Category-1016: 限制暴露
ID: 1016
Status: Draft
Summary
Weaknesses in this category are related to the design and architecture of the entry points to a system. Frequently these deal with minimizing the attack surface through designing the system with the least needed amount of entry points. The weaknesses in this category could lead to a degradation of a system's defenses if they are not addressed when designing or implementing a secure architecture.
Membership
ID | NAME |
---|---|
CWE-210 | 通过自主产生的错误消息导致的信息暴露 |
CWE-211 | 通过外部产生的错误消息导致的信息暴露 |
CWE-214 | 通过处理环境导致的信息暴露 |
CWE-550 | 通过服务器错误消息导致的信息暴露 |
CWE-829 | 从非可信控制范围包含功能例程 |
CWE-830 | 从非可信源包含Web功能例程 |
References
REF-9 A Catalog of Security Architecture Weaknesses.
REF-10 Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird.
文章来源于互联网:scap中文网
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论