ID: 1016 Status: Draft
Weaknesses in this category are related to the design and architecture of the entry points to a system. Frequently these deal with minimizing the attack surface through designing the system with the least needed amount of entry points. The weaknesses in this category could lead to a degradation of a system's defenses if they are not addressed when designing or implementing a secure architecture.
ID | NAME |
---|---|
CWE-210 | 通过自主产生的错误消息导致的信息暴露 |
CWE-211 | 通过外部产生的错误消息导致的信息暴露 |
CWE-214 | 通过处理环境导致的信息暴露 |
CWE-550 | 通过服务器错误消息导致的信息暴露 |
CWE-829 | 从非可信控制范围包含功能例程 |
CWE-830 | 从非可信源包含Web功能例程 |
REF-9 A Catalog of Security Architecture Weaknesses. REF-10 Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird.