Excavation
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-1243
|
Sensitive Non-Volatile Information Not Protected During Debug
|
|
Subverting Environment Variable Values
|
CWE-15
|
External Control of System or Configuration Setting
|
CWE-20
|
Improper Input Validation
|
CWE-73
|
External Control of File Name or Path
|
CWE-74
|
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-285
|
Improper Authorization
|
CWE-302
|
Authentication Bypass by Assumed-Immutable Data
|
CWE-353
|
Missing Support for Integrity Check
|
|
Footprinting
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Exploiting Trust in Client
|
CWE-20
|
Improper Input Validation
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-287
|
Improper Authentication
|
CWE-290
|
Authentication Bypass by Spoofing
|
CWE-693
|
Protection Mechanism Failure
|
|
Fingerprinting
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
ICMP Echo Request Ping
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP SYN Scan
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Enumerate Mail Exchange (MX) Records
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
DNS Zone Transfers
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Host Discovery
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Traceroute Route Enumeration
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
ICMP Address Mask Request
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Timestamp Request
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
ICMP Information Request
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP ACK Ping
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
UDP Ping
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP SYN Ping
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Port Scanning
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP Connect Scan
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP FIN Scan
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP Xmas Scan
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP Null Scan
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP ACK Scan
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP Window Scan
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP RPC Scan
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
UDP Scan
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Network Topology Mapping
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Scanning for Vulnerable Software
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Active OS Fingerprinting
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Passive OS Fingerprinting
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
IP ID Sequencing Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
IP 'ID' Echoed Byte-Order Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
IP (DF) 'Don't Fragment Bit' Echoing Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP Timestamp Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP Sequence Number Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP (ISN) Greatest Common Divisor Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP (ISN) Counter Rate Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP (ISN) Sequence Predictability Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP Congestion Control Flag (ECN) Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP Initial Window Size Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP Options Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
TCP 'RST' Flag Checksum Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
ICMP Error Message Quoting Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
ICMP Error Message Echoing Integrity Probe
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Browser Fingerprinting
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
File Discovery
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Shoulder Surfing
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-359
|
Exposure of Private Personal Information to an Unauthorized Actor
|
|
Process Footprinting
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Services Footprinting
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Account Footprinting
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Group Permission Footprinting
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Owner Footprinting
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Session Credential Falsification through Prediction
|
CWE-6
|
J2EE Misconfiguration: Insufficient Session-ID Length
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-285
|
Improper Authorization
|
CWE-290
|
Authentication Bypass by Spoofing
|
CWE-330
|
Use of Insufficiently Random Values
|
CWE-331
|
Insufficient Entropy
|
CWE-346
|
Origin Validation Error
|
CWE-384
|
Session Fixation
|
CWE-488
|
Exposure of Data Element to Wrong Session
|
CWE-539
|
Use of Persistent Cookies Containing Sensitive Information
|
CWE-693
|
Protection Mechanism Failure
|
|
Reusing Session IDs (aka Session Replay)
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-285
|
Improper Authorization
|
CWE-290
|
Authentication Bypass by Spoofing
|
CWE-294
|
Authentication Bypass by Capture-replay
|
CWE-346
|
Origin Validation Error
|
CWE-384
|
Session Fixation
|
CWE-488
|
Exposure of Data Element to Wrong Session
|
CWE-539
|
Use of Persistent Cookies Containing Sensitive Information
|
CWE-664
|
Improper Control of a Resource Through its Lifetime
|
CWE-732
|
Incorrect Permission Assignment for Critical Resource
|
|
Establish Rogue Location
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Identify Shared Files/Directories on System
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-267
|
Privilege Defined With Unsafe Actions
|
|
Peripheral Footprinting
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Eavesdropping
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
|
Using Slashes in Alternate Encoding
|
CWE-20
|
Improper Input Validation
|
CWE-22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
|
CWE-73
|
External Control of File Name or Path
|
CWE-74
|
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
|
CWE-173
|
Improper Handling of Alternate Encoding
|
CWE-180
|
Incorrect Behavior Order: Validate Before Canonicalize
|
CWE-181
|
Incorrect Behavior Order: Validate Before Filter
|
CWE-185
|
Incorrect Regular Expression
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor
|
CWE-697
|
Incorrect Comparison
|
CWE-707
|
Improper Neutralization
|
|