Functionality Abuse
002. Asymmetric denial of service003. Symmetric denial of service014. Insecure functionality033. Password change without identity check048. Lack of root detection055. Insecure service configuration - ADB Backups058. Debugging enabled in production - APK060. Insecure service configuration - Host verification061. Remote File Inclusion064. Traceability loss - Server's clock065. Cached form fields067. Improper resource allocation070. Insecure service configuration - ELB073. Improper authorization control for web services - RDS079. Non-upgradable dependencies087. Account lockout088. Privacy violation093. Hidden fields manipulation095. Data uniqueness not properly verified101. Lack of protection against deletion102. Email uniqueness not properly verified108. Improper control of interaction frequency109. Unrestricted access between network segments - RDS110. HTTP request smuggling113. Improper type assignation117. Unverifiable files118. Regulation infringement120. Improper dependency pinning122. Email flooding124. Race condition138. Inappropriate coding practices140. Insecure exceptions - Empty or no catch143. Inappropriate coding practices - Eval function145. Inappropriate coding practices - Cyclomatic complexity164. Insecure service configuration165. Insecure service configuration - AWS166. Insecure service configuration - Kerberoast167. Insecure service configuration - Wireless Certificates168. Insecure service configuration - Keystore169. Insecure service configuration - Keys170. Insecure service configuration - Antivirus171. Insecure service configuration - Firewall172. Insecure service configuration - App Backup173. Insecure service configuration - Backup174. Insecure service configuration - Backdoor175. Insecure service configuration - DNS176. Insecure service configuration - SSH177. Insecure service configuration - Security Groups178. Insecure service configuration - RDP179. Insecure service configuration - SMB180. Insecure service configuration - SMTP181. Insecure service configuration - DynamoDB183. Debugging enabled in production200. Traceability loss211. Asymmetric denial of service - ReDoS231. Message flooding233. Incomplete functional code255. Insecure functionality - Pass the hash256. Lack of protection against deletion - RDS257. Lack of protection against deletion - EC2258. Lack of protection against deletion - ELB259. Lack of protection against deletion - DynamoDB260. Insecure Binary compilation267. Excessive Privileges - Kubernetes268. Insecure service configuration - Webview270. Insecure functionality - File Creation271. Insecure functionality - Password management272. Insecure functionality - Masking273. Insecure functionality - Fingerprint278. Insecure exceptions - NullPointerException285. Insecure service configuration - App Transport Security293. Insecure service configuration - Key pair294. Insecure service configuration - OTP302. Insecure functionality - Session management304. Inappropriate coding practices - Performance308. Enabled default configuration312. Insecure service configuration - Signatures313. Insecure service configuration - Certificates314. Insecure service configuration - DB315. Insecure service configuration - CloudDB316. Improper resource allocation - Buffer overflow317. Improper resource allocation - Memory leak319. Insecure service configuration - Roles320. Insecure service configuration - LDAP324. Insecure functionality - User management333. Insecure service configuration - EC2334. Insecure service configuration - IAM335. Insecure service configuration - Bucket338. Insecure service configuration - Salt339. Insecure service configuration - Request Validation343. Insecure service configuration - BREACH Attack347. Insecure service configuration - Task Hijacking352. Insecure service configuration - Non Masked Variables356. Symmetric denial of service - SMTP357. Symmetric denial of service - FTP358. Insecure service configuration - DocumentBuilderFactory366. Inappropriate coding practices - Transparency Conflict380. Supply Chain Attack - Docker381. Supply Chain Attack - Terraform382. Insufficient data authenticity validation - Front bypass384. Inappropriate coding practices - Wildcard export386. Cross-Site Leak - Frame Counting387. Insecure service configuration - Object Reutilization391. Inappropriate coding practices - Unused properties392. Security controls bypass or absence - Firewall393. Use of software with known vulnerabilities in development394. Insufficient data authenticity validation - Cloudtrail Logs395. Insecure generation of random numbers - Static IV396. Insecure service configuration - KMS398. Fragment Injection399. Security controls absence - Monitoring400. Traceability Loss - AWS401. Insecure service configuration - AKV Secret Expiration402. Traceability Loss - Azure403. Insecure service configuration - usesCleartextTraffic404. OS Command Injection405. Excessive privileges - Access Mode410. Dependency Confusion411. Insecure encryption algorithm - Default encryption412. Lack of protection against deletion - Azure Key Vault413. Insecure file upload - DLL Injection414. Insecure service configuration - Header Checking415. Insecure service configuration - Container level access policy416. XAML injection417. Account Takeover418. Insecure service configuration - Docker419. Traceability Loss - Kubernetes420. Password reset poisoning423. Inappropriate coding practices - System exit426. Supply Chain Attack - Kubernetes428. Inappropriate coding practices - invalid file431. Supply Chain Attack - Lock Files432. Inappropriate coding practices - relative path command437. Supply Chain Attack - GitHub Actions443. Insecure service configuration - Business logic444. Sensitive Information in Auto-Generated Screenshots445. Bucket takeover446. Insecure service configuration - Azure447. Supply Chain Attack - Gradle