漏洞类型整理

前言

取自https://hackerone.com/介绍的漏洞类型的整理

分为以下主要类别:

  1. 输入验证与注入:包括各类注入、跨站脚本、路径遍历等。
  2. 身份与访问控制:包括认证、授权、会话管理、权限提升等。
  3. 加密与敏感数据保护:包括弱加密、明文存储、信息泄露等。
  4. 代码质量与资源管理:包括内存错误、竞态条件、资源泄漏、空指针等。
  5. 配置与部署安全:包括错误配置、不安全默认值、调试信息泄露等。
  6. 业务逻辑与设计缺陷:包括业务流程绕过、功能滥用、设计漏洞等。
  7. 硬件、固件与供应链:包括硬件攻击、固件篡改、供应链投毒等。
  8. 社会工程学与人为因素:包括钓鱼、欺诈、诱导等。
  9. 网络协议与通信安全:包括网络嗅探、中间人攻击、DNS劫持等。
  10. AI/LLM安全:专门针对大语言模型和AI系统的攻击。
  11. 其他攻击与侦察技术:包括指纹识别、暴力破解、侦察等。

表格整理详细


1. 输入验证与注入

英文名称 中文翻译
注入类
Argument Injection 参数注入
Blind SQL Injection 盲SQL注入
Code Injection 代码注入
Command Delimiters 命令分隔符
Command Injection 命令注入
Command Injection - Generic 命令注入 - 通用
Command Line Execution through SQL Injection 通过SQL注入执行命令行
CRLF Injection CRLF注入
Cross-site Scripting (XSS) - Generic 跨站脚本 - 通用
Cross-site Scripting (XSS) - Reflected 跨站脚本 - 反射型
Cross-site Scripting (XSS) - Stored 跨站脚本 - 存储型
DOM-Based XSS 基于DOM的跨站脚本
DTD Injection DTD注入
Email Injection 邮件注入
Expression Language Injection 表达式语言注入
Format String Injection 格式字符串注入
IMAP/SMTP Command Injection IMAP/SMTP命令注入
Improper Neutralization of Input Used for LLM Prompting LLM提示词输入中和不当
LDAP Injection LDAP注入
NoSQL Injection NoSQL注入
OS Command Injection 操作系统命令注入
Parameter Injection 参数注入
PHP Local File Inclusion PHP本地文件包含
PHP Remote File Inclusion PHP远程文件包含
Prompt Injection 提示词注入
Relative Path Traversal 相对路径遍历
Remote Code Inclusion 远程代码包含
Remote File Inclusion 远程文件包含
Server Side Include (SSI) Injection 服务端包含注入
Server Side Request Forgery 服务端请求伪造
SQL Injection SQL注入
SQL Injection: Hibernate SQL注入:Hibernate框架
XPath Injection XPath注入
XQuery Injection XQuery注入
XML Injection XML注入
跨站脚本(XSS)变种
Cross Frame Scripting (XFS) 跨框架脚本
Cross Site Tracing 跨站追踪
Cross Zone Scripting 跨区域脚本
Doubled Character XSS Manipulations 双字符XSS操纵
Improper Neutralization of Script in Attributes in a Web Page 网页属性中脚本中和不当
Improper Neutralization of Script in an Error Message Web Page 错误信息网页中脚本中和不当
XSS Targeting Error Pages 针对错误页面的XSS
XSS Targeting HTML Attributes 针对HTML属性的XSS
XSS Targeting Non-Script Elements 针对非脚本元素的XSS
XSS Targeting URI Placeholders 针对URI占位符的XSS
XSS Through HTTP Headers 通过HTTP头部的XSS
XSS Through HTTP Query Strings 通过HTTP查询字符串的XSS
XSS Using Alternate Syntax 使用替代语法的XSS
XSS Using Doubled Characters 使用双字符的XSS
XSS Using Invalid Characters 使用无效字符的XSS
XSS Using MIME Type Mismatch 利用MIME类型不匹配的XSS
路径遍历
Absolute Path Traversal 绝对路径遍历
Path Traversal 路径遍历
Path Traversal: ‘…/…//‘ 路径遍历:’…/…//‘
Path Traversal: ‘….//‘ 路径遍历:’….//‘
Path Traversal: ‘/absolute/pathname/here’ 路径遍历:’/absolute/pathname/here’
Path Traversal: ‘C:dirname’ 路径遍历:’C:dirname’
Path Traversal: ‘/dir/../filename’ 路径遍历:’/dir/../filename’
Path Traversal: ‘dir/../../filename’ 路径遍历:’dir/../../filename’
Path Traversal: ‘/../filedir’ 路径遍历:’/../filedir’
Path Traversal: ‘../filedir’ 路径遍历:’../filedir’
文件包含与操作
Add Malicious File to Shared Webroot 向共享Web根目录添加恶意文件
Alternative Execution Due to Deceptive Filenames 由欺骗性文件名导致的替代执行
Create files with the same name as files protected with a higher classification 创建与更高级别保护文件同名的文件
File Content Injection 文件内容注入
Local Code Inclusion 本地代码包含
Upload a Web Shell to a Web Server 向Web服务器上传Webshell
User-Controlled Filename 用户控制的文件名
其他输入验证
Adding a Space to a File Extension 向文件扩展名添加空格
Alternative IP Address Encodings 使用替代IP地址编码
Bypassing of Intermediate Forms in Multiple-Form Sets 绕过多表单集中的中间表单
Double Decoding of the Same Data 对相同数据进行双重解码
Double Encoding 双重编码
Embedding NULL Bytes 嵌入空字节
Escaped Slashes in Alternate Encoding 替代编码中的转义斜杠
Failure to Sanitize Paired Delimiters 未能清理成对分隔符
Failure to Sanitize Special Elements into a Different Plane 未能将特殊元素清理到不同平面
Filter Failure through Buffer Overflow 通过缓冲区溢出导致过滤失败
HTTP Parameter Pollution (HPP) HTTP参数污染
Improper Filtering of Special Elements 特殊元素过滤不当
Improper Handling of URL Encoding (Hex Encoding) URL编码处理不当
Improper Neutralization of Null Byte or NUL Character 空字节中和不当
Improper Neutralization of Whitespace 空白字符中和不当
Leading ‘Ghost’ Character Sequences to Bypass Input Filters 使用前导“幽灵”字符序列绕过输入过滤器
Only Filtering One Instance of a Special Element 仅过滤特殊元素的一个实例
Only Filtering Special Elements at an Absolute Position 仅在绝对位置过滤特殊元素
Only Filtering Special Elements at a Specified Location 仅在指定位置过滤特殊元素
Only Filtering Special Elements Relative to a Marker 仅相对于标记过滤特殊元素
Using Slashes and URL Encoding Combined to Bypass Validation Logic 结合使用斜杠和URL编码绕过验证逻辑
Using Slashes in Alternate Encoding 在替代编码中使用斜杠
Using Unicode Encoding to Bypass Validation Logic 使用Unicode编码绕过验证逻辑
Using UTF-8 Encoding to Bypass Validation Logic 使用UTF-8编码绕过验证逻辑
XML External Entities (XXE) XML外部实体

2. 身份与访问控制

英文名称 中文翻译
认证绕过
Authentication Abuse 认证滥用
Authentication Bypass 认证绕过
Authentication Bypass by Alternate Name 通过替代名称绕过认证
Authentication Bypass by Assumed-Immutable Data 通过假定的不可变数据绕过认证
Authentication Bypass by Capture-replay 通过捕获重放绕过认证
Authentication Bypass by Primary Weakness 通过主要弱点绕过认证
Authentication Bypass by Spoofing 通过欺骗绕过认证
Authentication Bypass Using an Alternate Path or Channel 使用替代路径或通道绕过认证
Credential Prompt Impersonation 凭据提示冒充
Missing Authentication for Critical Function 关键功能缺少认证
Missing Critical Step in Authentication 认证中缺少关键步骤
Reflection Attack in Authentication Protocol 认证协议中的反射攻击
Reliance on IP Address for Authentication 依赖IP地址进行认证
Trusting HTTP Permission Methods on the Server Side 服务端信任HTTP权限方法
Using Referer Field for Authentication 使用Referer字段进行认证
授权与权限
Access Control Check Implemented After Asset is Accessed 在资产被访问后实施访问控制检查
Accessing Functionality Not Properly Constrained by ACLs 访问未受ACL适当约束的功能
Authorization Bypass Through User-Controlled SQL Primary Key 通过用户控制的SQL主键绕过授权
Authorization Bypass 授权绕过
Incorrect Authorization 不正确的授权
Improper Authorization 授权不当
Improper Authorization in Handler for Custom URL Scheme 自定义URL方案处理程序中的授权不当
Improper Authorization of Index Containing Sensitive Information 包含敏感信息的索引授权不当
Improper Privilege Management 权限管理不当
Improper Restriction of Security Token Assignment 安全令牌分配限制不当
Incorrect Permission Assignment for Critical Resource 关键资源权限分配错误
Incorrect Privilege Assignment 权限分配错误
Least Privilege Violation 违反最小权限原则
Missing Authorization 缺少授权
Privilege Abuse 权限滥用
Privilege Chaining 权限链
Privilege Context Switching Error 权限上下文切换错误
Privilege Defined With Unsafe Actions 定义的权限包含不安全操作
Privilege Dropping / Lowering Errors 权限降低错误
Privilege Escalation 权限提升
Restful Privilege Elevation RESTful风格权限提升
会话管理
Account Hijacking 账户劫持
Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created 认证绕过:SSL对象创建后修改OpenSSL CTX对象
Cookie Manipulation Cookie操纵
Cross Site Request Forgery (CSRF) 跨站请求伪造
Credential Stuffing 凭据填充
Insufficient Session Expiration 会话过期不足
Reusing Session IDs (aka Session Replay) 重用会话ID(会话重放)
Session Credential Falsification through Forging 通过伪造进行会话凭据伪造
Session Credential Falsification through Manipulation 通过操纵进行会话凭据伪造
Session Credential Falsification through Prediction 通过预测进行会话凭据伪造
Session Fixation 会话固定
Session Hijacking 会话劫持
Session Sidejacking 会话侧劫持
身份欺骗与仿冒
Account Footprinting 账户足迹
Identity Spoofing 身份欺骗
Principal Spoof 主体欺骗
Signature Spoof 签名欺骗
Signature Spoofing by Improper Validation 通过不当验证进行签名欺骗
Signature Spoofing by Key Recreation 通过密钥重建进行签名欺骗
Signature Spoofing by Key Theft 通过密钥窃取进行签名欺骗
Signature Spoofing by Misrepresentation 通过虚假陈述进行签名欺骗
Signature Spoofing by Mixing Signed and Unsigned Content 通过混合签名和未签名内容进行签名欺骗
Spoofing of UDDI/ebXML Messages UDDI/ebXML消息欺骗
暴力破解与枚举
Brute Force 暴力破解
Dictionary-based Password Attack 基于字典的密码攻击
Encryption Brute Forcing 加密暴力破解
Inducing Account Lockout 诱导账户锁定
Kerberoasting Kerberoasting攻击
Overly Restrictive Account Lockout Mechanism 过于严格的账户锁定机制
Password Brute Forcing 密码暴力破解
Password Spraying 密码喷洒
Rainbow Table Password Cracking 彩虹表密码破解
Try All Common Switches 尝试所有常见开关
Try Common or Default Usernames and Passwords 尝试通用或默认用户名和密码

3. 加密与敏感数据保护

英文名称 中文翻译
信息泄露
Cleartext Storage in a File or on Disk 文件或磁盘中的明文存储
Cleartext Storage in the Registry 注册表中的明文存储
Cleartext Storage of Sensitive Information in a Cookie Cookie中敏感信息的明文存储
Cleartext Storage of Sensitive Information in Executable 可执行文件中敏感信息的明文存储
Cleartext Storage of Sensitive Information in GUI GUI中敏感信息的明文存储
Cleartext Storage of Sensitive Information in Memory 内存中敏感信息的明文存储
Cleartext Transmission of Sensitive Information 敏感信息的明文传输
Exposure of Information Through Shell Error Message 通过Shell错误消息暴露信息
Exposure of Sensitive Information Through Data Queries 通过数据查询暴露敏感信息
Exposure of Sensitive Information Through Environmental Variables 通过环境变量暴露敏感信息
Exposure of Sensitive Information Through Metadata 通过元数据暴露敏感信息
Exposure of Sensitive System Information Due to Uncleared Debug Information 因未清除调试信息而暴露敏感系统信息
Exposure of Sensitive System Information to an Unauthorized Control Sphere 向未授权控制域暴露敏感系统信息
Information Disclosure 信息泄露
Information Exposure Through an Error Message 通过错误消息暴露信息
Information Exposure Through Debug Information 通过调试信息暴露信息
Information Exposure Through Directory Listing 通过目录列表暴露信息
Information Exposure Through Discrepancy 通过差异暴露信息
Information Exposure Through Sent Data 通过发送的数据暴露信息
Information Exposure Through Timing Discrepancy 通过时间差异暴露信息
Insertion of Sensitive Information into Log File 将敏感信息插入日志文件
Java Runtime Error Message Containing Sensitive Information 包含敏感信息的Java运行时错误消息
Server-generated Error Message Containing Sensitive Information 服务器生成的包含敏感信息的错误消息
Servlet Runtime Error Message Containing Sensitive Information 包含敏感信息的Servlet运行时错误消息
弱加密
Algorithm Downgrade 算法降级
Cryptographic Issues - Generic 加密问题 - 通用
Drop Encryption Level 降低加密级别
Generation of Predictable IV with CBC Mode CBC模式下生成可预测的初始向量
Generation of Weak Initialization Vector (IV) 生成弱初始化向量
Inadequate Encryption Strength 加密强度不足
Insufficient Entropy 熵不足
Padding Oracle Crypto Attack 填充预言机加密攻击
Reversible One-Way Hash 可逆的单向哈希
Selection of Less-Secure Algorithm During Negotiation 协商期间选择安全性较低的算法
Small Seed Space in PRNG 伪随机数生成器种子空间过小
Use of a Broken or Risky Cryptographic Algorithm 使用已破解或有风险的加密算法
Use of a Cryptographic Primitive with a Risky Implementation 使用实现有风险的加密原语
Use of a One-Way Hash with a Predictable Salt 使用带有可预测盐的单向哈希
Use of a One-Way Hash without a Salt 使用无盐的单向哈希
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) 使用密码学上弱的伪随机数生成器
Use of Hard-coded Cryptographic Key 使用硬编码的加密密钥
Use of Insufficiently Random Values 使用随机性不足的值
Use of Password Hash Instead of Password for Authentication 使用密码哈希代替密码进行认证
Use of Password Hash With Insufficient Computational Effort 使用计算工作量不足的密码哈希
Use of Predictable Algorithm in Random Number Generator 随机数生成器中使用可预测算法
Use of RSA Algorithm without OAEP 使用不带OAEP的RSA算法
Weak Cryptography for Passwords 密码的弱加密
敏感数据暴露
Cleartext Storage of Sensitive Information 敏感信息的明文存储
Exposure of Access Control List Files to an Unauthorized Control Sphere 向未授权控制域暴露访问控制列表文件
Exposure of Backup File to an Unauthorized Control Sphere 向未授权控制域暴露备份文件
Exposure of Core Dump File to an Unauthorized Control Sphere 向未授权控制域暴露核心转储文件
Exposure of Version-Control Repository to an Unauthorized Control Sphere 向未授权控制域暴露版本控制仓库
Exposure of WSDL File Containing Sensitive Information 暴露包含敏感信息的WSDL文件
Insecure Storage of Sensitive Information 敏感信息的不安全存储
Privacy Violation 隐私侵犯
Storing Passwords in a Recoverable Format 以可恢复格式存储密码
信息残留
Remanent Data Readable after Memory Erase 内存擦除后残留数据可读
Sensitive Information in Resource Not Removed Before Reuse 资源重用前未删除其中的敏感信息
Sensitive Information Uncleared Before Debug/Power State Transition 调试/电源状态转换前未清除敏感信息

4. 代码质量与资源管理

英文名称 中文翻译
内存错误
Access of Memory Location After End of Buffer 访问缓冲区结束后的内存位置
Access of Memory Location Before Start of Buffer 访问缓冲区开始前的内存位置
Access of Uninitialized Pointer 访问未初始化的指针
Buffer Access Using Size of Source Buffer 使用源缓冲区大小进行缓冲区访问
Buffer Access with Incorrect Length Value 使用错误长度值进行缓冲区访问
Buffer Overflow in an API Call API调用中的缓冲区溢出
Buffer Overflow in Local Command-Line Utilities 本地命令行工具中的缓冲区溢出
Buffer Overflow via Environment Variables 通过环境变量的缓冲区溢出
Buffer Overflow via Parameter Expansion 通过参数扩展的缓冲区溢出
Buffer Overflow via Symbolic Links 通过符号链接的缓冲区溢出
Buffer Over-read 缓冲区过度读取
Buffer Underflow 缓冲区下溢
Buffer Under-read 缓冲区不足读取
Classic Buffer Overflow 经典缓冲区溢出
Double Free 双重释放
Expired Pointer Dereference 过期指针解引用
Free of Memory not on the Heap 释放不在堆上的内存
Free of Pointer not at Start of Buffer 释放不在缓冲区起始位置的指针
Heap Overflow 堆溢出
Improper Clearing of Heap Memory Before Release (‘Heap Inspection’) 释放前未正确清除堆内存(堆检查)
NULL Pointer Dereference 空指针解引用
Off-by-one Error 差一错误
Out-of-bounds Read 越界读取
Out-of-bounds Write 越界写入
Release of Invalid Pointer or Reference 释放无效指针或引用
Return of Stack Variable Address 返回栈变量地址
Stack Overflow 栈溢出
Type Confusion 类型混淆
Use After Free 释放后使用
Use of Expired File Descriptor 使用已过期的文件描述符
Use of Out-of-range Pointer Offset 使用超出范围的指针偏移
Use of Pointer Subtraction to Determine Size 使用指针减法确定大小
Use of sizeof() on a Pointer Type 在指针类型上使用sizeof
Write-what-where Condition 写入-什么-何处条件
竞态条件
Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’) 使用共享资源并发执行但同步不当(竞态条件)
Context Switching Race Condition 上下文切换竞态条件
Leveraging Race Conditions 利用竞态条件
Leveraging Race Conditions via Symbolic Links 通过符号链接利用竞态条件
Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions 利用检查时与使用时竞态条件
Permission Race Condition During Resource Copy 资源复制期间的权限竞态条件
Race Condition During Access to Alternate Channel 访问备用通道期间的竞态条件
Race Condition Enabling Link Following 启用链接跟随的竞态条件
Race Condition for Write-Once Attributes 一次性写入属性的竞态条件
Race Condition within a Thread 线程内的竞态条件
Time-of-check Time-of-use (TOCTOU) Race Condition 检查时与使用时竞态条件
资源管理
Allocation of File Descriptors or Handles Without Limits or Throttling 无限或无节流地分配文件描述符或句柄
Allocation of Resources Without Limits or Throttling 无限或无节流地分配资源
Creation of Temporary File in Directory with Insecure Permissions 在权限不安全的目录中创建临时文件
Creation of Temporary File With Insecure Permissions 以不安全的权限创建临时文件
Excessive Allocation 过度分配
Exposure of File Descriptor to Unintended Control Sphere (‘File Descriptor Leak’) 向非预期控制域暴露文件描述符(文件描述符泄漏)
Improper Control of a Resource Through its Lifetime 资源生命周期控制不当
Improper Resource Shutdown or Release 资源关闭或释放不当
Insufficient Resource Pool 资源池不足
Memory Allocation with Excessive Size Value 使用过大尺寸值进行内存分配
Missing Release of File Descriptor or Handle after Effective Lifetime 有效生命周期后未释放文件描述符或句柄
Missing Release of Memory after Effective Lifetime 有效生命周期后未释放内存
Missing Release of Resource after Effective Lifetime 有效生命周期后未释放资源
Operation on a Resource after Expiration or Release 在资源过期或释放后对其进行操作
Operation on Resource in Wrong Phase of Lifetime 在错误生命周期阶段对资源进行操作
Premature Release of Resource During Expected Lifetime 在预期生命周期内过早释放资源
Resource Injection 资源注入
Resource Leak Exposure 资源泄漏暴露
Uncontrolled Resource Consumption 不受控制的资源消耗
Uncontrolled Recursion 不受控制的递归
代码逻辑与质量
Always-Incorrect Control Flow Implementation 始终不正确的控制流实现
Assigning instead of Comparing 赋值代替比较
Assignment of a Fixed Address to a Pointer 将固定地址赋值给指针
Assignment to Variable without Use 赋值后未使用的变量
Class with Excessively Deep Inheritance 继承层次过深的类
Class with Excessive Number of Child Classes 子类数量过多的类
Class with Virtual Method without a Virtual Destructor 包含虚方法但无虚析构函数的类
Cloneable Class Containing Sensitive Information 包含敏感信息的可克隆类
clone() Method Without super.clone() clone()方法未调用super.clone()
Code Inclusion 代码包含
Comparing instead of Assigning 比较代替赋值
Comparison Logic is Vulnerable to Power Side-Channel Attacks 比较逻辑易受功耗侧信道攻击
Comparison of Classes by Name 按名称比较类
Comparison of Incompatible Types 不兼容类型比较
Comparison of Object References Instead of Object Contents 比较对象引用而非对象内容
Comparison Using Wrong Factors 使用错误因素进行比较
Dead Code 死代码
Declaration of Catch for Generic Exception 捕获通用异常的声明
Declaration of Throws for Generic Exception 抛出通用异常的声明
Declaration of Variable with Unnecessarily Wide Scope 声明了不必要宽作用域的变量
Double-Checked Locking 双重检查锁定
Duplicate Key in Associative List (Alist) 关联列表中的重复键
Empty Code Block 空代码块
Empty Exception Block 空异常块
Empty Synchronized Block 空同步块
Excessive Code Complexity 代码复杂度过高
Excessive Halstead Complexity Halstead复杂度过高
Excessive McCabe Cyclomatic Complexity McCabe圈复杂度过高
Excessive Reliance on Global Variables 过度依赖全局变量
Excessive Use of Hard-Coded Literals in Initialization 初始化中过度使用硬编码字面量
Excessive Use of Self-Modifying Code 过度使用自修改代码
Excessive Use of Unconditional Branching 过度使用无条件分支
Executable Regular Expression Error 可执行正则表达式错误
Expression is Always False 表达式始终为假
Expression is Always True 表达式始终为真
Inaccurate Comments 不准确的注释
Inappropriate Comment Style 不适当的注释风格
Inappropriate Source Code Style or Formatting 不适当的源代码风格或格式
Inappropriate Whitespace Style 不适当的空白字符风格
Infinite Loop 无限循环
Information Loss or Omission 信息丢失或遗漏
Insecure Automated Optimizations 不安全的自动优化
Invokable Control Element with Excessive File or Data Access Operations 具有过多文件或数据访问操作的可调用控制元素
Invokable Control Element with Excessive Volume of Commented-out Code 含有大量注释代码的可调用控制元素
Irrelevant Code 无关代码
Missing Default Case in Switch Statement switch语句缺少默认情况
Missing Initialization of a Variable 变量初始化缺失
Missing Serialization Control Element 缺少序列化控制元素
Modules with Circular Dependencies 具有循环依赖的模块
Multiple Locks of a Critical Resource 对关键资源多次加锁
Multiple Operations on Resource in Single-Operation Context 在单操作上下文中对资源进行多次操作
Multiple Releases of Same Resource or Handle 多次释放同一资源或句柄
Multiple Unlocks of a Critical Resource 对关键资源多次解锁
Non-exit on Failed Initialization 初始化失败后未退出
Object Model Violation: Just One of Equals and Hashcode Defined 对象模型违反:仅定义了equals或hashcode之一
Omitted Break Statement in Switch switch中遗漏break语句
Operator Precedence Logic Error 运算符优先级逻辑错误
Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor 父类有虚析构函数而子类没有
Parent Class without Virtual Destructor Method 父类没有虚析构函数方法
Parent Class with References to Child Class 父类包含对子类的引用
Return Inside Finally Block 在finally块中返回
Singleton Class Instance Creation without Proper Locking or Synchronization 未使用正确锁或同步的单例类实例创建
Source Code Element without Standard Prologue 源代码元素缺少标准序言
Source Code File with Excessive Number of Lines of Code 源代码文件行数过多
Suspicious Comment 可疑注释
Uncaught Exception 未捕获的异常
Unchecked Error Condition 未检查的错误条件
Unchecked Input for Loop Condition 未检查的循环条件输入
Unchecked Return Value 未检查的返回值
Unconditional Control Flow Transfer outside of Switch Block switch块外的无条件控制流转移
Unexpected Sign Extension 意外的符号扩展
Unexpected Status Code or Return Value 意外的状态码或返回值
Uninitialized Variable 未初始化的变量
Unlock of a Resource that is not Locked 解锁未锁定的资源
Unsynchronized Access to Shared Data in a Multithreaded Context 多线程上下文中对共享数据的非同步访问
Use of Blocking Code in Single-threaded, Non-blocking Context 在单线程非阻塞上下文中使用阻塞代码
Use of Incorrect Operator 使用错误的运算符
Use of Invariant Value in Dynamically Changing Context 在动态变化上下文中使用不变值
Use of Same Variable for Multiple Purposes 同一变量用于多种目的
Use of Singleton Pattern Without Synchronization in a Multithreaded Context 多线程上下文中使用未同步的单例模式
Use of Uninitialized Resource 使用未初始化的资源
Use of Wrong Operator in String Comparison 字符串比较中使用错误运算符
Variable Extraction Error 变量提取错误

5. 配置与部署安全

英文名称 中文翻译
错误配置
ASP.NET Misconfiguration: Creating Debug Binary ASP.NET错误配置:创建调试二进制文件
ASP.NET Misconfiguration: Improper Model Validation ASP.NET错误配置:模型验证不当
ASP.NET Misconfiguration: Missing Custom Error Page ASP.NET错误配置:缺少自定义错误页面
ASP.NET Misconfiguration: Not Using Input Validation Framework ASP.NET错误配置:未使用输入验证框架
ASP.NET Misconfiguration: Password in Configuration File ASP.NET错误配置:配置文件中存在密码
ASP.NET Misconfiguration: Use of Identity Impersonation ASP.NET错误配置:使用身份模拟
Compilation with Insufficient Warnings or Errors 编译时警告或错误不足
Default Password 默认密码
Insecure Default Initialization of Resource 不安全的资源默认初始化
Insecure Default Variable Initialization 不安全的变量默认初始化
Insecure Inherited Permissions 不安全的继承权限
J2EE Misconfiguration: Data Transmission Without Encryption J2EE错误配置:未加密数据传输
J2EE Misconfiguration: Entity Bean Declared Remote J2EE错误配置:实体Bean声明为远程
J2EE Misconfiguration: Insufficient Session-ID Length J2EE错误配置:会话ID长度不足
J2EE Misconfiguration: Missing Custom Error Page J2EE错误配置:缺少自定义错误页面
J2EE Misconfiguration: Plaintext Password in Configuration File J2EE错误配置:配置文件中存在明文密码
J2EE Misconfiguration: Weak Access Permissions for EJB Methods J2EE错误配置:EJB方法的访问权限弱
Missing Custom Error Page 缺少自定义错误页面
.NET Misconfiguration: Use of Impersonation .NET错误配置:使用模拟
Password in Configuration File 配置文件中的密码
Plaintext Storage of a Password 密码的明文存储
Product Released in Non-Release Configuration 产品以非发布配置发布
不安全功能
Debug Messages Revealing Unnecessary Information 调试消息泄露不必要的信息
Exposed Dangerous Method or Function 暴露危险的方法或函数
Exposed Unsafe ActiveX Method 暴露不安全的ActiveX方法
Hidden Functionality 隐藏功能
Inclusion of Undocumented Features or Chicken Bits 包含未记录的功能或鸡位
Leftover Debug Code (Backdoor) 遗留调试代码(后门)
Obsolete Feature in UI UI中的过时功能
Unimplemented or Unsupported Feature in UI UI中未实现或不支持的功能
Use of Prohibited Code 使用禁止的代码
Using Unpublished Interfaces 使用未发布的接口
日志与监控
Audit Log Manipulation 审计日志篡改
Block Logging to Central Repository 阻止日志记录到中央仓库
Insufficient Logging 日志记录不足
Log Injection-Tampering-Forging 日志注入-篡改-伪造
Logging of Excessive Data 记录过多数据
Web Logs Tampering Web日志篡改

6. 业务逻辑与设计缺陷

英文名称 中文翻译
业务流程与逻辑
Business Logic Errors 业务逻辑错误
Expected Behavior Violation 预期行为违反
Functionality Bypass 功能绕过
Improper Enforcement of a Single, Unique Action 单一、唯一动作执行不当
Improper Enforcement of Behavioral Workflow 行为工作流执行不当
Improper Restriction of Authentication Attempts 认证尝试限制不当
Incorrect Behavior Order 错误的行为顺序
Incorrect Behavior Order: Authorization Before Parsing and Canonicalization 错误的行为顺序:在解析和规范化之前进行授权
Incorrect Behavior Order: Early Amplification 错误的行为顺序:过早放大
Incorrect Behavior Order: Early Validation 错误的行为顺序:过早验证
Incorrect Behavior Order: Validate Before Canonicalize 错误的行为顺序:在规范化之前验证
Incorrect Behavior Order: Validate Before Filter 错误的行为顺序:在过滤之前验证
Incorrect Provision of Specified Functionality 指定功能提供不正确
Insufficient Adherence to Expected Conventions 未充分遵循预期惯例
Insufficient Control Flow Management 控制流管理不足
Insufficient UI Warning of Dangerous Operations 危险操作的UI警告不足
Not Using Complete Mediation 未使用完整中介
Product UI does not Warn User of Unsafe Actions 产品UI未向用户警告不安全操作
UI Discrepancy for Security Feature 安全功能的UI差异
UI Redressing (Clickjacking) UI重绘(点击劫持)
设计缺陷
Architecture with Number of Horizontal Layers Outside of Expected Range 水平层数超出预期范围的架构
Behavioral Change in New Version or Environment 新版本或环境中的行为变化
Creation of Emergent Resource 创建应急资源
Excessive Attack Surface 攻击面过大
Excessively Complex Data Representation 过于复杂的数据表示
Excessive Reliance on Global Variables 过度依赖全局变量
Improper Adherence to Coding Standards 未正确遵守编码标准
Improper Interaction Between Multiple Correctly-Behaving Entities 多个行为正确实体之间的交互不当
Improper Isolation or Compartmentalization 隔离或分区不当
Improper Physical Access Control 物理访问控制不当
Incomplete Model of Endpoint Features 端点功能模型不完整
Inconsistency Between Implementation and Documented Design 实现与文档设计不一致
Incorrect Chaining or Granularity of Debug Components 调试组件的链或粒度不正确
Insufficient Encapsulation 封装不足
Insufficient Psychological Acceptability 心理可接受性不足
Insufficient Technical Documentation 技术文档不足
Insufficient Type Distinction 类型区分不足
Missing Documentation for Design 设计文档缺失
Not Using Complete Mediation 未使用完整中介
Reliance on Component That is Not Updateable 依赖不可更新的组件
Security Through Obscurity 通过模糊实现安全
Unnecessary Complexity in Protection Mechanism 保护机制不必要地复杂
Violation of Secure Design Principles 违反安全设计原则

7. 硬件、固件与供应链

英文名称 中文翻译
硬件攻击与缺陷
ASIC With Malicious Functionality 具有恶意功能的ASIC
Bypassing ATA Password Security 绕过ATA密码安全
Bypassing Electronic Locks and Access Controls 绕过电子锁和访问控制
Bypassing Physical Locks 绕过物理锁
Bypassing Physical Security 绕过物理安全
DMA Device Enabled Too Early in Boot Phase DMA设备在启动阶段过早启用
Electromagnetic Side-Channel Attack 电磁侧信道攻击
Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities 利用具有不可修补漏洞的固件或ROM代码
Exploitation of Improperly Configured or Implemented Memory Protections 利用配置或实现不当的内存保护
Exploitation of Improperly Controlled Hardware Security Identifiers 利用控制不当的硬件安全标识符
Exploitation of Improperly Controlled Registers 利用控制不当的寄存器
Exploitation of Thunderbolt Protection Flaws 利用Thunderbolt保护缺陷
Exploitation of Transient Instruction Execution 利用瞬态指令执行
Exploitation of Trusted Identifiers 利用可信标识符
Exploiting Incorrect Chaining or Granularity of Hardware Debug Components 利用硬件调试组件的错误链或粒度
Exploiting Incorrectly Configured Access Control Security Levels 利用配置错误的访问控制安全级别
Hardware Allows Activation of Test or Debug Logic at Runtime 硬件允许在运行时激活测试或调试逻辑
Hardware Child Block Incorrectly Connected to Parent System 硬件子块与父系统连接不正确
Hardware Design Specifications Are Altered 硬件设计规范被篡改
Hardware Fault Injection 硬件故障注入
Hardware Integrity Attack 硬件完整性攻击
Hardware Internal or Debug Modes Allow Override of Locks 硬件内部或调试模式允许覆盖锁
Hardware Logic Contains Race Conditions 硬件逻辑包含竞态条件
Hardware Logic with Insecure De-Synchronization between Control and Data Channels 硬件逻辑在控制和数据通道之间存在不安全的去同步
Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code IOCTL中使用METHOD_NEITHER I/O控制代码时地址验证不当
Improper Handling of Single Event Upsets 单粒子翻转处理不当
Improper Lock Behavior After Power State Transition 电源状态转换后锁行为不当
Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation 在省电/恢复操作期间硬件配置状态的完整性保留不当
Improper Prevention of Lock Bit Modification 锁定位修改防护不当
Improper Protection Against Voltage and Clock Glitches 对电压和时钟毛刺的防护不当
Improper Protection for Out of Bounds Signal Level Alerts 越界信号级别警报的防护不当
Improper Protections Against Hardware Overheating 对硬件过热的防护不当
Improper Restriction of Write-Once Bit Fields 一次性写入位字段的限制不当
Improper Setting of Bus Controlling Capability in Fabric End-point 结构端点中总线控制能力设置不当
Improper Translation of Security Attributes by Fabric Bridge 结构桥对安全属性转换不当
Improper Write Handling in Limited-write Non-Volatile Memories 有限写入非易失性存储器中的写入处理不当
Improper Zeroization of Hardware Register 硬件寄存器清零不当
Incorrect Register Defaults or Module Parameters 寄存器默认值或模块参数不正确
Insecure Security Identifier Mechanism 不安全的的安全标识符机制
Insufficient Granularity of Address Regions Protected by Register Locks 受寄存器锁保护的地址区域粒度不足
Insufficient or Incomplete Data Removal within Hardware Component 硬件组件内数据移除不充分或不完整
Lack of Administrator Control over Security 缺乏管理员对安全性的控制
Load Value Injection 加载值注入
Missing Ability to Patch ROM Code 缺少修补ROM代码的能力
Missing Immutable Root of Trust in Hardware 硬件中缺少不可变的信任根
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques 缺乏对使用集成电路成像技术的硬件逆向工程的防护
Missing Protection for Mirrored Regions in On-Chip Fabric Firewall 片上结构防火墙中镜像区域保护缺失
Missing Security Checks in Fabric Bridge 结构桥中缺少安全检查
Missing Security Identifier 缺少安全标识符
Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface 硬件接口中未执行操作缺少安全相关反馈
Missing Support for Security Features in On-chip Fabrics or Buses 片上结构或总线中缺少对安全特性的支持
Missing Write Protection for Parametric Data Values 参数数据值缺少写保护
Physical Destruction of Device or Component 设备或组件的物理破坏
Physically Hacking Hardware 物理入侵硬件
Policy Privileges are not Assigned Consistently Between Control and Data Agents 控制代理和数据代理之间的策略权限分配不一致
Power-On of Untrusted Execution Core Before Enabling Fabric Access Control 在启用结构访问控制之前启动不受信任的执行核心
Security-Sensitive Hardware Controls with Missing Lock Bit Protection 缺少锁定位保护的安全敏感硬件控制
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications 具有安全敏感影响的硬件逻辑中的半导体缺陷
Sensitive Information Accessible by Physical Probing of JTAG Interface 通过JTAG接口的物理探测可访问敏感信息
Sensitive Non-Volatile Information Not Protected During Debug 调试期间敏感非易失性信息未受保护
Sequence of Processor Instructions Leads to Unexpected Behavior 处理器指令序列导致意外行为
System-on-Chip (SoC) Using Components without Unique, Immutable Identifiers 使用无唯一、不可变标识符组件的片上系统
Uninitialized Value on Reset for Registers Holding Security Settings 保存安全设置的寄存器复位时值未初始化
供应链与固件安全
Altered Component Firmware 篡改的组件固件
Altered Installed BIOS 篡改的已安装BIOS
Counterfeit Hardware Component Inserted During Product Assembly 产品组装过程中插入的假冒硬件组件
Counterfeit Organizations 假冒组织
Design Alteration 设计篡改
Design for FPGA Maliciously Altered FPGA设计被恶意篡改
Developer Signing Maliciously Altered Software 开发者签署恶意篡改的软件
Development Alteration 开发篡改
Documentation Alteration to Cause Errors in System Design 文档篡改导致系统设计错误
Documentation Alteration to Circumvent Dial-down 文档篡改以绕过降级
Documentation Alteration to Produce Under-performing Systems 文档篡改以产生性能不足的系统
Embedded Malicious Code 嵌入恶意代码
Exploitation of Improperly Configured or Implemented Memory Protections 利用配置或实现不当的内存保护
Firmware Not Updateable 固件不可更新
Hardware Component Substitution 硬件组件替换
Hardware Component Substitution During Baselining 基线化期间硬件组件替换
Infected Hardware 受感染的硬件
Infected Memory 受感染的内存
Infected Software 受感染的软件
Infiltration of Hardware Development Environment 渗透硬件开发环境
Infiltration of Software Development Environment 渗透软件开发环境
Malicious Code Implanted During Chip Programming 芯片编程期间植入的恶意代码
Malicious Gray Market Hardware 恶意灰市硬件
Malicious Hardware Component Replacement 恶意硬件组件替换
Malicious Hardware Update 恶意硬件更新
Malicious Logic Inserted Into Product Software by Authorized Developer 授权开发人员插入产品软件的恶意逻辑
Malicious Logic Insertion 恶意逻辑插入
Malicious Logic Insertion into Product Software via Configuration Management Manipulation 通过配置管理操纵向产品软件插入恶意逻辑
Malicious Logic Insertion into Product Software via Inclusion of 3rd Party Component Dependency 通过包含第三方组件依赖项向产品软件插入恶意逻辑
Malicious Root Certificate 恶意根证书
Malicious Software Download 恶意软件下载
Malicious Software Implanted 植入的恶意软件
Malware 恶意软件
Modification During Manufacture 制造期间的修改
Open-Source Library Manipulation 开源库操纵
Provide Counterfeit Component 提供假冒组件
Public Key Re-Use for Signing both Debug and Production Code 公钥重复用于签署调试和生产代码
Repo Jacking 仓库劫持
Requirements for ASIC Functionality Maliciously Altered ASIC功能需求被恶意篡改
Rogue Integration Procedures 恶意集成程序
Rooting SIM Cards SIM卡Root
Software Development Tools Maliciously Altered 软件开发工具被恶意篡改
Software Integrity Attack 软件完整性攻击
Spoof Open-Source Software Metadata 欺骗开源软件元数据
Spoof Version Control System Commit Metadata 欺骗版本控制系统提交元数据
Subvert Code-signing Facilities 破坏代码签名设施
System Build Data Maliciously Altered 系统构建数据被恶意篡改
Use of Unmaintained Third Party Components 使用无人维护的第三方组件
Using Components with Known Vulnerabilities 使用含有已知漏洞的组件

8. 社会工程学与人为因素

英文名称 中文翻译
社会工程学攻击
Dumpster Diving 垃圾搜寻
Influence Perception 影响感知
Influence Perception of Authority 影响权威感知
Influence Perception of Commitment and Consistency 影响承诺与一致性感知
Influence Perception of Consensus or Social Proof 影响共识或社会认同感知
Influence Perception of Liking 影响喜好感知
Influence Perception of Reciprocation 影响互惠感知
Influence Perception of Scarcity 影响稀缺性感知
Influence via Incentives 通过激励影响
Influence via Modes of Thinking 通过思维模式影响
Influence via Psychological Principles 通过心理原则影响
Manipulate Human Behavior 操纵人类行为
Pharming 网页欺诈
Phishing 网络钓鱼
Pretexting 借口
Pretexting via Customer Service 通过客服借口
Pretexting via Delivery Person 通过送货员借口
Pretexting via Phone 通过电话借口
Pretexting via Tech Support 通过技术支持借口
Scams 诈骗
Shoulder Surfing 肩窥
Smudge Attack 污迹攻击
Spear Phishing 鱼叉式网络钓鱼
Target Influence via Eye Cues 通过眼神暗示影响目标
Target Influence via Framing 通过框架效应影响目标
Target Influence via The Human Buffer Overflow 通过“人类缓冲区溢出”影响目标
Voice Phishing 语音网络钓鱼
设备物理攻击
Cloning Magnetic Strip Cards 克隆磁条卡
Cloning RFID Cards or Chips 克隆RFID卡或芯片
Device Unlock Credential Sharing 设备解锁凭据共享
Lock Bumping 撞锁
Lock Picking 撬锁
Mobile Phishing 移动端网络钓鱼
Physical Theft 物理盗窃
RFID Chip Deactivation or Destruction RFID芯片停用或销毁
Root/Jailbreak Detection Evasion via Debugging 通过调试绕过Root/越狱检测
Root/Jailbreak Detection Evasion via Hooking 通过Hook绕过Root/越狱检测
Tapjacking 屏幕劫持
Using a Snap Gun Lock to Force a Lock 使用撞枪强行开锁

9. 网络协议与通信安全

英文名称 中文翻译
网络嗅探与拦截
Adversary in the Browser (AiTB) 浏览器中的对手
Adversary in the Middle (AiTM) 中间人攻击
Browser in the Middle (BiTM) 浏览器中间人攻击
Eavesdropping 窃听
Eavesdropping on a Monitor 窃听显示器
Interception 拦截
Man-in-the-Middle 中间人攻击
Sniffing Attacks 嗅探攻击
Sniffing Network Traffic 嗅探网络流量
网络协议攻击
BGP Route Disabling BGP路由禁用
Bluetooth Impersonation AttackS (BIAS) 蓝牙冒充攻击
Cellular Broadcast Message Request 蜂窝广播消息请求
Cellular Data Injection 蜂窝数据注入
Cellular Jamming 蜂窝网络干扰
Cellular Rogue Base Station 蜂窝恶意基站
Cellular Traffic Intercept 蜂窝流量拦截
Counterfeit GPS Signals 假冒GPS信号
DHCP Spoofing DHCP欺骗
DNS Blocking DNS阻断
DNS Cache Poisoning DNS缓存投毒
DNS Domain Seizure DNS域名劫持
DNS Rebinding DNS重绑定
DNS Spoofing DNS欺骗
DNS Zone Transfers DNS区域传输
HTTP Request Smuggling HTTP请求走私
HTTP Request Splitting HTTP请求拆分
HTTP Response Smuggling HTTP响应走私
HTTP Response Splitting HTTP响应拆分
HTTP Verb Tampering HTTP动词篡改
Key Negotiation of Bluetooth Attack (KNOB) 蓝牙密钥协商攻击
Route Disabling 路由禁用
SSL Flood SSL洪水攻击
TCP RST Injection TCP重置包注入
Traffic Injection 流量注入
Transparent Proxy Abuse 透明代理滥用
拒绝服务
Amplification 放大
Asymmetric Resource Consumption (Amplification) 不对称资源消耗(放大)
Excessive Platform Resource Consumption within a Loop 循环内平台资源消耗过大
Excessive Resource Consumption 过度资源消耗
Flooding 洪水攻击
HTTP DoS HTTP拒绝服务
HTTP Flood HTTP洪水攻击
Jamming 干扰
Large Data Table with Excessive Number of Indices 具有过多索引的大型数据表
Network Amplification 网络放大
Orbital Jamming 轨道干扰
Regular Expression Exponential Blowup 正则表达式指数级爆炸
SSL Flood SSL洪水攻击
TCP Flood TCP洪水攻击
Terrestrial Jamming 地面干扰
UDP Flood UDP洪水攻击
Uncontrolled Resource Consumption 不受控制的资源消耗
Wi-Fi Jamming Wi-Fi干扰
XML Entity Expansion XML实体扩展
XML Flood XML洪水攻击
XML Ping of the Death XML死亡Ping
侦察与指纹识别
Active OS Fingerprinting 主动操作系统指纹识别
AJAX Footprinting AJAX足迹
Application Fingerprinting 应用程序指纹识别
Black Box Reverse Engineering 黑盒逆向工程
Browser Fingerprinting 浏览器指纹识别
Detect Unpublicized Web Pages 检测未公开的网页
Detect Unpublicized Web Services 检测未公开的Web服务
DNS Zone Transfers DNS区域传输
File Discovery 文件发现
Fingerprinting 指纹识别
Footprinting 足迹
Fuzzing 模糊测试
Fuzzing for application mapping 用于应用映射的模糊测试
Fuzzing for garnering other adjacent user/sensitive data 用于获取其他相邻用户/敏感数据的模糊测试
Group Permission Footprinting 组权限足迹
Host Discovery 主机发现
Identify Shared Files/Directories on System 识别系统上的共享文件/目录
Network Topology Mapping 网络拓扑映射
Owner Footprinting 所有者足迹
Passive OS Fingerprinting 被动操作系统指纹识别
Peripheral Footprinting 外设足迹
Port Scanning 端口扫描
Process Footprinting 进程足迹
Probe Audio and Video Peripherals 探测音频和视频外设
Probe iOS Screenshots 探测iOS截图
Probe System Files 探测系统文件
Query System for Information 查询系统信息
Reverse Engineer an Executable to Expose Assumed Hidden Functionality 逆向工程可执行文件以暴露假定的隐藏功能
Reverse Engineering 逆向工程
Scanning for Vulnerable Software 扫描易受攻击的软件
Security Software Footprinting 安全软件足迹
Services Footprinting 服务足迹
System Footprinting 系统足迹
System Location Discovery 系统位置发现
TCP ACK Ping TCP ACK Ping
TCP ACK Scan TCP ACK扫描
TCP Connect Scan TCP连接扫描
TCP FIN Scan TCP FIN扫描
TCP Null Scan TCP空扫描
TCP RPC Scan TCP RPC扫描
TCP SYN Ping TCP SYN Ping
TCP SYN Scan TCP SYN扫描
TCP Window Scan TCP窗口扫描
TCP Xmas Scan TCP XMAS扫描
Traceroute Route Enumeration 路由追踪枚举
UDP Ping UDP Ping
UDP Scan UDP扫描
Web Application Fingerprinting Web应用程序指纹识别
WSDL Scanning WSDL扫描
其他网络攻击
BGP Route Disabling BGP路由禁用
Carry-Off GPS Attack GPS劫持攻击
Counterfeit GPS Signals 假冒GPS信号
DNS Domain Seizure DNS域名劫持
Domain Seizure 域名劫持
Route Disabling 路由禁用
TCP RST Injection TCP重置包注入

10. AI/LLM安全

英文名称 中文翻译
LLM漏洞与风险 (OWASP Top 10 for LLMs)
LLM01:2025 Prompt Injection LLM01:2025 提示词注入
LLM02:2025 Sensitive Information Disclosure LLM02:2025 敏感信息披露
LLM03:2025 Supply Chain LLM03:2025 供应链
LLM04:2025 Data and Model Poisoning LLM04:2025 数据和模型投毒
LLM05:2025 Improper Output Handling LLM05:2025 输出处理不当
LLM06:2025 Excessive Agency LLM06:2025 过度代理
LLM07:2025 System Prompt Leakage LLM07:2025 系统提示词泄露
LLM08:2025 Vector and Embedding Weaknesses LLM08:2025 向量与嵌入弱点
LLM09:2025 Misinformation LLM09:2025 错误信息
LLM10:2025 Unbounded Consumption LLM10:2025 无限制消耗
AI系统安全
ASI01: Agent Goal Hijack ASI01: 代理目标劫持
ASI02: Tool Misuse and Exploitation ASI02: 工具滥用与利用
ASI03: Identity and Privilege Abuse ASI03: 身份与权限滥用
ASI04: Agentic Supply Chain Vulnerabilities ASI04: 代理供应链漏洞
ASI05: Unexpected Code Execution (RCE) ASI05: 意外代码执行
ASI06: Memory & Context Poisoning ASI06: 内存与上下文投毒
ASI07: Insecure Inter-Agent Communication ASI07: 不安全的代理间通信
ASI08: Cascading Failures ASI08: 级联故障
ASI09: Human-Agent Trust Exploitation ASI09: 人-代理信任利用
ASI10: Rogue Agents ASI10: 恶意代理
AI相关攻击
Adversarial Input Perturbations 对抗性输入扰动
Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations 自动识别机制对对抗性输入扰动的检测或处理不足
Insecure Setting of Generative AI/ML Model Inference Parameters 生成式AI/ML模型推理参数设置不安全
Improper Validation of Generative AI Output 生成式AI输出验证不当
AI相关漏洞
LLM01: Prompt Injection LLM01: 提示词注入
LLM02: Insecure Output Handling LLM02: 不安全的输出处理
LLM03: Training Data Poisoning LLM03: 训练数据投毒
LLM04: Model Denial of Service LLM04: 模型拒绝服务
LLM05: Supply Chain Vulnerabilities LLM05: 供应链漏洞
LLM06: Sensitive Information Disclosure LLM06: 敏感信息披露
LLM07: Insecure Plugin Design LLM07: 不安全的插件设计
LLM08: Excessive Agency LLM08: 过度代理
LLM09: Overreliance LLM09: 过度依赖
LLM10: Model Theft LLM10: 模型窃取

11. 其他攻击与侦察技术

英文名称 中文翻译
恶意软件与持久化
Adware 广告软件
Backdoor 后门
Botnet 僵尸网络
Crimeware 犯罪软件
Dropper 释放器
Exploit Kit 漏洞利用工具包
Keylogger 键盘记录器
Malware 恶意软件
Ransomware 勒索软件
Rootkit 根工具包
Spyware 间谍软件
Trojan Horse 特洛伊木马
Virus 病毒
Worm 蠕虫
持久化机制
Create New Service 创建新服务
Install Malicious Extension 安装恶意扩展
Install New Service 安装新服务
Install Rootkit 安装Rootkit
Modify Existing Service 修改现有服务
Modify Registry Run Keys 修改注册表运行键
Modification of Windows Service Configuration 修改Windows服务配置
Replace Binaries 替换二进制文件
Replace File Extension Handlers 替换文件扩展名处理程序
Replace Trusted Executable 替换受信任的可执行文件
Replace Winlogon Helper DLL 替换Winlogon Helper DLL
Run Software at Logon 登录时运行软件
侦察与枚举
Enumerate Mail Exchange (MX) Records 枚举邮件交换记录
Fuzzing 模糊测试
Harvesting Information via API Event Monitoring 通过API事件监控收集信息
IP Address Blocking IP地址阻断
Malware-Directed Internal Reconnaissance 恶意软件引导的内部侦察
Query System for Information 查询系统信息
Screen Temporary Files for Sensitive Information 扫描临时文件中的敏感信息
其他
BitSquatting 位蹲守
Evercookie 超级Cookie
Homograph Attack via Homoglyphs 通过同形异义词的同形异义攻击
Scheme Squatting 方案蹲守
SoundSquatting 声音蹲守
StarJacking 星号劫持
Subdomain Takeover 子域名接管
TypoSquatting 域名仿冒
URL Encoding URL编码
WiFi MAC Address Tracking WiFi MAC地址追踪
WiFi SSID Tracking WiFi SSID追踪