Threat Classes and related CWE numbers
Tables showing threat classes of issues tested for by AppScan 360°, and their related CWE numbers.
| Threat Class | CWE |
|---|---|
| Abuse of Functionality | 10, 117, 16, 20, 200, 22, 284, 288, 434, 441, 456, 472, 489, 494, 497, 522, 601, 610, 618, 74, 77, 78, 79, 829, 98 |
| Brute Force | 204, 307, 340 |
| Buffer Overflow | 119, 120, 189, 825 |
| Content Spoofing | 327, 345, 359, 74, 79 |
| Credential/Session Prediction | 330 |
| Cross-Site Request Forgery | 352, 456 |
| Cross-Site Scripting | 22, 352, 456, 59, 73, 79, 89, 94 |
| Denial of Service | 119, 20, 310, 825 |
| Directory Indexing | 20, 200, 22, 548 |
| Format String | 134 |
| HTTP Request Splitting | 444 |
| HTTP Response Splitting | 113 |
| Information Leakage | 118, 200, 22, 264, 287, 299, 311, 352, 359, 472, 522, 523, 525, 538, 540, 550, 598, 602, 614, 615, 653, 693 |
| Insecure Indexing | 612 |
| Insufficient Authentication | 264, 287, 566, 862, 863 |
| Insufficient Authorization | 264, 285, 565 |
| Insufficient Session Expiration | 539, 613 |
| Insufficient Transport Layer Protection | 296, 297, 298, 523 |
| Integer Overflows | 550 |
| LDAP Injection | 90 |
| Mail Command Injection | 77 |
| Null Byte Injection | 626 |
| OS Commanding | 20, 264, 470, 73, 77, 78 |
| Path Traversal | 22, 94 |
| Predictable Resource Location | 306, 531 |
| Remote File Inclusion | 73, 829, 94, 98, 99 |
| Server Misconfiguration | 16, 327 |
| Session Fixation | 304, 384 |
| SOAP Array Abuse | 120 |
| SQL Injection | 209, 22, 79, 89, 94 |
| SSI Injection | 78, 97 |
| URL Redirector Abuse | 601 |
| XML Attribute Blowup | 400 |
| XML Entity Expansion | 400 |
| XML External Entities | 200, 611 |
| XML Injection | 91 |
| XPath Injection | 91 |
| Threat Class | CWE |
|---|---|
| Abuse of Functionality | 117, 242, 345, 367, 388, 398, 407, 447, 489, 517, 520, 543, 544, 586, 74, 98 |
| Application Misconfiguration | 16, 778 |
| Brute Force | 310, 312, 325, 327, 331 |
| Buffer Overflow | 120, 129, 131, 242 |
| Content Spoofing | 113, 425 |
| Credential/Session Prediction | 565 |
| Cross-Site Scripting | 352, 79 |
| Denial of Service | 382, 400, 404, 730 |
| Format String | 134 |
| HTTP Request Splitting | 113 |
| Improper Filesystem Permissions | 264 |
| Improper Input Handling | 112, 130, 15, 185, 20, 390, 425, 434, 538, 569, 602, 624, 74, 79, 95 |
| Improper Output Handling | 109, 116, 925 |
| Information Leakage | 20, 201, 209, 250, 311, 300 |
| Insufficient Authentication | 255, 266, 287, 521, 522 |
| Insufficient Authorization | 267, 288 |
| Insufficient Process Validation | 20 |
| Insufficient Session Expiration | 613 |
| Insufficient Transport Layer Protection | 295 |
| Integer Overflows | 190 |
| LDAP Injection | 90 |
| Mail Command Injection | 74, 79 |
| Malicious Content Tests | 470, 489, 506, 507, 511 |
| OS Commanding | 77, 78 |
| Path Traversal | 73 |
| SQL Injection | 89 |
| URL Redirector Abuse | 601 |
| XML Injection | 74, 91 |
| XPath Injection | 643 |
| Threat Class | CWE |
|---|---|
| M1: Weak Server Side Controls | 926, 927 |
| M2: Insecure Data Storage | 275, 310, 359, 451, 522 |
| M3: Insufficient Transport Layer Protection | 295, 296, 297, 300, 327, 490, 601, 754, 79, 829 |
| M4: Unintended Data Leakage | 592, 829 |
| M5: Poor Authorization and Authentication | 259, 321, 327, 338, 798 |
| M7: Client Side Injection | 112, 120, 134, 20, 275, 427, 451, 470, 490, 506, 682, 74, 754, 77, 790, 829, 88, 89, 927 |
| M8: Security Decisions Via Untrusted Inputs | 927 |
| M9: Improper Session Handling | 489, 693 |
| M10: Lack of Binary Protections | 489, 693, 829 |