2009 Top 25 - Porous Defenses |
Category ID: 753 (Category) | Status: Incomplete |
Description Summary
Weaknesses in this category are listed in the "Porous Defenses" section of the 2009 CWE/SANS Top 25 Programming Errors.
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ParentOf | ![]() | 250 | Execution with Unnecessary Privileges | Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)750 |
ParentOf | ![]() | 259 | Use of Hard-coded Password | Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)750 |
ParentOf | ![]() | 285 | Improper Access Control (Authorization) | Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)750 |
ParentOf | ![]() | 327 | Use of a Broken or Risky Cryptographic Algorithm | Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)750 |
ParentOf | ![]() | 330 | Use of Insufficiently Random Values | Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)750 |
ParentOf | ![]() | 602 | Client-Side Enforcement of Server-Side Security | Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)750 |
ParentOf | ![]() | 732 | Incorrect Permission Assignment for Critical Resource | Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)750 |
ParentOf | ![]() | 798 | Use of Hard-coded Credentials | Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)750 |
MemberOf | ![]() | 750 | Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors | Weaknesses in the 2009 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)750 |
"2009 CWE/SANS Top 25 Programming Errors". 2009-01-12. <http://cwe.mitre.org/top25>. |