Access Controls
Programming
Code
Malware
Malware Bugs
100

The unauthorized taking of personally identifiable information with the intent of committing fraud

Identity theft

100

Failure to use Hypertext Transfer Protocol Secure (HTTPS) to validate the certificate authority

Improper use of Secure Sockets Layer (SSL)

100

Unusual situations that require special processing, including irregularities during runtime

Catching exceptions

100

Computer software specifically designed to perform malicious or unwanted actions

Malware

100

Malware intended to provide undesired marketing and advertising, including pop-ups and banners on a user’s screens

Adware

200

Insufficient use of random and pseudorandom numbers such as the Monte Carlo method

Failure to use cryptographically strong random numbers

200

When programmers do not properly anticipate problems and prepared their application code to handle them

Failure to handle errors

200

An application error that occurs when user input is passed directly to a compiler or interpreter without screening for content that may disrupt or compromise the intended function

Command injections

200

A type of malware that is attached to other executable programs. When activated, it replicates and propagates itself to multiple systems, spreading by multiple communications vectors

Virus

200

Computer software specifically designed to identify and encrypt valuable information in a victim’s system in order to extort payment for the key needed to unlock the encryption

Ransomware

300

Inadequate use of access controls in programs and keeping secret information out of the program

Failure to store and protect data securely

300

A class of computational error caused by methods that computers use to store and manipulate integer numbers; this bug can be exploited by attackers

Integer bugs

300

When developers fail to properly validate user input before using it to query a relational database

SQL Injection

300

Attack programs that can use up to six known attack vectors to exploit a variety of vulnerabilities in common information system devices

Worm

300

A class of computational error caused by methods that computers use to store and manipulate integer numbers; this bug can be exploited by attackers

Integer bugs

400

Wireless traffic that does not properly employ WPA or sufficient encryption

Failure to protect network traffic

400

When an attacker changes the expected location of a file by intercepting and modifying a program code call, which can force a program to use files other than the ones it is supposed to use

Improper file access

400

When an attacker embeds characters that are meaningful as directives such as %x, %d, %p into malicious input

Format string problems

400

Any technology that aids in gathering information about people or organizations without their knowledge

Spyware

400

Malware that provides access to a system by bypassing normal access control or what an attacker uses to deliver malicious input to the victim

Payload

500

When an attacker changes the expected location of a file by intercepting and modifying a program code call, which can force a program to use files other than the ones it is supposed to use

Improper file access

500

An application error that occurs when more data is sent to a program buffer than it is designed to handle

Buffer overruns

500

A Web application fault that occurs when an application running on a Web server inserts commands into a user’s browser session and causes information to be sent to a hostile server

Cross-site scripting (XSS)

500

A form of social engineering in which the attacker provides what appears to be a legitimate communication (usually e-mail), but it contains hidden or embedded code that redirects the reply to a third-party site in an effort to extract personal or confidential information

Phishing

500

A malware program that hides its true nature and reveals its designed behavior only when activated

Trojan Horse
M
e
n
u