AWS CCP Notes

Search

Search IconIcon to open search

25-03 Vulnerability

Last updated Aug 17, 2023 Edit Source

# What is a vulnerability?

a hole or a weakness in the application, which can be a design flaw or an implementation bug, that allows an attacker to cause harm to the stakeholders of an application

# Vulnerability Examples

Allowing Domains or Accounts to ExpireInsecure Temporary FilePrivacy Violation
Buffer OverflowInsecure Third Party Domain AccessProcess Control
Business logic vulnerabilityInsecure TransportReturn Inside Finally Block
CRLF InjectionInsufficient EntropySession Variable Overloading
CSV InjectionInsufficient Session-ID LengthString Termination Error
Catch NullPointerExceptionLeast Privilege ViolationUnchecked Error Condition
Covert storage channelMemory leakUnchecked Return Value Missing Check against Null
Deserialization of untrusted dataMissing Error HandlingUndefined Behavior
Directory Restriction ErrorMissing XML ValidationUnreleased Resource
Doubly freeing memoryMultiple admin levelsUnrestricted File Upload
Empty String PasswordNull DereferenceUnsafe JNI
Expression Language InjectionOWASP .NET Vulnerability ResearchUnsafe Mobile Code
Full Trust CLR Verification issueOverly Permissive Regular ExpressionUnsafe function call from a signal handler
Heartbleed BugPHP File InclusionUnsafe use of Reflection
Improper Data ValidationPHP Object InjectionUse of Obsolete Methods
Improper pointer subtractionPRNG Seed ErrorUse of hard-coded password
Information exposure through query stringsPassword Management Hardcoded PasswordUsing a broken or risky cryptographic algorithm
Injection problemPassword Plaintext StorageUsing freed memory
Insecure Compiler OptimizationPoor Logging PracticeVulnerability template
Insecure RandomnessPortability FlawXML External Entity (XXE) Processing