CWE

普遍的弱点

社区开发的软件和硬件弱点类型清单

2021 CWE最重要的硬件弱点
CWE前25个最危险的弱点
>CWE列表> cwe-单个字典定义(4.10)
ID

CWE视图:2019年CWE中的弱点前25个最危险的软件错误

查看ID:1200
类型:图形
下载:小册子|CSV|XML
+Objective
CWEentries in this view are listed in the 2019 CWE Top 25 Most Dangerous Software Errors.
+观众
利益相关者 描述
软件开发人员 通过遵循前25名,开发人员将能够显着减少其软件中发生的弱点的数量。
产品客户 如果软件开发人员声称遵循前25名,那么客户可以在此观点中使用弱点,以制定该主张的独立证据。
教育工作者 教育工作者可以多种方式使用此观点。例如,如果关注教学弱点,教育者可以专注于前25名。
+关系
The following graph shows the tree-like relationships between weaknesses that exist at different levels of abstraction. At the highest level, categories and pillars exist to group weaknesses. Categories (which are not technically weaknesses) are special CWE entries used to group weaknesses that share a common characteristic. Pillars are weaknesses that are described in the most abstract fashion. Below these top-level entries are weaknesses are varying levels of abstraction. Classes are still very abstract, typically independent of any specific language or technology. Base level weaknesses are used to present a more specific type of weakness. A variant is a weakness that is described at a very low level of detail, typically limited to a specific language or technology. A chain is a set of weaknesses that must be reachable consecutively in order to produce an exploitable vulnerability. While a composite is a set of weaknesses that must all be present simultaneously in order to produce an exploitable vulnerability.
显示详细资料:
1200- 2019年CWE中的弱点前25个最危险的软件错误
* 班级班级- a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.内存缓冲区范围内操作的不当限制- (119)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>119 (在内存缓冲区范围内对操作的限制不当)
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.缓冲区溢出缓冲区超支记忆安全
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.网页生成期间输入的中和不当(“跨站点脚本”)- (79)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>79 (网页生成期间输入的中和不当(“跨站点脚本”))
该产品不会将用户控制输入放入输出中,该产品被用作提供给其他用户的网页之前,不会对用户控制输入进行中和。XSSHTML注射CSS
* 班级班级- a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.输入验证不当- (20)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>20 (输入验证不正确)
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
* 班级班级- a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.Exposure of Sensitive Information to an Unauthorized Actor- (200)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>200 (Exposure of Sensitive Information to an Unauthorized Actor)
该产品将敏感信息暴露于未被明确授权访问该信息的演员。信息披露信息泄漏
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.越野读- (125)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>125 (Out-of-bounds Read)
该产品在预期的缓冲区的末端或开始之前读取数据。
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.SQL命令中使用的特殊元素的中和不当('SQL注入')- (89)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>89 (SQL命令('SQL注入')中使用的特殊元素的中和不当
该产品使用来自上游组件的外部影响的输入构建SQL命令的全部或部分,但是它不会中和或错误地中和特殊元素,这些元素可能会在将其发送到下游组件时可以修改预期的SQL命令。
* 变体变体 - 与某种类型的产品相关的弱点,通常涉及特定的语言或技术。比基本弱点更具体。变体级别的弱点通常以以下维度的3到5来描述问题:行为,财产,技术,语言和资源。免费使用后使用- (416)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>416 (Use After Free)
引用内存释放后可能会导致程序崩溃,使用意外值或执行代码。悬挂的指针无使用后
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.整数溢出或环绕- (190)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>190 (整数溢出或环绕)
当逻辑假设结果值始终大于原始值时,产品执行的计算可以产生整数溢出或环绕。当计算用于资源管理或执行控制时,这可能会引入其他弱点。
* 合成的复合材料 - 一个由两个或更多不同的弱点组成的复合元素,其中所有弱点必须同时存在,以便出现潜在的脆弱性。消除任何弱点都消除或大幅降低了风险。一个弱点x可以被“分解”成y和z的组分弱点。在某些情况下,一个弱点对于复合材料可能不是必不可少的,但是当复合材料变成脆弱性时,它会改变其性质。跨站点伪造(CSRF)- (352)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>352 (跨站点伪造(CSRF))
Web应用程序没有或无法充分验证提交请求的用户有意提供了形成良好,有效,一致的请求。Session Riding跨站点参考伪造XSRF
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.路径名的不当限制到限制目录(“路径遍历”)- (22)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>22 (对路径名的不当限制到限制目录(“路径遍历”))
该产品使用外部输入来构建旨在识别位于受限制的父目录下方的文件或目录的路径名,但是该产品不能适当地中和路径名中的特殊元素,该路径名中的特殊元素可以使PATHNAME解析到该位置到一个位置,该位置是不在限制目录之外。目录遍历路径遍历
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.OS命令中使用的特殊元素的中和不当(“ OS命令注入”)- (78)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>78 (在OS命令中使用的特殊元素的中和不当('OS命令注入'))
该产品使用来自上游组件的外部影响的输入构建全部或部分OS命令,但是它不会中和或错误地中和特殊元素,这些元素可能会在将其发送到下游组件时可以修改预期的OS命令。壳注射壳化元
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.外面写作- (787)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>787 (外面写)
The product writes data past the end, or before the beginning, of the intended buffer.内存腐败
* 班级班级- a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.身份验证不当- (287)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>287 (身份验证不当)
当演员声称具有给定的身份时,该产品不会证明或不充分证明索赔是正确的。authentificationauthnauthc
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.空指针解除- (476)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>476 (零指针退出)
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.NPDnull deref零指针解除
* 班级班级- a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.Incorrect Permission Assignment for Critical Resource- (732)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>732 (关键资源的权限分配不正确)
该产品以允许意想不到的参与者读取或修改该资源的方式指定了关键资源的权限。
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.不受限制地上传危险类型的文件- (434)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>434 (不受限制地上传危险类型的文件)
该产品允许攻击者上传或传输可以在产品环境中自动处理的危险类型的文件。无限制的文件上传
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.Improper Restriction of XML External Entity Reference- (611)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>611 (XML外部实体参考的不当限制)
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.xxe
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.不当控制代码(“代码注入”)- (94)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>94 (不当控制代码(“代码注入”))
该产品使用来自上游组件的外部影响的输入构建代码段的全部或部分,但并不会中和或错误地中和可能会修改预期代码段语法或行为的特殊元素。
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.使用硬编码凭证- (798)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>798 (使用硬编码凭证)
该产品包含硬编码的凭据,例如密码或加密密钥,其用于自身的入站身份验证,与外部组件的出站通信或内部数据的加密。
* 班级班级- a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.不受控制的资源消耗- (400)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>400 (不受控制的资源消耗)
该产品无法正确控制有限资源的分配和维护,从而使演员能够影响所消耗的资源数量,最终导致可用资源的耗尽。资源耗尽
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.有效的一生后缺少资源的释放- (772)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>772 (有效终生后缺少资源的释放)
该产品在其有效的生命周期结束后不会发布资源,即不再需要资源之后。
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.不信任的搜索路径- (426)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>426 (Untrusted Search Path)
产品使用外部供应搜索路径来搜索关键资源,该搜索路径可以指向不在产品直接控制下的资源。不受信任的路径
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.不受信任数据的次要化- (502)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>502 (不受信任的数据的绝对序列化)
该产品在没有充分验证所得数据是否有效的情况下对不受信任的数据进行了挑选。Marshaling, Unmarshaling腌制,没有挑剔PHP对象注入
* 班级班级- a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource.特权管理不当- (269)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>269 (Improper Privilege Management)
该产品无法正确分配,修改,跟踪或检查演员的特权,为该演员创建意外的控制领域。
* 根据根据- a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.证书验证不当- (295)
1200 (2019年CWE前25个最危险的软件错误中的弱点)>295 (Improper Certificate Validation)
该产品未验证或错误验证证书。
+References
[REF-1028] "2019 CWE Top 25 Most Dangerous Software Errors". 2019-09-16. <http://cwe.mitre.org/top25/archive/2019/2019_cwe_top25.html>。
+查看指标
在此视图中 总CWES
弱点 25 out of 933
类别 0 out of 352
视图 0 out of 47
Total 25 out of 1332
+内容历史记录
+提交
提交日期 提交者 组织
2019-09-18 CWE内容团队 MITER
+修改
修改日期 Modifier 组织
2020-02-24 CWE内容团队 MITER
更新的View_Audience
提供更多信息 - 请选择其他过滤器。
页面最后更新:2023年1月31日