Product
Pricing
Developers
Resources
Contact
⌘
K
Login
Get Started
Home
CWE List
Software Fault Pattern (SFP) Clusters
View: Software Fault Pattern (SFP) Clusters
Incomplete
Type:
Graph
Objective
CWE identifiers in this view are associated with clusters of Software Fault Patterns (SFPs).
Audience
Type
Description
Applied Researchers
Academic Researchers
Product Vendors
Relationships
Show Details
Software Fault Pattern (SFP) Clusters
- (CWE-888)
SFP Primary Cluster: Risky Values
- (CWE-885)
SFP Secondary Cluster: Glitch in Computation
- (CWE-998)
SFP Primary Cluster: Unused entities
- (CWE-886)
Comparing instead of Assigning
- (CWE-482)
Dead Code
- (CWE-561)
Assignment to Variable without Use
- (CWE-563)
SFP Primary Cluster: API
- (CWE-887)
SFP Secondary Cluster: Use of an Improper API
- (CWE-1001)
SFP Primary Cluster: Exception Management
- (CWE-889)
SFP Secondary Cluster: Ambiguous Exception Type
- (CWE-960)
SFP Secondary Cluster: Incorrect Exception Behavior
- (CWE-961)
SFP Secondary Cluster: Unchecked Status Condition
- (CWE-962)
SFP Primary Cluster: Memory Access
- (CWE-890)
SFP Secondary Cluster: Faulty Buffer Access
- (CWE-970)
SFP Secondary Cluster: Faulty Pointer Use
- (CWE-971)
SFP Secondary Cluster: Faulty String Expansion
- (CWE-972)
SFP Secondary Cluster: Improper NULL Termination
- (CWE-973)
SFP Secondary Cluster: Incorrect Buffer Length Computation
- (CWE-974)
SFP Primary Cluster: Memory Management
- (CWE-891)
SFP Secondary Cluster: Faulty Memory Release
- (CWE-969)
SFP Primary Cluster: Resource Management
- (CWE-892)
SFP Secondary Cluster: Failure to Release Resource
- (CWE-982)
SFP Secondary Cluster: Faulty Resource Use
- (CWE-983)
SFP Secondary Cluster: Life Cycle
- (CWE-984)
SFP Secondary Cluster: Unrestricted Consumption
- (CWE-985)
SFP Primary Cluster: Path Resolution
- (CWE-893)
SFP Secondary Cluster: Failed Chroot Jail
- (CWE-979)
SFP Secondary Cluster: Link in Resource Name Resolution
- (CWE-980)
SFP Secondary Cluster: Path Traversal
- (CWE-981)
SFP Primary Cluster: Synchronization
- (CWE-894)
SFP Secondary Cluster: Missing Lock
- (CWE-986)
SFP Secondary Cluster: Multiple Locks/Unlocks
- (CWE-987)
SFP Secondary Cluster: Race Condition Window
- (CWE-988)
SFP Secondary Cluster: Unrestricted Lock
- (CWE-989)
SFP Primary Cluster: Information Leak
- (CWE-895)
SFP Secondary Cluster: Exposed Data
- (CWE-963)
SFP Secondary Cluster: Exposure Temporary File
- (CWE-964)
SFP Secondary Cluster: Insecure Session Management
- (CWE-965)
SFP Secondary Cluster: Other Exposures
- (CWE-966)
SFP Secondary Cluster: State Disclosure
- (CWE-967)
SFP Primary Cluster: Tainted Input
- (CWE-896)
SFP Secondary Cluster: Tainted Input to Command
- (CWE-990)
SFP Secondary Cluster: Tainted Input to Environment
- (CWE-991)
SFP Secondary Cluster: Faulty Input Transformation
- (CWE-992)
SFP Secondary Cluster: Incorrect Input Handling
- (CWE-993)
SFP Secondary Cluster: Tainted Input to Variable
- (CWE-994)
SFP Primary Cluster: Entry Points
- (CWE-897)
SFP Secondary Cluster: Unexpected Entry Points
- (CWE-1002)
SFP Primary Cluster: Authentication
- (CWE-898)
SFP Secondary Cluster: Authentication Bypass
- (CWE-947)
SFP Secondary Cluster: Digital Certificate
- (CWE-948)
SFP Secondary Cluster: Faulty Endpoint Authentication
- (CWE-949)
SFP Secondary Cluster: Hardcoded Sensitive Data
- (CWE-950)
SFP Secondary Cluster: Insecure Authentication Policy
- (CWE-951)
SFP Secondary Cluster: Missing Authentication
- (CWE-952)
SFP Secondary Cluster: Missing Endpoint Authentication
- (CWE-953)
SFP Secondary Cluster: Multiple Binds to the Same Port
- (CWE-954)
SFP Secondary Cluster: Unrestricted Authentication
- (CWE-955)
SFP Primary Cluster: Access Control
- (CWE-899)
SFP Secondary Cluster: Access Management
- (CWE-944)
SFP Secondary Cluster: Insecure Resource Access
- (CWE-945)
SFP Secondary Cluster: Insecure Resource Permissions
- (CWE-946)
SFP Primary Cluster: Privilege
- (CWE-901)
Execution with Unnecessary Privileges
- (CWE-250)
Incorrect Privilege Assignment
- (CWE-266)
Privilege Defined With Unsafe Actions
- (CWE-267)
Privilege Chaining
- (CWE-268)
Improper Privilege Management
- (CWE-269)
Privilege Context Switching Error
- (CWE-270)
Privilege Dropping / Lowering Errors
- (CWE-271)
Least Privilege Violation
- (CWE-272)
Improper Handling of Insufficient Privileges
- (CWE-274)
.NET Misconfiguration: Use of Impersonation
- (CWE-520)
Improper Isolation or Compartmentalization
- (CWE-653)
J2EE Misconfiguration: Weak Access Permissions for EJB Methods
- (CWE-9)
SFP Primary Cluster: Channel
- (CWE-902)
SFP Secondary Cluster: Channel Attack
- (CWE-956)
SFP Secondary Cluster: Protocol Error
- (CWE-957)
SFP Primary Cluster: Cryptography
- (CWE-903)
SFP Secondary Cluster: Broken Cryptography
- (CWE-958)
SFP Secondary Cluster: Weak Cryptography
- (CWE-959)
SFP Primary Cluster: Malware
- (CWE-904)
Embedded Malicious Code
- (CWE-506)
Trojan Horse
- (CWE-507)
Non-Replicating Malicious Code
- (CWE-508)
Replicating Malicious Code (Virus or Worm)
- (CWE-509)
Trapdoor
- (CWE-510)
Logic/Time Bomb
- (CWE-511)
Spyware
- (CWE-512)
Improper Handling of Windows ::DATA Alternate Data Stream
- (CWE-69)
SFP Secondary Cluster: Covert Channel
- (CWE-968)
SFP Primary Cluster: Predictability
- (CWE-905)
Use of Insufficiently Random Values
- (CWE-330)
Insufficient Entropy
- (CWE-331)
Insufficient Entropy in PRNG
- (CWE-332)
Improper Handling of Insufficient Entropy in TRNG
- (CWE-333)
Small Space of Random Values
- (CWE-334)
Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
- (CWE-335)
Same Seed in Pseudo-Random Number Generator (PRNG)
- (CWE-336)
Predictable Seed in Pseudo-Random Number Generator (PRNG)
- (CWE-337)
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
- (CWE-338)
Small Seed Space in PRNG
- (CWE-339)
Generation of Predictable Numbers or Identifiers
- (CWE-340)
Predictable from Observable State
- (CWE-341)
Predictable Exact Value from Previous Values
- (CWE-342)
Predictable Value Range from Previous Values
- (CWE-343)
Use of Invariant Value in Dynamically Changing Context
- (CWE-344)
SFP Primary Cluster: UI
- (CWE-906)
SFP Secondary Cluster: Feature
- (CWE-995)
SFP Secondary Cluster: Security
- (CWE-996)
SFP Secondary Cluster: Information Loss
- (CWE-997)
SFP Primary Cluster: Other
- (CWE-907)
SFP Secondary Cluster: Architecture
- (CWE-975)
SFP Secondary Cluster: Compiler
- (CWE-976)
SFP Secondary Cluster: Design
- (CWE-977)
SFP Secondary Cluster: Implementation
- (CWE-978)
SFP Primary Cluster: Faulty Resource Release
- (CWE-1237)
Double Free
- (CWE-415)
Mismatched Memory Management Routines
- (CWE-762)
Release of Invalid Pointer or Reference
- (CWE-763)
SFP Primary Cluster: Failure to Release Memory
- (CWE-1238)
Missing Release of Memory after Effective Lifetime
- (CWE-401)
Mapping Notes
Usage:
Prohibited
Reasons:
View
Rationale:
This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.
Comment:
Use this View or other Views to search and navigate for the appropriate weakness.