB779Logging of Excessive Data
HasMemberAllowedB78Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
HasMemberAllowedB783Operator Precedence Logic Error
HasMemberAllowedV784Reliance on Cookies without Validation and Integrity Checking in a Security Decision
HasMemberAllowedV789Memory Allocation with Excessive Size Value
HasMemberAllowedB79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HasMemberAllowedB798Use of Hard-coded Credentials
HasMemberAllowed-with-ReviewC799Improper Control of Interaction Frequency
HasMemberAllowedV80Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
HasMemberAllowedB804Guessable CAPTCHA
HasMemberAllowedB807Reliance on Untrusted Inputs in a Security Decision
HasMemberAllowedV81Improper Neutralization of Script in an Error Message Web Page
HasMemberAllowedV82Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
HasMemberAllowedV83Improper Neutralization of Script in Attributes in a Web Page
HasMemberAllowedB835Loop with Unreachable Exit Condition ('Infinite Loop')
HasMemberAllowedB836Use of Password Hash Instead of Password for Authentication
HasMemberAllowedB837Improper Enforcement of a Single, Unique Action
HasMemberAllowedB838Inappropriate Encoding for Output Context
HasMemberAllowedV84Improper Neutralization of Encoded URI Schemes in a Web Page
HasMemberAllowedB842Placement of User into Incorrect Group
HasMemberAllowedV85Doubled Character XSS Manipulations
HasMemberAllowedV86Improper Neutralization of Invalid Characters in Identifiers in Web Pages
HasMemberAllowed-with-ReviewC862Missing Authorization
HasMemberAllowed-with-ReviewC863Incorrect Authorization
HasMemberAllowedV87Improper Neutralization of Alternate XSS Syntax
HasMemberAllowedB88Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
HasMemberAllowedB89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
HasMemberAllowedB90Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
HasMemberAllowedB908Use of Uninitialized Resource
HasMemberAllowed-with-ReviewC909Missing Initialization of Resource
HasMemberAllowedB91XML Injection (aka Blind XPath Injection)
HasMemberAllowedB910Use of Expired File Descriptor
HasMemberAllowedB911Improper Update of Reference Count
HasMemberAllowedB915Improperly Controlled Modification of Dynamically-Determined Object Attributes
HasMemberAllowedB916Use of Password Hash With Insufficient Computational Effort
HasMemberAllowedB918Server-Side Request Forgery (SSRF)
HasMemberAllowedB920Improper Restriction of Power Consumption
HasMemberAllowedB921Storage of Sensitive Data in a Mechanism without Access Control
HasMemberAllowed-with-ReviewC922Insecure Storage of Sensitive Information
HasMemberAllowed-with-ReviewC923Improper Restriction of Communication Channel to Intended Endpoints
HasMemberAllowedB924Improper Enforcement of Message Integrity During Transmission in a Communication Channel
HasMemberAllowedV925Improper Verification of Intent by Broadcast Receiver
HasMemberAllowedV926Improper Export of Android Application Components
HasMemberAllowedV927Use of Implicit Intent for Sensitive Communication
HasMemberAllowedB93Improper Neutralization of CRLF Sequences ('CRLF Injection')
HasMemberAllowedB940Improper Verification of Source of a Communication Channel
HasMemberAllowedB941Incorrectly Specified Destination in a Communication Channel
HasMemberAllowedV942Permissive Cross-domain Policy with Untrusted Domains
HasMemberAllowed-with-ReviewC943Improper Neutralization of Special Elements in Data Query Logic
HasMemberAllowedV97Improper Neutralization of Server-Side Includes (SSI) Within a Web Page
HasMemberAllowed-with-ReviewC99Improper Control of Resource Identifiers ('Resource Injection')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1004
Name: Sensitive Cookie Without 'HttpOnly' Flag
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1007
Name: Insufficient Visual Distinction of Homoglyphs Presented to User
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1023
Name: Incomplete Comparison with Missing Factors
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1024
Name: Comparison of Incompatible Types
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1025
Name: Comparison Using Wrong Factors
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1037
Name: Processor Optimization Removal or Modification of Security-critical Code
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1038
Name: Insecure Automated Optimizations
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1039
Name: Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1041
Name: Use of Redundant Code
Nature: HasMember
Mapping: Prohibited
Type: Class
ID: 1059
Name: Insufficient Technical Documentation
Nature: HasMember
Mapping: Prohibited
Type: Variant
ID: 1069
Name: Empty Exception Block
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1116
Name: Inaccurate Comments
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 112
Name: Missing XML Validation
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 113
Name: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 114
Name: Process Control
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 115
Name: Misinterpretation of Input
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 116
Name: Improper Encoding or Escaping of Output
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 117
Name: Improper Output Neutralization for Logs
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1173
Name: Improper Use of Validation Framework
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 118
Name: Incorrect Access of Indexable Resource ('Range Error')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1189
Name: Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1190
Name: DMA Device Enabled Too Early in Boot Phase
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1191
Name: On-Chip Debug and Test Interface With Improper Access Control
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1192
Name: Improper Identifier for IP Block used in System-On-Chip (SOC)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1204
Name: Generation of Weak Initialization Vector (IV)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1209
Name: Failure to Disable Reserved Bits
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1220
Name: Insufficient Granularity of Access Control
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1222
Name: Insufficient Granularity of Address Regions Protected by Register Locks
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1229
Name: Creation of Emergent Resource
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1230
Name: Exposure of Sensitive Information Through Metadata
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1231
Name: Improper Prevention of Lock Bit Modification
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1232
Name: Improper Lock Behavior After Power State Transition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1233
Name: Security-Sensitive Hardware Controls with Missing Lock Bit Protection
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1234
Name: Hardware Internal or Debug Modes Allow Override of Locks
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1236
Name: Improper Neutralization of Formula Elements in a CSV File
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1239
Name: Improper Zeroization of Hardware Register
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1240
Name: Use of a Cryptographic Primitive with a Risky Implementation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1242
Name: Inclusion of Undocumented Features or Chicken Bits
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1243
Name: Sensitive Non-Volatile Information Not Protected During Debug
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1244
Name: Internal Asset Exposed to Unsafe Debug Access Level or State
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1245
Name: Improper Finite State Machines (FSMs) in Hardware Logic
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1246
Name: Improper Write Handling in Limited-write Non-Volatile Memories
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1247
Name: Improper Protection Against Voltage and Clock Glitches
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1248
Name: Semiconductor Defects in Hardware Logic with Security-Sensitive Implications
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1249
Name: Application-Level Admin Tool with Inconsistent View of Underlying Operating System
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1250
Name: Improper Preservation of Consistency Between Independent Representations of Shared State
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1252
Name: CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1253
Name: Incorrect Selection of Fuse Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1254
Name: Incorrect Comparison Logic Granularity
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1255
Name: Comparison Logic is Vulnerable to Power Side-Channel Attacks
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1256
Name: Improper Restriction of Software Interfaces to Hardware Features
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1257
Name: Improper Access Control Applied to Mirrored or Aliased Memory Regions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1258
Name: Exposure of Sensitive System Information Due to Uncleared Debug Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1259
Name: Improper Restriction of Security Token Assignment
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1260
Name: Improper Handling of Overlap Between Protected Memory Ranges
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1261
Name: Improper Handling of Single Event Upsets
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1262
Name: Improper Access Control for Register Interface
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1263
Name: Improper Physical Access Control
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1264
Name: Hardware Logic with Insecure De-Synchronization between Control and Data Channels
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1265
Name: Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1266
Name: Improper Scrubbing of Sensitive Data from Decommissioned Device
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1267
Name: Policy Uses Obsolete Encoding
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1268
Name: Policy Privileges are not Assigned Consistently Between Control and Data Agents
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1270
Name: Generation of Incorrect Security Tokens
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1271
Name: Uninitialized Value on Reset for Registers Holding Security Settings
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1274
Name: Improper Access Control for Volatile Memory Containing Boot Code
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1275
Name: Sensitive Cookie with Improper SameSite Attribute
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1276
Name: Hardware Child Block Incorrectly Connected to Parent System
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1277
Name: Firmware Not Updateable
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1278
Name: Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1279
Name: Cryptographic Operations are run Before Supporting Units are Ready
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1280
Name: Access Control Check Implemented After Asset is Accessed
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1281
Name: Sequence of Processor Instructions Leads to Unexpected Behavior
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1282
Name: Assumed-Immutable Data is Stored in Writable Memory
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1283
Name: Mutable Attestation or Measurement Reporting Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1284
Name: Improper Validation of Specified Quantity in Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1285
Name: Improper Validation of Specified Index, Position, or Offset in Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1286
Name: Improper Validation of Syntactic Correctness of Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1287
Name: Improper Validation of Specified Type of Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1288
Name: Improper Validation of Consistency within Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1289
Name: Improper Validation of Unsafe Equivalence in Input
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 129
Name: Improper Validation of Array Index
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1290
Name: Incorrect Decoding of Security Identifiers
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1291
Name: Public Key Re-Use for Signing both Debug and Production Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1292
Name: Incorrect Conversion of Security Identifiers
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1293
Name: Missing Source Correlation of Multiple Independent Data
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1294
Name: Insecure Security Identifier Mechanism
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1295
Name: Debug Messages Revealing Unnecessary Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1296
Name: Incorrect Chaining or Granularity of Debug Components
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1297
Name: Unprotected Confidential Information on Device is Accessible by OSAT Vendors
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1299
Name: Missing Protection Mechanism for Alternate Hardware Interface
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 130
Name: Improper Handling of Length Parameter Inconsistency
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1300
Name: Improper Protection of Physical Side Channels
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1301
Name: Insufficient or Incomplete Data Removal within Hardware Component
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1302
Name: Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1303
Name: Non-Transparent Sharing of Microarchitectural Resources
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1304
Name: Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1310
Name: Missing Ability to Patch ROM Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1312
Name: Missing Protection for Mirrored Regions in On-Chip Fabric Firewall
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1313
Name: Hardware Allows Activation of Test or Debug Logic at Runtime
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1314
Name: Missing Write Protection for Parametric Data Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1315
Name: Improper Setting of Bus Controlling Capability in Fabric End-point
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1316
Name: Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1317
Name: Improper Access Control in Fabric Bridge
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1318
Name: Missing Support for Security Features in On-chip Fabrics or Buses
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1319
Name: Improper Protection against Electromagnetic Fault Injection (EM-FI)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1320
Name: Improper Protection for Outbound Error Messages and Alert Signals
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1323
Name: Improper Management of Sensitive Trace Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1325
Name: Improperly Controlled Sequential Memory Allocation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1326
Name: Missing Immutable Root of Trust in Hardware
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1328
Name: Security Version Number Mutable to Older Versions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1329
Name: Reliance on Component That is Not Updateable
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1330
Name: Remanent Data Readable after Memory Erase
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1331
Name: Improper Isolation of Shared Resources in Network On Chip (NoC)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1332
Name: Improper Handling of Faults that Lead to Instruction Skips
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1333
Name: Inefficient Regular Expression Complexity
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1334
Name: Unauthorized Error Injection Can Degrade Hardware Redundancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1338
Name: Improper Protections Against Hardware Overheating
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1339
Name: Insufficient Precision or Accuracy of a Real Number
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1341
Name: Multiple Releases of Same Resource or Handle
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1342
Name: Information Exposure through Microarchitectural State after Transient Execution
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1351
Name: Improper Handling of Hardware Behavior in Exceptionally Cold Environments
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 138
Name: Improper Neutralization of Special Elements
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1385
Name: Missing Origin Validation in WebSockets
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1386
Name: Insecure Operation on Windows Junction / Mount Point
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1389
Name: Incorrect Parsing of Numbers with Different Radices
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1390
Name: Weak Authentication
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1391
Name: Use of Weak Credentials
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1392
Name: Use of Default Credentials
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1393
Name: Use of Default Password
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1394
Name: Use of Default Cryptographic Key
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1395
Name: Dependency on Vulnerable Third-Party Component
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 141
Name: Improper Neutralization of Parameter/Argument Delimiters
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1419
Name: Incorrect Initialization of Resource
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 142
Name: Improper Neutralization of Value Delimiters
Nature: HasMember
Mapping: Allowed-with-Review
Type: Base
ID: 1420
Name: Exposure of Sensitive Information during Transient Execution
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1421
Name: Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1422
Name: Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1423
Name: Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution
Nature: HasMember
Mapping: Discouraged
Type: Base
ID: 1426
Name: Improper Validation of Generative AI Output
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1427
Name: Improper Neutralization of Input Used for LLM Prompting
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1428
Name: Reliance on HTTP instead of HTTPS
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1429
Name: Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 143
Name: Improper Neutralization of Record Delimiters
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1431
Name: Driving Intermediate Cryptographic State/Results to Hardware Module Outputs
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 144
Name: Improper Neutralization of Line Delimiters
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 145
Name: Improper Neutralization of Section Delimiters
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 146
Name: Improper Neutralization of Expression/Command Delimiters
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 147
Name: Improper Neutralization of Input Terminators
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 150
Name: Improper Neutralization of Escape, Meta, or Control Sequences
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 151
Name: Improper Neutralization of Comment Delimiters
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 152
Name: Improper Neutralization of Macro Symbols
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 153
Name: Improper Neutralization of Substitution Characters
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 154
Name: Improper Neutralization of Variable Name Delimiters
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 155
Name: Improper Neutralization of Wildcards or Matching Symbols
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 156
Name: Improper Neutralization of Whitespace
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 157
Name: Failure to Sanitize Paired Delimiters
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 158
Name: Improper Neutralization of Null Byte or NUL Character
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 159
Name: Improper Handling of Invalid Use of Special Elements
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 160
Name: Improper Neutralization of Leading Special Elements
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 161
Name: Improper Neutralization of Multiple Leading Special Elements
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 162
Name: Improper Neutralization of Trailing Special Elements
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 163
Name: Improper Neutralization of Multiple Trailing Special Elements
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 164
Name: Improper Neutralization of Internal Special Elements
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 165
Name: Improper Neutralization of Multiple Internal Special Elements
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 166
Name: Improper Handling of Missing Special Element
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 167
Name: Improper Handling of Additional Special Element
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 168
Name: Improper Handling of Inconsistent Special Elements
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 172
Name: Encoding Error
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 173
Name: Improper Handling of Alternate Encoding
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 174
Name: Double Decoding of the Same Data
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 175
Name: Improper Handling of Mixed Encoding
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 176
Name: Improper Handling of Unicode Encoding
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 177
Name: Improper Handling of URL Encoding (Hex Encoding)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 178
Name: Improper Handling of Case Sensitivity
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 179
Name: Incorrect Behavior Order: Early Validation
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 180
Name: Incorrect Behavior Order: Validate Before Canonicalize
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 181
Name: Incorrect Behavior Order: Validate Before Filter
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 182
Name: Collapse of Data into Unsafe Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 183
Name: Permissive List of Allowed Inputs
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 184
Name: Incomplete List of Disallowed Inputs
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 185
Name: Incorrect Regular Expression
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 186
Name: Overly Restrictive Regular Expression
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 187
Name: Partial String Comparison
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 190
Name: Integer Overflow or Wraparound
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 193
Name: Off-by-one Error
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 198
Name: Use of Incorrect Byte Ordering
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 20
Name: Improper Input Validation
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 200
Name: Exposure of Sensitive Information to an Unauthorized Actor
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 201
Name: Insertion of Sensitive Information Into Sent Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 202
Name: Exposure of Sensitive Information Through Data Queries
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 203
Name: Observable Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 204
Name: Observable Response Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 205
Name: Observable Behavioral Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 206
Name: Observable Internal Behavioral Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 207
Name: Observable Behavioral Discrepancy With Equivalent Products
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 208
Name: Observable Timing Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 209
Name: Generation of Error Message Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 210
Name: Self-generated Error Message Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 211
Name: Externally-Generated Error Message Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 212
Name: Improper Removal of Sensitive Information Before Storage or Transfer
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 213
Name: Exposure of Sensitive Information Due to Incompatible Policies
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 214
Name: Invocation of Process Using Visible Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 215
Name: Insertion of Sensitive Information Into Debugging Code
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 219
Name: Storage of File with Sensitive Data Under Web Root
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 22
Name: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 220
Name: Storage of File With Sensitive Data Under FTP Root
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 221
Name: Information Loss or Omission
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 222
Name: Truncation of Security-relevant Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 223
Name: Omission of Security-relevant Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 224
Name: Obscured Security-relevant Information by Alternate Name
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 226
Name: Sensitive Information in Resource Not Removed Before Reuse
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 23
Name: Relative Path Traversal
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 230
Name: Improper Handling of Missing Values
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 231
Name: Improper Handling of Extra Values
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 232
Name: Improper Handling of Undefined Values
Nature: HasMember
Mapping: Discouraged
Type: Variant
ID: 234
Name: Failure to Handle Missing Parameter
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 235
Name: Improper Handling of Extra Parameters
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 236
Name: Improper Handling of Undefined Parameters
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 238
Name: Improper Handling of Incomplete Structural Elements
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 239
Name: Failure to Handle Incomplete Element
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 24
Name: Path Traversal: '../filedir'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 240
Name: Improper Handling of Inconsistent Structural Elements
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 241
Name: Improper Handling of Unexpected Data Type
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 25
Name: Path Traversal: '/../filedir'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 250
Name: Execution with Unnecessary Privileges
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 252
Name: Unchecked Return Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 253
Name: Incorrect Check of Function Return Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 256
Name: Plaintext Storage of a Password
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 257
Name: Storing Passwords in a Recoverable Format
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 258
Name: Empty Password in Configuration File
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 259
Name: Use of Hard-coded Password
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 26
Name: Path Traversal: '/dir/../filename'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 260
Name: Password in Configuration File
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 261
Name: Weak Encoding for Password
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 262
Name: Not Using Password Aging
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 263
Name: Password Aging with Long Expiration
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 266
Name: Incorrect Privilege Assignment
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 267
Name: Privilege Defined With Unsafe Actions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 268
Name: Privilege Chaining
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 269
Name: Improper Privilege Management
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 27
Name: Path Traversal: 'dir/../../filename'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 270
Name: Privilege Context Switching Error
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 271
Name: Privilege Dropping / Lowering Errors
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 272
Name: Least Privilege Violation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 273
Name: Improper Check for Dropped Privileges
Nature: HasMember
Mapping: Discouraged
Type: Base
ID: 274
Name: Improper Handling of Insufficient Privileges
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 276
Name: Incorrect Default Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 277
Name: Insecure Inherited Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 278
Name: Insecure Preserved Inherited Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 279
Name: Incorrect Execution-Assigned Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 28
Name: Path Traversal: '..\filedir'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 280
Name: Improper Handling of Insufficient Permissions or Privileges
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 281
Name: Improper Preservation of Permissions
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 282
Name: Improper Ownership Management
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 283
Name: Unverified Ownership
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 285
Name: Improper Authorization
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 286
Name: Incorrect User Management
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 287
Name: Improper Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 288
Name: Authentication Bypass Using an Alternate Path or Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 289
Name: Authentication Bypass by Alternate Name
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 29
Name: Path Traversal: '\..\filename'
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 291
Name: Reliance on IP Address for Authentication
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 293
Name: Using Referer Field for Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 294
Name: Authentication Bypass by Capture-replay
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 295
Name: Improper Certificate Validation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 296
Name: Improper Following of a Certificate's Chain of Trust
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 297
Name: Improper Validation of Certificate with Host Mismatch
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 298
Name: Improper Validation of Certificate Expiration
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 299
Name: Improper Check for Certificate Revocation
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 30
Name: Path Traversal: '\dir\..\filename'
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 300
Name: Channel Accessible by Non-Endpoint
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 301
Name: Reflection Attack in an Authentication Protocol
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 302
Name: Authentication Bypass by Assumed-Immutable Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 303
Name: Incorrect Implementation of Authentication Algorithm
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 304
Name: Missing Critical Step in Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 305
Name: Authentication Bypass by Primary Weakness
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 306
Name: Missing Authentication for Critical Function
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 307
Name: Improper Restriction of Excessive Authentication Attempts
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 308
Name: Use of Single-factor Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 309
Name: Use of Password System for Primary Authentication
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 31
Name: Path Traversal: 'dir\..\..\filename'
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 311
Name: Missing Encryption of Sensitive Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 312
Name: Cleartext Storage of Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 313
Name: Cleartext Storage in a File or on Disk
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 314
Name: Cleartext Storage in the Registry
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 315
Name: Cleartext Storage of Sensitive Information in a Cookie
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 316
Name: Cleartext Storage of Sensitive Information in Memory
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 317
Name: Cleartext Storage of Sensitive Information in GUI
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 318
Name: Cleartext Storage of Sensitive Information in Executable
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 319
Name: Cleartext Transmission of Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 32
Name: Path Traversal: '...' (Triple Dot)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 321
Name: Use of Hard-coded Cryptographic Key
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 322
Name: Key Exchange without Entity Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 323
Name: Reusing a Nonce, Key Pair in Encryption
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 324
Name: Use of a Key Past its Expiration Date
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 325
Name: Missing Cryptographic Step
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 326
Name: Inadequate Encryption Strength
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 327
Name: Use of a Broken or Risky Cryptographic Algorithm
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 328
Name: Use of Weak Hash
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 329
Name: Generation of Predictable IV with CBC Mode
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 33
Name: Path Traversal: '....' (Multiple Dot)
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 330
Name: Use of Insufficiently Random Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 331
Name: Insufficient Entropy
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 332
Name: Insufficient Entropy in PRNG
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 333
Name: Improper Handling of Insufficient Entropy in TRNG
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 334
Name: Small Space of Random Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 335
Name: Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 336
Name: Same Seed in Pseudo-Random Number Generator (PRNG)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 337
Name: Predictable Seed in Pseudo-Random Number Generator (PRNG)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 338
Name: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 339
Name: Small Seed Space in PRNG
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 34
Name: Path Traversal: '....//'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 341
Name: Predictable from Observable State
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 342
Name: Predictable Exact Value from Previous Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 343
Name: Predictable Value Range from Previous Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 344
Name: Use of Invariant Value in Dynamically Changing Context
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 345
Name: Insufficient Verification of Data Authenticity
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 346
Name: Origin Validation Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 347
Name: Improper Verification of Cryptographic Signature
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 348
Name: Use of Less Trusted Source
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 349
Name: Acceptance of Extraneous Untrusted Data With Trusted Data
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 35
Name: Path Traversal: '.../...//'
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 350
Name: Reliance on Reverse DNS Resolution for a Security-Critical Action
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 351
Name: Insufficient Type Distinction
Nature: HasMember
Mapping: Allowed
Type: Compound
ID: 352
Name: Cross-Site Request Forgery (CSRF)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 353
Name: Missing Support for Integrity Check
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 354
Name: Improper Validation of Integrity Check Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 356
Name: Product UI does not Warn User of Unsafe Actions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 357
Name: Insufficient UI Warning of Dangerous Operations
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 358
Name: Improperly Implemented Security Check for Standard
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 359
Name: Exposure of Private Personal Information to an Unauthorized Actor
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 36
Name: Absolute Path Traversal
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 360
Name: Trust of System Event Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 363
Name: Race Condition Enabling Link Following
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 367
Name: Time-of-check Time-of-use (TOCTOU) Race Condition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 368
Name: Context Switching Race Condition
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 37
Name: Path Traversal: '/absolute/pathname/here'
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 370
Name: Missing Check for Certificate Revocation after Initial Check
Nature: HasMember
Mapping: Discouraged
Type: Base
ID: 372
Name: Incomplete Internal State Distinction
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 377
Name: Insecure Temporary File
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 378
Name: Creation of Temporary File With Insecure Permissions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 379
Name: Creation of Temporary File in Directory with Insecure Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 38
Name: Path Traversal: '\absolute\pathname\here'
Nature: HasMember
Mapping: Allowed
Type: Compound
ID: 384
Name: Session Fixation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 385
Name: Covert Timing Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 386
Name: Symbolic Name not Mapping to Correct Object
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 39
Name: Path Traversal: 'C:dirname'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 390
Name: Detection of Error Condition Without Action
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 391
Name: Unchecked Error Condition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 392
Name: Missing Report of Error Condition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 393
Name: Return of Wrong Status Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 394
Name: Unexpected Status Code or Return Value
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 40
Name: Path Traversal: '\\UNC\share\name\' (Windows UNC Share)
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 400
Name: Uncontrolled Resource Consumption
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 403
Name: Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 404
Name: Improper Resource Shutdown or Release
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 405
Name: Asymmetric Resource Consumption (Amplification)
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 406
Name: Insufficient Control of Network Message Volume (Network Amplification)
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 407
Name: Inefficient Algorithmic Complexity
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 408
Name: Incorrect Behavior Order: Early Amplification
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 409
Name: Improper Handling of Highly Compressed Data (Data Amplification)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 41
Name: Improper Resolution of Path Equivalence
Nature: HasMember
Mapping: Allowed
Type: Class
ID: 410
Name: Insufficient Resource Pool
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 412
Name: Unrestricted Externally Accessible Lock
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 413
Name: Improper Resource Locking
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 414
Name: Missing Lock Check
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 419
Name: Unprotected Primary Channel
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 42
Name: Path Equivalence: 'filename.' (Trailing Dot)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 420
Name: Unprotected Alternate Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 421
Name: Race Condition During Access to Alternate Channel
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 422
Name: Unprotected Windows Messaging Channel ('Shatter')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 424
Name: Improper Protection of Alternate Path
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 425
Name: Direct Request ('Forced Browsing')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Base
ID: 426
Name: Untrusted Search Path
Nature: HasMember
Mapping: Allowed-with-Review
Type: Base
ID: 427
Name: Uncontrolled Search Path Element
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 428
Name: Unquoted Search Path or Element
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 43
Name: Path Equivalence: 'filename....' (Multiple Trailing Dot)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 430
Name: Deployment of Wrong Handler
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 431
Name: Missing Handler
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 432
Name: Dangerous Signal Handler not Disabled During Sensitive Operations
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 433
Name: Unparsed Raw Web Content Delivery
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 434
Name: Unrestricted Upload of File with Dangerous Type
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 435
Name: Improper Interaction Between Multiple Correctly-Behaving Entities
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 436
Name: Interpretation Conflict
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 437
Name: Incomplete Model of Endpoint Features
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 439
Name: Behavioral Change in New Version or Environment
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 44
Name: Path Equivalence: 'file.name' (Internal Dot)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 440
Name: Expected Behavior Violation
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 441
Name: Unintended Proxy or Intermediary ('Confused Deputy')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 444
Name: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 446
Name: UI Discrepancy for Security Feature
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 447
Name: Unimplemented or Unsupported Feature in UI
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 448
Name: Obsolete Feature in UI
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 449
Name: The UI Performs the Wrong Action
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 45
Name: Path Equivalence: 'file...name' (Multiple Internal Dot)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 450
Name: Multiple Interpretations of UI Input
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 451
Name: User Interface (UI) Misrepresentation of Critical Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 453
Name: Insecure Default Variable Initialization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 454
Name: External Initialization of Trusted Variables or Data Stores
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 455
Name: Non-exit on Failed Initialization
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 456
Name: Missing Initialization of a Variable
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 457
Name: Use of Uninitialized Variable
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 459
Name: Incomplete Cleanup
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 46
Name: Path Equivalence: 'filename ' (Trailing Space)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 47
Name: Path Equivalence: ' filename' (Leading Space)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 471
Name: Modification of Assumed-Immutable Data (MAID)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 472
Name: External Control of Assumed-Immutable Web Parameter
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 474
Name: Use of Function with Inconsistent Implementations
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 475
Name: Undefined Behavior for Input to API
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 477
Name: Use of Obsolete Function
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 48
Name: Path Equivalence: 'file name' (Internal Whitespace)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 480
Name: Use of Incorrect Operator
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 488
Name: Exposure of Data Element to Wrong Session
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 489
Name: Active Debug Code
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 49
Name: Path Equivalence: 'filename/' (Trailing Slash)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 494
Name: Download of Code Without Integrity Check
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 497
Name: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 50
Name: Path Equivalence: '//multiple/leading/slash'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 501
Name: Trust Boundary Violation
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 51
Name: Path Equivalence: '/multiple//internal/slash'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 511
Name: Logic/Time Bomb
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 52
Name: Path Equivalence: '/multiple/trailing/slash//'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 521
Name: Weak Password Requirements
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 522
Name: Insufficiently Protected Credentials
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 53
Name: Path Equivalence: '\multiple\\internal\backslash'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 538
Name: Insertion of Sensitive Information into Externally-Accessible File or Directory
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 54
Name: Path Equivalence: 'filedir\' (Trailing Backslash)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 546
Name: Suspicious Comment
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 55
Name: Path Equivalence: '/./' (Single Dot Directory)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 552
Name: Files or Directories Accessible to External Parties
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 56
Name: Path Equivalence: 'filedir*' (Wildcard)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 561
Name: Dead Code
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 57
Name: Path Equivalence: 'fakedir/../realdir/filename'
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 570
Name: Expression is Always False
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 571
Name: Expression is Always True
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 58
Name: Path Equivalence: Windows 8.3 Filename
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 59
Name: Improper Link Resolution Before File Access ('Link Following')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 595
Name: Comparison of Object References Instead of Object Contents
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 601
Name: URL Redirection to Untrusted Site ('Open Redirect')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 602
Name: Client-Side Enforcement of Server-Side Security
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 603
Name: Use of Client-Side Authentication
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 605
Name: Multiple Binds to the Same Port
Nature: HasMember
Mapping: Allowed
Type: Compound
ID: 61
Name: UNIX Symbolic Link (Symlink) Following
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 612
Name: Improper Authorization of Index Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 62
Name: UNIX Hard Link
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 620
Name: Unverified Password Change
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 622
Name: Improper Validation of Function Hook Arguments
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 628
Name: Function Call with Incorrectly Specified Arguments
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 636
Name: Not Failing Securely ('Failing Open')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 637
Name: Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 638
Name: Not Using Complete Mediation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 639
Name: Authorization Bypass Through User-Controlled Key
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 64
Name: Windows Shortcut Following (.LNK)
Nature: HasMember
Mapping: Allowed-with-Review
Type: Base
ID: 640
Name: Weak Password Recovery Mechanism for Forgotten Password
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 641
Name: Improper Restriction of Names for Files and Other Resources
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 642
Name: External Control of Critical State Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 643
Name: Improper Neutralization of Data within XPath Expressions ('XPath Injection')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 644
Name: Improper Neutralization of HTTP Headers for Scripting Syntax
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 645
Name: Overly Restrictive Account Lockout Mechanism
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 646
Name: Reliance on File Name or Extension of Externally-Supplied File
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 647
Name: Use of Non-Canonical URL Paths for Authorization Decisions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 648
Name: Incorrect Use of Privileged APIs
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 649
Name: Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 65
Name: Windows Hard Link
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 650
Name: Trusting HTTP Permission Methods on the Server Side
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 651
Name: Exposure of WSDL File Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 652
Name: Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')
Nature: HasMember
Mapping: Allowed
Type: Class
ID: 653
Name: Improper Isolation or Compartmentalization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 654
Name: Reliance on a Single Factor in a Security Decision
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 655
Name: Insufficient Psychological Acceptability
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 656
Name: Reliance on Security Through Obscurity
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 66
Name: Improper Handling of File Names that Identify Virtual Resources
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 664
Name: Improper Control of a Resource Through its Lifetime
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 665
Name: Improper Initialization
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 67
Name: Improper Handling of Windows Device Names
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 672
Name: Operation on a Resource after Expiration or Release
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 674
Name: Uncontrolled Recursion
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 675
Name: Multiple Operations on Resource in Single-Operation Context
Nature: HasMember
Mapping: Discouraged
Type: Compound
ID: 680
Name: Integer Overflow to Buffer Overflow
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 681
Name: Incorrect Conversion between Numeric Types
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 682
Name: Incorrect Calculation
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 69
Name: Improper Handling of Windows ::DATA Alternate Data Stream
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 691
Name: Insufficient Control Flow Management
Nature: HasMember
Mapping: Discouraged
Type: Compound
ID: 692
Name: Incomplete Denylist to Cross-Site Scripting
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 693
Name: Protection Mechanism Failure
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 694
Name: Use of Multiple Resources with Duplicate Identifier
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 697
Name: Incorrect Comparison
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 703
Name: Improper Check or Handling of Exceptional Conditions
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 704
Name: Incorrect Type Conversion or Cast
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 705
Name: Incorrect Control Flow Scoping
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 706
Name: Use of Incorrectly-Resolved Name or Reference
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 707
Name: Improper Neutralization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 708
Name: Incorrect Ownership Assignment
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 710
Name: Improper Adherence to Coding Standards
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 72
Name: Improper Handling of Apple HFS+ Alternate Data Stream Path
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 73
Name: External Control of File Name or Path
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 732
Name: Incorrect Permission Assignment for Critical Resource
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 74
Name: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 749
Name: Exposed Dangerous Method or Function
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 75
Name: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 754
Name: Improper Check for Unusual or Exceptional Conditions
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 755
Name: Improper Handling of Exceptional Conditions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 76
Name: Improper Neutralization of Equivalent Special Elements
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 77
Name: Improper Neutralization of Special Elements used in a Command ('Command Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 770
Name: Allocation of Resources Without Limits or Throttling
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 778
Name: Insufficient Logging
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 779
Name: Logging of Excessive Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 78
Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 783
Name: Operator Precedence Logic Error
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 784
Name: Reliance on Cookies without Validation and Integrity Checking in a Security Decision
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 789
Name: Memory Allocation with Excessive Size Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 79
Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 798
Name: Use of Hard-coded Credentials
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 799
Name: Improper Control of Interaction Frequency
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 80
Name: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 804
Name: Guessable CAPTCHA
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 807
Name: Reliance on Untrusted Inputs in a Security Decision
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 81
Name: Improper Neutralization of Script in an Error Message Web Page
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 82
Name: Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 83
Name: Improper Neutralization of Script in Attributes in a Web Page
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 835
Name: Loop with Unreachable Exit Condition ('Infinite Loop')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 836
Name: Use of Password Hash Instead of Password for Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 837
Name: Improper Enforcement of a Single, Unique Action
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 838
Name: Inappropriate Encoding for Output Context
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 84
Name: Improper Neutralization of Encoded URI Schemes in a Web Page
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 842
Name: Placement of User into Incorrect Group
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 85
Name: Doubled Character XSS Manipulations
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 86
Name: Improper Neutralization of Invalid Characters in Identifiers in Web Pages
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 862
Name: Missing Authorization
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 863
Name: Incorrect Authorization
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 87
Name: Improper Neutralization of Alternate XSS Syntax
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 88
Name: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 89
Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 90
Name: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 908
Name: Use of Uninitialized Resource
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 909
Name: Missing Initialization of Resource
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 91
Name: XML Injection (aka Blind XPath Injection)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 910
Name: Use of Expired File Descriptor
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 911
Name: Improper Update of Reference Count
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 915
Name: Improperly Controlled Modification of Dynamically-Determined Object Attributes
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 916
Name: Use of Password Hash With Insufficient Computational Effort
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 918
Name: Server-Side Request Forgery (SSRF)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 920
Name: Improper Restriction of Power Consumption
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 921
Name: Storage of Sensitive Data in a Mechanism without Access Control
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 922
Name: Insecure Storage of Sensitive Information
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 923
Name: Improper Restriction of Communication Channel to Intended Endpoints
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 924
Name: Improper Enforcement of Message Integrity During Transmission in a Communication Channel
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 925
Name: Improper Verification of Intent by Broadcast Receiver
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 926
Name: Improper Export of Android Application Components
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 927
Name: Use of Implicit Intent for Sensitive Communication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 93
Name: Improper Neutralization of CRLF Sequences ('CRLF Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 940
Name: Improper Verification of Source of a Communication Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 941
Name: Incorrectly Specified Destination in a Communication Channel
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 942
Name: Permissive Cross-domain Policy with Untrusted Domains
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 943
Name: Improper Neutralization of Special Elements in Data Query Logic
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 97
Name: Improper Neutralization of Server-Side Includes (SSI) Within a Web Page
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 99
Name: Improper Control of Resource Identifiers ('Resource Injection')
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-294 - Not Language-Specific Weaknesses
Details not found