C / C++コードの場合、CWEチェックリストは以下のルールに対するガイド付きチェックリストレビューを提供します。◄記号は、Imagix 4DのAdvancedエディションでより自動化されたチェックを提供するルールを示しています。Javaコードに対応するこれらのルールのサブセットは、☉記号で識別されています。
Imagix 4Dの各メジャーリリースおよび多くのマイナーリリースは、前回の更新以降にリリースされたCWEバージョンに対するサポートを追加します。現在、2.8から3.3までのすべてのCWEバージョンがサポートされています。
CWE-14 | Compiler Removal of Code to Clear Buffers |
CWE-20 ☉ | Improper Input Validation |
CWE-22 ☉ | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
CWE-23 ☉ | Relative Path Traversal |
CWE-24 ☉ | Path Traversal: '../filedir' |
CWE-25 ☉ | Path Traversal: '/../filedir' |
CWE-26 ☉ | Path Traversal: '/dir/../filename' |
CWE-27 ☉ | Path Traversal: 'dir/../../filename' |
CWE-28 ☉ | Path Traversal: '..\filedir' |
CWE-29 ☉ | Path Traversal: '\..\filename' |
CWE-30 ☉ | Path Traversal: '\dir\..\filename' |
CWE-31 ☉ | Path Traversal: 'dir\..\..\filename' |
CWE-32 ☉ | Path Traversal: '...' (Triple Dot) |
CWE-33 ☉ | Path Traversal: '....' (Multiple Dot) |
CWE-34 ☉ | Path Traversal: '....//' |
CWE-35 ☉ | Path Traversal: '.../...//' |
CWE-36 ☉ | Absolute Path Traversal |
CWE-37 ☉ | Path Traversal: '/absolute/pathname/here' |
CWE-38 ☉ | Path Traversal: '\absolute\pathname\here' |
CWE-39 ☉ | Path Traversal: 'C:dirname' |
CWE-40 ☉ | Path Traversal: '\\UNC\share\name\' (Windows UNC Share) |
CWE-41 ☉ | Improper Resolution of Path Equivalence |
CWE-51 ☉ | Path Equivalence: '/multiple//internal/slash' |
CWE-55 ☉ | Path Equivalence: '/./' (Single Dot Directory) |
CWE-57 ☉ | Path Equivalence: 'fakedir/../realdir/filename' |
CWE-59 ☉ | Improper Link Resolution Before File Access ('Link Following') |
CWE-61 | UNIX Symbolic Link (Symlink) Following |
CWE-62 | UNIX Hard Link |
CWE-73 | External Control of File Name or Path |
CWE-74 | Improper Neutralization of Special Elements in Output Used by a Downstream Component('Injection') |
CWE-75 | Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) |
CWE-76 | Improper Neutralization of Equivalent Special Elements |
CWE-77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') |
CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS CommandInjection') |
CWE-79 | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
CWE-88 | Argument Injection or Modification |
CWE-89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
CWE-90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
CWE-91 | XML Injection (aka Blind XPath Injection) |
CWE-93 | Improper Neutralization of CRLF Sequences ('CRLF Injection') |
CWE-94 | Improper Control of Generation of Code ('Code Injection') |
CWE-95 | Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') |
CWE-96 | Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') |
CWE-97 | Improper Neutralization of Server-Side Includes (SSI) Within a Web Page |
CWE-99 | Improper Control of Resource Identifiers ('Resource Injection') |
CWE-114 | Process Control |
CWE-116 | Improper Encoding or Escaping of Output |
CWE-117 | Improper Output Neutralization for Logs |
CWE-123 | Write-what-where Condition |
CWE-134 | Use of Externally-Controlled Format String |
CWE-135 | Incorrect Calculation of Multi-Byte String Length |
CWE-138 | Improper Neutralization of Special Elements |
CWE-140 | Improper Neutralization of Delimiters |
CWE-141 | Improper Neutralization of Parameter/Argument Delimiters |
CWE-142 | Improper Neutralization of Value Delimiters |
CWE-143 | Improper Neutralization of Record Delimiters |
CWE-144 | Improper Neutralization of Line Delimiters |
CWE-145 | Improper Neutralization of Section Delimiters |
CWE-146 | Improper Neutralization of Expression/Command Delimiters |
CWE-147 | Improper Neutralization of Input Terminators |
CWE-148 | Improper Neutralization of Input Leaders |
CWE-149 | Improper Neutralization of Quoting Syntax |
CWE-150 | Improper Neutralization of Escape, Meta, or Control Sequences |
CWE-151 | Improper Neutralization of Comment Delimiters |
CWE-152 | Improper Neutralization of Macro Symbols |
CWE-153 | Improper Neutralization of Substitution Characters |
CWE-154 | Improper Neutralization of Variable Name Delimiters |
CWE-155 | Improper Neutralization of Wildcards or Matching Symbols |
CWE-156 | Improper Neutralization of Whitespace |
CWE-157 | Failure to Sanitize Paired Delimiters |
CWE-158 | Improper Neutralization of Null Byte or NUL Character |
CWE-159 | Failure to Sanitize Special Element |
CWE-160 | Improper Neutralization of Leading Special Elements |
CWE-161 | Improper Neutralization of Multiple Leading Special Elements |
CWE-162 | Improper Neutralization of Trailing Special Elements |
CWE-163 | Improper Neutralization of Multiple Trailing Special Elements |
CWE-164 | Improper Neutralization of Internal Special Elements |
CWE-165 | Improper Neutralization of Multiple Internal Special Elements |
CWE-166 | Improper Handling of Missing Special Element |
CWE-167 | Improper Handling of Additional Special Element |
CWE-168 | Improper Handling of Inconsistent Special Elements |
CWE-172 | Encoding Error |
CWE-173 | Improper Handling of Alternate Encoding |
CWE-174 | Double Decoding of the Same Data |
CWE-175 | Improper Handling of Mixed Encoding |
CWE-176 | Improper Handling of Unicode Encoding |
CWE-177 | Improper Handling of URL Encoding (Hex Encoding) |
CWE-178 | Improper Handling of Case Sensitivity |
CWE-179 | Incorrect Behavior Order: Early Validation |
CWE-180 | Incorrect Behavior Order: Validate Before Canonicalize |
CWE-181 | Incorrect Behavior Order: Validate Before Filter |
CWE-182 | Collapse of Data into Unsafe Value |
CWE-184 ☉ | Incomplete Blacklist |
CWE-185 | Incorrect Regular Expression |
CWE-186 | Overly Restrictive Regular Expression |
CWE-187 | Partial Comparison |
CWE-188 ☉ | Reliance on Data/Memory Layout |
CWE-200 | Information Exposure |
CWE-201 | Information Exposure Through Sent Data |
CWE-203 | Information Exposure Through Discrepancy |
CWE-204 | Response Discrepancy Information Exposure |
CWE-209 | Information Exposure Through an Error Message |
CWE-210 | Information Exposure Through Self-generated Error Message |
CWE-211 | Information Exposure Through Externally-generated Error Message |
CWE-212 | Improper Cross-boundary Removal of Sensitive Data |
CWE-215 | Information Exposure Through Debug Information |
CWE-216 | Containment Errors (Container Errors) |
CWE-227 ☉ | Improper Fulfillment of API Contract ('API Abuse') |
CWE-241 | Improper Handling of Unexpected Data Type |
CWE-252 | Unchecked Return Value |
CWE-253 | Incorrect Check of Function Return Value |
CWE-273 | Improper Check for Dropped Privileges |
CWE-311 | Missing Encryption of Sensitive Data |
CWE-319 | Cleartext Transmission of Sensitive Information |
CWE-354 | Improper Validation of Integrity Check Value |
CWE-364 ◄ | Signal Handler Race Condition |
CWE-365 ◄ | Race Condition in Switch |
CWE-374 | Passing Mutable Objects to an Untrusted Method |
CWE-375 | Returning a Mutable Object to an Untrusted Caller |
CWE-378 | Creation of Temporary File With Insecure Permissions |
CWE-379 | Creation of Temporary File in Directory with Incorrect Permissions |
CWE-390 | Detection of Error Condition Without Action |
CWE-391 | Unchecked Error Condition |
CWE-394 | Unexpected Status Code or Return Value |
CWE-405 ◄ | Asymmetric Resource Consumption (Amplification) |
CWE-406 | Insufficient Control of Network Message Volume (Network Amplification) |
CWE-407 ☉ | Algorithmic Complexity |
CWE-408 ◄ | Incorrect Behavior Order: Early Amplification |
CWE-409 | Improper Handling of Highly Compressed Data (Data Amplification) |
CWE-410 | Insufficient Resource Pool |
CWE-412 ◄ | Unrestricted Externally Accessible Lock |
CWE-413 ◄ | Improper Resource Locking |
CWE-414 ◄ | Missing Lock Check |
CWE-430 | Deployment of Wrong Handler |
CWE-431 | Missing Handler |
CWE-432 ◄ | Dangerous Signal Handler not Disabled During Sensitive Operations |
CWE-447 ☉ | Unimplemented or Unsupported Feature in UI |
CWE-453 | Insecure Default Variable Initialization |
CWE-454 | External Initialization of Trusted Variables or Data Stores |
CWE-455 | Non-exit on Failed Initialization |
CWE-456 | Missing Initialization of a Variable |
CWE-460 | Improper Cleanup on Thrown Exception |
CWE-462 | Duplicate Key in Associative List (Alist) |
CWE-463 | Deletion of Data Structure Sentinel |
CWE-464 | Addition of Data Structure Sentinel |
CWE-470 | Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |
CWE-472 | External Control of Assumed-Immutable Web Parameter |
CWE-474 ☉ | Use of Function with Inconsistent Implementations |
CWE-479 ◄ | Signal Handler Use of a Non-reentrant Function |
CWE-488 ◄ | Exposure of Data Element to Wrong Session |
CWE-489 ☉ | Leftover Debug Code |
CWE-493 ☉ | Critical Public Variable Without Final Modifier |
CWE-494 | Download of Code Without Integrity Check |
CWE-496 | Public Data Assigned to Private Array-Typed Field |
CWE-497 | Exposure of System Data to an Unauthorized Control Sphere |
CWE-498 ☉ | Cloneable Class Containing Sensitive Information |
CWE-500 ☉ | Public Static Field Not Marked Final |
CWE-502 ☉ | Deserialization of Untrusted Data |
CWE-506 ☉ | Embedded Malicious Code |
CWE-507 ☉ | Trojan Horse |
CWE-508 | Non-Replicating Malicious Code |
CWE-509 ☉ | Replicating Malicious Code (Virus or Worm) |
CWE-510 | Trapdoor |
CWE-511 ☉ | Logic/Time Bomb |
CWE-512 ☉ | Spyware |
CWE-524 ☉ | Information Exposure Through Caching |
CWE-526 | Information Exposure Through Environmental Variables |
CWE-538 | File and Directory Information Exposure |
CWE-539 ☉ | Information Exposure Through Persistent Cookies |
CWE-543 ◄ | Use of Singleton Pattern Without Synchronization in a Multithreaded Context |
CWE-544 | Missing Standardized Error Handling Mechanism |
CWE-546 ☉ | Suspicious Comment |
CWE-548 ☉ | Information Exposure Through Directory Listing |
CWE-584 | Return Inside Finally Block |
CWE-587 | Assignment of a Fixed Address to a Pointer |
CWE-591 | Sensitive Data Storage in Improperly Locked Memory |
CWE-595 | Comparison of Object References Instead of Object Contents |
CWE-598 | Information Exposure Through Query Strings in GET Request |
CWE-605 | Multiple Binds to the Same Port |
CWE-622 ☉ | Improper Validation of Function Hook Arguments |
CWE-636 ☉ | Not Failing Securely ('Failing Open') |
CWE-637 ☉ | Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism') |
CWE-638 | Not Using Complete Mediation |
CWE-641 | Improper Restriction of Names for Files and Other Resources |
CWE-643 | Improper Neutralization of Data within XPath Expressions ('XPath Injection') |
CWE-652 | Improper Neutralization of Data within XQuery Expressions ('XQuery Injection') |
CWE-663 ◄ | Use of a Non-reentrant Function in a Concurrent Context |
CWE-664 | Improper Control of a Resource Through its Lifetime |
CWE-666 ☉ | Operation on Resource in Wrong Phase of Lifetime |
CWE-674 ☉ | Uncontrolled Recursion |
CWE-688 | Function Call With Incorrect Variable or Reference as Argument |
CWE-694 | Use of Multiple Resources with Duplicate Identifier |
CWE-754 | Improper Check for Unusual or Exceptional Conditions |
CWE-759 | Use of a One-Way Hash without a Salt |
CWE-761 | Free of Pointer not at Start of Buffer |
CWE-765 ◄ | Multiple Unlocks of a Critical Resource |
CWE-767 | Access to Critical Private Variable via Public Method |
CWE-773 ◄ | Missing Reference to Active File Descriptor or Handle |
CWE-774 ◄ | Allocation of File Descriptors or Handles Without Limits or Throttling |
CWE-777 | Regular Expression without Anchors |
CWE-785 | Use of Path Manipulation Function without Maximum-sized Buffer |
CWE-789 | Uncontrolled Memory Allocation |
CWE-806 | Buffer Access Using Size of Source Buffer |
CWE-828 ◄ | Signal Handler with Functionality that is not Asynchronous-Safe |
CWE-909 | Missing Initialization of Resource |
CWE-912 | Hidden Functionality |
CWE-913 | Improper Control of Dynamically-Managed Code Resources |
CWE-914 | Improper Control of Dynamically-Identified Variables |
CWE-915 | Improperly Controlled Modification of Dynamically-Determined Object Attributes |
CWE-916 ☉ | Use of Password Hash With Insufficient Computational Effort |
CWE-940 ☉ | Improper Verification of Source of a Communication Channel |
CWE-943 | Improper Neutralization of Special Elements in Data Query Logic |