2010 Top 25 - Porous Defenses |
Category ID: 803 (Category) | Status: Incomplete |
Description Summary
Weaknesses in this category are listed in the "Porous Defenses" section of the 2010 CWE/SANS Top 25 Programming Errors.
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ParentOf | ![]() | 285 | Improper Access Control (Authorization) | Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)800 |
ParentOf | ![]() | 306 | Missing Authentication for Critical Function | Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)800 |
ParentOf | ![]() | 311 | Missing SecurityDatabase\Encrypt\Encryption of Sensitive Data | Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)800 |
ParentOf | ![]() | 327 | Use of a Broken or Risky Cryptographic Algorithm | Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)800 |
ParentOf | ![]() | 732 | Incorrect Permission Assignment for Critical Resource | Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)800 |
ParentOf | ![]() | 798 | Use of Hard-coded Credentials | Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)800 |
ParentOf | ![]() | 807 | Reliance on Untrusted Inputs in a Security Decision | Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)800 |
MemberOf | ![]() | 800 | Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors | Weaknesses in the 2010 CWE/SANS Top 25 Most Dangerous Programming Errors (primary)800 |
"2010 CWE/SANS Top 25 Most Dangerous Programming Errors". 2010-02-04. <http://cwe.mitre.org/top25>. |