漏洞类型整理
前言
取自https://hackerone.com/介绍的漏洞类型的整理
分为以下主要类别:
- 输入验证与注入:包括各类注入、跨站脚本、路径遍历等。
- 身份与访问控制:包括认证、授权、会话管理、权限提升等。
- 加密与敏感数据保护:包括弱加密、明文存储、信息泄露等。
- 代码质量与资源管理:包括内存错误、竞态条件、资源泄漏、空指针等。
- 配置与部署安全:包括错误配置、不安全默认值、调试信息泄露等。
- 业务逻辑与设计缺陷:包括业务流程绕过、功能滥用、设计漏洞等。
- 硬件、固件与供应链:包括硬件攻击、固件篡改、供应链投毒等。
- 社会工程学与人为因素:包括钓鱼、欺诈、诱导等。
- 网络协议与通信安全:包括网络嗅探、中间人攻击、DNS劫持等。
- AI/LLM安全:专门针对大语言模型和AI系统的攻击。
- 其他攻击与侦察技术:包括指纹识别、暴力破解、侦察等。
表格整理详细
1. 输入验证与注入
| 英文名称 | 中文翻译 |
|---|---|
| 注入类 | |
| Argument Injection | 参数注入 |
| Blind SQL Injection | 盲SQL注入 |
| Code Injection | 代码注入 |
| Command Delimiters | 命令分隔符 |
| Command Injection | 命令注入 |
| Command Injection - Generic | 命令注入 - 通用 |
| Command Line Execution through SQL Injection | 通过SQL注入执行命令行 |
| CRLF Injection | CRLF注入 |
| Cross-site Scripting (XSS) - Generic | 跨站脚本 - 通用 |
| Cross-site Scripting (XSS) - Reflected | 跨站脚本 - 反射型 |
| Cross-site Scripting (XSS) - Stored | 跨站脚本 - 存储型 |
| DOM-Based XSS | 基于DOM的跨站脚本 |
| DTD Injection | DTD注入 |
| Email Injection | 邮件注入 |
| Expression Language Injection | 表达式语言注入 |
| Format String Injection | 格式字符串注入 |
| IMAP/SMTP Command Injection | IMAP/SMTP命令注入 |
| Improper Neutralization of Input Used for LLM Prompting | LLM提示词输入中和不当 |
| LDAP Injection | LDAP注入 |
| NoSQL Injection | NoSQL注入 |
| OS Command Injection | 操作系统命令注入 |
| Parameter Injection | 参数注入 |
| PHP Local File Inclusion | PHP本地文件包含 |
| PHP Remote File Inclusion | PHP远程文件包含 |
| Prompt Injection | 提示词注入 |
| Relative Path Traversal | 相对路径遍历 |
| Remote Code Inclusion | 远程代码包含 |
| Remote File Inclusion | 远程文件包含 |
| Server Side Include (SSI) Injection | 服务端包含注入 |
| Server Side Request Forgery | 服务端请求伪造 |
| SQL Injection | SQL注入 |
| SQL Injection: Hibernate | SQL注入:Hibernate框架 |
| XPath Injection | XPath注入 |
| XQuery Injection | XQuery注入 |
| XML Injection | XML注入 |
| 跨站脚本(XSS)变种 | |
| Cross Frame Scripting (XFS) | 跨框架脚本 |
| Cross Site Tracing | 跨站追踪 |
| Cross Zone Scripting | 跨区域脚本 |
| Doubled Character XSS Manipulations | 双字符XSS操纵 |
| Improper Neutralization of Script in Attributes in a Web Page | 网页属性中脚本中和不当 |
| Improper Neutralization of Script in an Error Message Web Page | 错误信息网页中脚本中和不当 |
| XSS Targeting Error Pages | 针对错误页面的XSS |
| XSS Targeting HTML Attributes | 针对HTML属性的XSS |
| XSS Targeting Non-Script Elements | 针对非脚本元素的XSS |
| XSS Targeting URI Placeholders | 针对URI占位符的XSS |
| XSS Through HTTP Headers | 通过HTTP头部的XSS |
| XSS Through HTTP Query Strings | 通过HTTP查询字符串的XSS |
| XSS Using Alternate Syntax | 使用替代语法的XSS |
| XSS Using Doubled Characters | 使用双字符的XSS |
| XSS Using Invalid Characters | 使用无效字符的XSS |
| XSS Using MIME Type Mismatch | 利用MIME类型不匹配的XSS |
| 路径遍历 | |
| Absolute Path Traversal | 绝对路径遍历 |
| Path Traversal | 路径遍历 |
| Path Traversal: ‘…/…//‘ | 路径遍历:’…/…//‘ |
| Path Traversal: ‘….//‘ | 路径遍历:’….//‘ |
| Path Traversal: ‘/absolute/pathname/here’ | 路径遍历:’/absolute/pathname/here’ |
| Path Traversal: ‘C:dirname’ | 路径遍历:’C:dirname’ |
| Path Traversal: ‘/dir/../filename’ | 路径遍历:’/dir/../filename’ |
| Path Traversal: ‘dir/../../filename’ | 路径遍历:’dir/../../filename’ |
| Path Traversal: ‘/../filedir’ | 路径遍历:’/../filedir’ |
| Path Traversal: ‘../filedir’ | 路径遍历:’../filedir’ |
| 文件包含与操作 | |
| Add Malicious File to Shared Webroot | 向共享Web根目录添加恶意文件 |
| Alternative Execution Due to Deceptive Filenames | 由欺骗性文件名导致的替代执行 |
| Create files with the same name as files protected with a higher classification | 创建与更高级别保护文件同名的文件 |
| File Content Injection | 文件内容注入 |
| Local Code Inclusion | 本地代码包含 |
| Upload a Web Shell to a Web Server | 向Web服务器上传Webshell |
| User-Controlled Filename | 用户控制的文件名 |
| 其他输入验证 | |
| Adding a Space to a File Extension | 向文件扩展名添加空格 |
| Alternative IP Address Encodings | 使用替代IP地址编码 |
| Bypassing of Intermediate Forms in Multiple-Form Sets | 绕过多表单集中的中间表单 |
| Double Decoding of the Same Data | 对相同数据进行双重解码 |
| Double Encoding | 双重编码 |
| Embedding NULL Bytes | 嵌入空字节 |
| Escaped Slashes in Alternate Encoding | 替代编码中的转义斜杠 |
| Failure to Sanitize Paired Delimiters | 未能清理成对分隔符 |
| Failure to Sanitize Special Elements into a Different Plane | 未能将特殊元素清理到不同平面 |
| Filter Failure through Buffer Overflow | 通过缓冲区溢出导致过滤失败 |
| HTTP Parameter Pollution (HPP) | HTTP参数污染 |
| Improper Filtering of Special Elements | 特殊元素过滤不当 |
| Improper Handling of URL Encoding (Hex Encoding) | URL编码处理不当 |
| Improper Neutralization of Null Byte or NUL Character | 空字节中和不当 |
| Improper Neutralization of Whitespace | 空白字符中和不当 |
| Leading ‘Ghost’ Character Sequences to Bypass Input Filters | 使用前导“幽灵”字符序列绕过输入过滤器 |
| Only Filtering One Instance of a Special Element | 仅过滤特殊元素的一个实例 |
| Only Filtering Special Elements at an Absolute Position | 仅在绝对位置过滤特殊元素 |
| Only Filtering Special Elements at a Specified Location | 仅在指定位置过滤特殊元素 |
| Only Filtering Special Elements Relative to a Marker | 仅相对于标记过滤特殊元素 |
| Using Slashes and URL Encoding Combined to Bypass Validation Logic | 结合使用斜杠和URL编码绕过验证逻辑 |
| Using Slashes in Alternate Encoding | 在替代编码中使用斜杠 |
| Using Unicode Encoding to Bypass Validation Logic | 使用Unicode编码绕过验证逻辑 |
| Using UTF-8 Encoding to Bypass Validation Logic | 使用UTF-8编码绕过验证逻辑 |
| XML External Entities (XXE) | XML外部实体 |
2. 身份与访问控制
| 英文名称 | 中文翻译 |
|---|---|
| 认证绕过 | |
| Authentication Abuse | 认证滥用 |
| Authentication Bypass | 认证绕过 |
| Authentication Bypass by Alternate Name | 通过替代名称绕过认证 |
| Authentication Bypass by Assumed-Immutable Data | 通过假定的不可变数据绕过认证 |
| Authentication Bypass by Capture-replay | 通过捕获重放绕过认证 |
| Authentication Bypass by Primary Weakness | 通过主要弱点绕过认证 |
| Authentication Bypass by Spoofing | 通过欺骗绕过认证 |
| Authentication Bypass Using an Alternate Path or Channel | 使用替代路径或通道绕过认证 |
| Credential Prompt Impersonation | 凭据提示冒充 |
| Missing Authentication for Critical Function | 关键功能缺少认证 |
| Missing Critical Step in Authentication | 认证中缺少关键步骤 |
| Reflection Attack in Authentication Protocol | 认证协议中的反射攻击 |
| Reliance on IP Address for Authentication | 依赖IP地址进行认证 |
| Trusting HTTP Permission Methods on the Server Side | 服务端信任HTTP权限方法 |
| Using Referer Field for Authentication | 使用Referer字段进行认证 |
| 授权与权限 | |
| Access Control Check Implemented After Asset is Accessed | 在资产被访问后实施访问控制检查 |
| Accessing Functionality Not Properly Constrained by ACLs | 访问未受ACL适当约束的功能 |
| Authorization Bypass Through User-Controlled SQL Primary Key | 通过用户控制的SQL主键绕过授权 |
| Authorization Bypass | 授权绕过 |
| Incorrect Authorization | 不正确的授权 |
| Improper Authorization | 授权不当 |
| Improper Authorization in Handler for Custom URL Scheme | 自定义URL方案处理程序中的授权不当 |
| Improper Authorization of Index Containing Sensitive Information | 包含敏感信息的索引授权不当 |
| Improper Privilege Management | 权限管理不当 |
| Improper Restriction of Security Token Assignment | 安全令牌分配限制不当 |
| Incorrect Permission Assignment for Critical Resource | 关键资源权限分配错误 |
| Incorrect Privilege Assignment | 权限分配错误 |
| Least Privilege Violation | 违反最小权限原则 |
| Missing Authorization | 缺少授权 |
| Privilege Abuse | 权限滥用 |
| Privilege Chaining | 权限链 |
| Privilege Context Switching Error | 权限上下文切换错误 |
| Privilege Defined With Unsafe Actions | 定义的权限包含不安全操作 |
| Privilege Dropping / Lowering Errors | 权限降低错误 |
| Privilege Escalation | 权限提升 |
| Restful Privilege Elevation | RESTful风格权限提升 |
| 会话管理 | |
| Account Hijacking | 账户劫持 |
| Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created | 认证绕过:SSL对象创建后修改OpenSSL CTX对象 |
| Cookie Manipulation | Cookie操纵 |
| Cross Site Request Forgery (CSRF) | 跨站请求伪造 |
| Credential Stuffing | 凭据填充 |
| Insufficient Session Expiration | 会话过期不足 |
| Reusing Session IDs (aka Session Replay) | 重用会话ID(会话重放) |
| Session Credential Falsification through Forging | 通过伪造进行会话凭据伪造 |
| Session Credential Falsification through Manipulation | 通过操纵进行会话凭据伪造 |
| Session Credential Falsification through Prediction | 通过预测进行会话凭据伪造 |
| Session Fixation | 会话固定 |
| Session Hijacking | 会话劫持 |
| Session Sidejacking | 会话侧劫持 |
| 身份欺骗与仿冒 | |
| Account Footprinting | 账户足迹 |
| Identity Spoofing | 身份欺骗 |
| Principal Spoof | 主体欺骗 |
| Signature Spoof | 签名欺骗 |
| Signature Spoofing by Improper Validation | 通过不当验证进行签名欺骗 |
| Signature Spoofing by Key Recreation | 通过密钥重建进行签名欺骗 |
| Signature Spoofing by Key Theft | 通过密钥窃取进行签名欺骗 |
| Signature Spoofing by Misrepresentation | 通过虚假陈述进行签名欺骗 |
| Signature Spoofing by Mixing Signed and Unsigned Content | 通过混合签名和未签名内容进行签名欺骗 |
| Spoofing of UDDI/ebXML Messages | UDDI/ebXML消息欺骗 |
| 暴力破解与枚举 | |
| Brute Force | 暴力破解 |
| Dictionary-based Password Attack | 基于字典的密码攻击 |
| Encryption Brute Forcing | 加密暴力破解 |
| Inducing Account Lockout | 诱导账户锁定 |
| Kerberoasting | Kerberoasting攻击 |
| Overly Restrictive Account Lockout Mechanism | 过于严格的账户锁定机制 |
| Password Brute Forcing | 密码暴力破解 |
| Password Spraying | 密码喷洒 |
| Rainbow Table Password Cracking | 彩虹表密码破解 |
| Try All Common Switches | 尝试所有常见开关 |
| Try Common or Default Usernames and Passwords | 尝试通用或默认用户名和密码 |
3. 加密与敏感数据保护
| 英文名称 | 中文翻译 |
|---|---|
| 信息泄露 | |
| Cleartext Storage in a File or on Disk | 文件或磁盘中的明文存储 |
| Cleartext Storage in the Registry | 注册表中的明文存储 |
| Cleartext Storage of Sensitive Information in a Cookie | Cookie中敏感信息的明文存储 |
| Cleartext Storage of Sensitive Information in Executable | 可执行文件中敏感信息的明文存储 |
| Cleartext Storage of Sensitive Information in GUI | GUI中敏感信息的明文存储 |
| Cleartext Storage of Sensitive Information in Memory | 内存中敏感信息的明文存储 |
| Cleartext Transmission of Sensitive Information | 敏感信息的明文传输 |
| Exposure of Information Through Shell Error Message | 通过Shell错误消息暴露信息 |
| Exposure of Sensitive Information Through Data Queries | 通过数据查询暴露敏感信息 |
| Exposure of Sensitive Information Through Environmental Variables | 通过环境变量暴露敏感信息 |
| Exposure of Sensitive Information Through Metadata | 通过元数据暴露敏感信息 |
| Exposure of Sensitive System Information Due to Uncleared Debug Information | 因未清除调试信息而暴露敏感系统信息 |
| Exposure of Sensitive System Information to an Unauthorized Control Sphere | 向未授权控制域暴露敏感系统信息 |
| Information Disclosure | 信息泄露 |
| Information Exposure Through an Error Message | 通过错误消息暴露信息 |
| Information Exposure Through Debug Information | 通过调试信息暴露信息 |
| Information Exposure Through Directory Listing | 通过目录列表暴露信息 |
| Information Exposure Through Discrepancy | 通过差异暴露信息 |
| Information Exposure Through Sent Data | 通过发送的数据暴露信息 |
| Information Exposure Through Timing Discrepancy | 通过时间差异暴露信息 |
| Insertion of Sensitive Information into Log File | 将敏感信息插入日志文件 |
| Java Runtime Error Message Containing Sensitive Information | 包含敏感信息的Java运行时错误消息 |
| Server-generated Error Message Containing Sensitive Information | 服务器生成的包含敏感信息的错误消息 |
| Servlet Runtime Error Message Containing Sensitive Information | 包含敏感信息的Servlet运行时错误消息 |
| 弱加密 | |
| Algorithm Downgrade | 算法降级 |
| Cryptographic Issues - Generic | 加密问题 - 通用 |
| Drop Encryption Level | 降低加密级别 |
| Generation of Predictable IV with CBC Mode | CBC模式下生成可预测的初始向量 |
| Generation of Weak Initialization Vector (IV) | 生成弱初始化向量 |
| Inadequate Encryption Strength | 加密强度不足 |
| Insufficient Entropy | 熵不足 |
| Padding Oracle Crypto Attack | 填充预言机加密攻击 |
| Reversible One-Way Hash | 可逆的单向哈希 |
| Selection of Less-Secure Algorithm During Negotiation | 协商期间选择安全性较低的算法 |
| Small Seed Space in PRNG | 伪随机数生成器种子空间过小 |
| Use of a Broken or Risky Cryptographic Algorithm | 使用已破解或有风险的加密算法 |
| Use of a Cryptographic Primitive with a Risky Implementation | 使用实现有风险的加密原语 |
| Use of a One-Way Hash with a Predictable Salt | 使用带有可预测盐的单向哈希 |
| Use of a One-Way Hash without a Salt | 使用无盐的单向哈希 |
| Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | 使用密码学上弱的伪随机数生成器 |
| Use of Hard-coded Cryptographic Key | 使用硬编码的加密密钥 |
| Use of Insufficiently Random Values | 使用随机性不足的值 |
| Use of Password Hash Instead of Password for Authentication | 使用密码哈希代替密码进行认证 |
| Use of Password Hash With Insufficient Computational Effort | 使用计算工作量不足的密码哈希 |
| Use of Predictable Algorithm in Random Number Generator | 随机数生成器中使用可预测算法 |
| Use of RSA Algorithm without OAEP | 使用不带OAEP的RSA算法 |
| Weak Cryptography for Passwords | 密码的弱加密 |
| 敏感数据暴露 | |
| Cleartext Storage of Sensitive Information | 敏感信息的明文存储 |
| Exposure of Access Control List Files to an Unauthorized Control Sphere | 向未授权控制域暴露访问控制列表文件 |
| Exposure of Backup File to an Unauthorized Control Sphere | 向未授权控制域暴露备份文件 |
| Exposure of Core Dump File to an Unauthorized Control Sphere | 向未授权控制域暴露核心转储文件 |
| Exposure of Version-Control Repository to an Unauthorized Control Sphere | 向未授权控制域暴露版本控制仓库 |
| Exposure of WSDL File Containing Sensitive Information | 暴露包含敏感信息的WSDL文件 |
| Insecure Storage of Sensitive Information | 敏感信息的不安全存储 |
| Privacy Violation | 隐私侵犯 |
| Storing Passwords in a Recoverable Format | 以可恢复格式存储密码 |
| 信息残留 | |
| Remanent Data Readable after Memory Erase | 内存擦除后残留数据可读 |
| Sensitive Information in Resource Not Removed Before Reuse | 资源重用前未删除其中的敏感信息 |
| Sensitive Information Uncleared Before Debug/Power State Transition | 调试/电源状态转换前未清除敏感信息 |
4. 代码质量与资源管理
| 英文名称 | 中文翻译 |
|---|---|
| 内存错误 | |
| Access of Memory Location After End of Buffer | 访问缓冲区结束后的内存位置 |
| Access of Memory Location Before Start of Buffer | 访问缓冲区开始前的内存位置 |
| Access of Uninitialized Pointer | 访问未初始化的指针 |
| Buffer Access Using Size of Source Buffer | 使用源缓冲区大小进行缓冲区访问 |
| Buffer Access with Incorrect Length Value | 使用错误长度值进行缓冲区访问 |
| Buffer Overflow in an API Call | API调用中的缓冲区溢出 |
| Buffer Overflow in Local Command-Line Utilities | 本地命令行工具中的缓冲区溢出 |
| Buffer Overflow via Environment Variables | 通过环境变量的缓冲区溢出 |
| Buffer Overflow via Parameter Expansion | 通过参数扩展的缓冲区溢出 |
| Buffer Overflow via Symbolic Links | 通过符号链接的缓冲区溢出 |
| Buffer Over-read | 缓冲区过度读取 |
| Buffer Underflow | 缓冲区下溢 |
| Buffer Under-read | 缓冲区不足读取 |
| Classic Buffer Overflow | 经典缓冲区溢出 |
| Double Free | 双重释放 |
| Expired Pointer Dereference | 过期指针解引用 |
| Free of Memory not on the Heap | 释放不在堆上的内存 |
| Free of Pointer not at Start of Buffer | 释放不在缓冲区起始位置的指针 |
| Heap Overflow | 堆溢出 |
| Improper Clearing of Heap Memory Before Release (‘Heap Inspection’) | 释放前未正确清除堆内存(堆检查) |
| NULL Pointer Dereference | 空指针解引用 |
| Off-by-one Error | 差一错误 |
| Out-of-bounds Read | 越界读取 |
| Out-of-bounds Write | 越界写入 |
| Release of Invalid Pointer or Reference | 释放无效指针或引用 |
| Return of Stack Variable Address | 返回栈变量地址 |
| Stack Overflow | 栈溢出 |
| Type Confusion | 类型混淆 |
| Use After Free | 释放后使用 |
| Use of Expired File Descriptor | 使用已过期的文件描述符 |
| Use of Out-of-range Pointer Offset | 使用超出范围的指针偏移 |
| Use of Pointer Subtraction to Determine Size | 使用指针减法确定大小 |
| Use of sizeof() on a Pointer Type | 在指针类型上使用sizeof |
| Write-what-where Condition | 写入-什么-何处条件 |
| 竞态条件 | |
| Concurrent Execution using Shared Resource with Improper Synchronization (‘Race Condition’) | 使用共享资源并发执行但同步不当(竞态条件) |
| Context Switching Race Condition | 上下文切换竞态条件 |
| Leveraging Race Conditions | 利用竞态条件 |
| Leveraging Race Conditions via Symbolic Links | 通过符号链接利用竞态条件 |
| Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions | 利用检查时与使用时竞态条件 |
| Permission Race Condition During Resource Copy | 资源复制期间的权限竞态条件 |
| Race Condition During Access to Alternate Channel | 访问备用通道期间的竞态条件 |
| Race Condition Enabling Link Following | 启用链接跟随的竞态条件 |
| Race Condition for Write-Once Attributes | 一次性写入属性的竞态条件 |
| Race Condition within a Thread | 线程内的竞态条件 |
| Time-of-check Time-of-use (TOCTOU) Race Condition | 检查时与使用时竞态条件 |
| 资源管理 | |
| Allocation of File Descriptors or Handles Without Limits or Throttling | 无限或无节流地分配文件描述符或句柄 |
| Allocation of Resources Without Limits or Throttling | 无限或无节流地分配资源 |
| Creation of Temporary File in Directory with Insecure Permissions | 在权限不安全的目录中创建临时文件 |
| Creation of Temporary File With Insecure Permissions | 以不安全的权限创建临时文件 |
| Excessive Allocation | 过度分配 |
| Exposure of File Descriptor to Unintended Control Sphere (‘File Descriptor Leak’) | 向非预期控制域暴露文件描述符(文件描述符泄漏) |
| Improper Control of a Resource Through its Lifetime | 资源生命周期控制不当 |
| Improper Resource Shutdown or Release | 资源关闭或释放不当 |
| Insufficient Resource Pool | 资源池不足 |
| Memory Allocation with Excessive Size Value | 使用过大尺寸值进行内存分配 |
| Missing Release of File Descriptor or Handle after Effective Lifetime | 有效生命周期后未释放文件描述符或句柄 |
| Missing Release of Memory after Effective Lifetime | 有效生命周期后未释放内存 |
| Missing Release of Resource after Effective Lifetime | 有效生命周期后未释放资源 |
| Operation on a Resource after Expiration or Release | 在资源过期或释放后对其进行操作 |
| Operation on Resource in Wrong Phase of Lifetime | 在错误生命周期阶段对资源进行操作 |
| Premature Release of Resource During Expected Lifetime | 在预期生命周期内过早释放资源 |
| Resource Injection | 资源注入 |
| Resource Leak Exposure | 资源泄漏暴露 |
| Uncontrolled Resource Consumption | 不受控制的资源消耗 |
| Uncontrolled Recursion | 不受控制的递归 |
| 代码逻辑与质量 | |
| Always-Incorrect Control Flow Implementation | 始终不正确的控制流实现 |
| Assigning instead of Comparing | 赋值代替比较 |
| Assignment of a Fixed Address to a Pointer | 将固定地址赋值给指针 |
| Assignment to Variable without Use | 赋值后未使用的变量 |
| Class with Excessively Deep Inheritance | 继承层次过深的类 |
| Class with Excessive Number of Child Classes | 子类数量过多的类 |
| Class with Virtual Method without a Virtual Destructor | 包含虚方法但无虚析构函数的类 |
| Cloneable Class Containing Sensitive Information | 包含敏感信息的可克隆类 |
| clone() Method Without super.clone() | clone()方法未调用super.clone() |
| Code Inclusion | 代码包含 |
| Comparing instead of Assigning | 比较代替赋值 |
| Comparison Logic is Vulnerable to Power Side-Channel Attacks | 比较逻辑易受功耗侧信道攻击 |
| Comparison of Classes by Name | 按名称比较类 |
| Comparison of Incompatible Types | 不兼容类型比较 |
| Comparison of Object References Instead of Object Contents | 比较对象引用而非对象内容 |
| Comparison Using Wrong Factors | 使用错误因素进行比较 |
| Dead Code | 死代码 |
| Declaration of Catch for Generic Exception | 捕获通用异常的声明 |
| Declaration of Throws for Generic Exception | 抛出通用异常的声明 |
| Declaration of Variable with Unnecessarily Wide Scope | 声明了不必要宽作用域的变量 |
| Double-Checked Locking | 双重检查锁定 |
| Duplicate Key in Associative List (Alist) | 关联列表中的重复键 |
| Empty Code Block | 空代码块 |
| Empty Exception Block | 空异常块 |
| Empty Synchronized Block | 空同步块 |
| Excessive Code Complexity | 代码复杂度过高 |
| Excessive Halstead Complexity | Halstead复杂度过高 |
| Excessive McCabe Cyclomatic Complexity | McCabe圈复杂度过高 |
| Excessive Reliance on Global Variables | 过度依赖全局变量 |
| Excessive Use of Hard-Coded Literals in Initialization | 初始化中过度使用硬编码字面量 |
| Excessive Use of Self-Modifying Code | 过度使用自修改代码 |
| Excessive Use of Unconditional Branching | 过度使用无条件分支 |
| Executable Regular Expression Error | 可执行正则表达式错误 |
| Expression is Always False | 表达式始终为假 |
| Expression is Always True | 表达式始终为真 |
| Inaccurate Comments | 不准确的注释 |
| Inappropriate Comment Style | 不适当的注释风格 |
| Inappropriate Source Code Style or Formatting | 不适当的源代码风格或格式 |
| Inappropriate Whitespace Style | 不适当的空白字符风格 |
| Infinite Loop | 无限循环 |
| Information Loss or Omission | 信息丢失或遗漏 |
| Insecure Automated Optimizations | 不安全的自动优化 |
| Invokable Control Element with Excessive File or Data Access Operations | 具有过多文件或数据访问操作的可调用控制元素 |
| Invokable Control Element with Excessive Volume of Commented-out Code | 含有大量注释代码的可调用控制元素 |
| Irrelevant Code | 无关代码 |
| Missing Default Case in Switch Statement | switch语句缺少默认情况 |
| Missing Initialization of a Variable | 变量初始化缺失 |
| Missing Serialization Control Element | 缺少序列化控制元素 |
| Modules with Circular Dependencies | 具有循环依赖的模块 |
| Multiple Locks of a Critical Resource | 对关键资源多次加锁 |
| Multiple Operations on Resource in Single-Operation Context | 在单操作上下文中对资源进行多次操作 |
| Multiple Releases of Same Resource or Handle | 多次释放同一资源或句柄 |
| Multiple Unlocks of a Critical Resource | 对关键资源多次解锁 |
| Non-exit on Failed Initialization | 初始化失败后未退出 |
| Object Model Violation: Just One of Equals and Hashcode Defined | 对象模型违反:仅定义了equals或hashcode之一 |
| Omitted Break Statement in Switch | switch中遗漏break语句 |
| Operator Precedence Logic Error | 运算符优先级逻辑错误 |
| Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor | 父类有虚析构函数而子类没有 |
| Parent Class without Virtual Destructor Method | 父类没有虚析构函数方法 |
| Parent Class with References to Child Class | 父类包含对子类的引用 |
| Return Inside Finally Block | 在finally块中返回 |
| Singleton Class Instance Creation without Proper Locking or Synchronization | 未使用正确锁或同步的单例类实例创建 |
| Source Code Element without Standard Prologue | 源代码元素缺少标准序言 |
| Source Code File with Excessive Number of Lines of Code | 源代码文件行数过多 |
| Suspicious Comment | 可疑注释 |
| Uncaught Exception | 未捕获的异常 |
| Unchecked Error Condition | 未检查的错误条件 |
| Unchecked Input for Loop Condition | 未检查的循环条件输入 |
| Unchecked Return Value | 未检查的返回值 |
| Unconditional Control Flow Transfer outside of Switch Block | switch块外的无条件控制流转移 |
| Unexpected Sign Extension | 意外的符号扩展 |
| Unexpected Status Code or Return Value | 意外的状态码或返回值 |
| Uninitialized Variable | 未初始化的变量 |
| Unlock of a Resource that is not Locked | 解锁未锁定的资源 |
| Unsynchronized Access to Shared Data in a Multithreaded Context | 多线程上下文中对共享数据的非同步访问 |
| Use of Blocking Code in Single-threaded, Non-blocking Context | 在单线程非阻塞上下文中使用阻塞代码 |
| Use of Incorrect Operator | 使用错误的运算符 |
| Use of Invariant Value in Dynamically Changing Context | 在动态变化上下文中使用不变值 |
| Use of Same Variable for Multiple Purposes | 同一变量用于多种目的 |
| Use of Singleton Pattern Without Synchronization in a Multithreaded Context | 多线程上下文中使用未同步的单例模式 |
| Use of Uninitialized Resource | 使用未初始化的资源 |
| Use of Wrong Operator in String Comparison | 字符串比较中使用错误运算符 |
| Variable Extraction Error | 变量提取错误 |
5. 配置与部署安全
| 英文名称 | 中文翻译 |
|---|---|
| 错误配置 | |
| ASP.NET Misconfiguration: Creating Debug Binary | ASP.NET错误配置:创建调试二进制文件 |
| ASP.NET Misconfiguration: Improper Model Validation | ASP.NET错误配置:模型验证不当 |
| ASP.NET Misconfiguration: Missing Custom Error Page | ASP.NET错误配置:缺少自定义错误页面 |
| ASP.NET Misconfiguration: Not Using Input Validation Framework | ASP.NET错误配置:未使用输入验证框架 |
| ASP.NET Misconfiguration: Password in Configuration File | ASP.NET错误配置:配置文件中存在密码 |
| ASP.NET Misconfiguration: Use of Identity Impersonation | ASP.NET错误配置:使用身份模拟 |
| Compilation with Insufficient Warnings or Errors | 编译时警告或错误不足 |
| Default Password | 默认密码 |
| Insecure Default Initialization of Resource | 不安全的资源默认初始化 |
| Insecure Default Variable Initialization | 不安全的变量默认初始化 |
| Insecure Inherited Permissions | 不安全的继承权限 |
| J2EE Misconfiguration: Data Transmission Without Encryption | J2EE错误配置:未加密数据传输 |
| J2EE Misconfiguration: Entity Bean Declared Remote | J2EE错误配置:实体Bean声明为远程 |
| J2EE Misconfiguration: Insufficient Session-ID Length | J2EE错误配置:会话ID长度不足 |
| J2EE Misconfiguration: Missing Custom Error Page | J2EE错误配置:缺少自定义错误页面 |
| J2EE Misconfiguration: Plaintext Password in Configuration File | J2EE错误配置:配置文件中存在明文密码 |
| J2EE Misconfiguration: Weak Access Permissions for EJB Methods | J2EE错误配置:EJB方法的访问权限弱 |
| Missing Custom Error Page | 缺少自定义错误页面 |
| .NET Misconfiguration: Use of Impersonation | .NET错误配置:使用模拟 |
| Password in Configuration File | 配置文件中的密码 |
| Plaintext Storage of a Password | 密码的明文存储 |
| Product Released in Non-Release Configuration | 产品以非发布配置发布 |
| 不安全功能 | |
| Debug Messages Revealing Unnecessary Information | 调试消息泄露不必要的信息 |
| Exposed Dangerous Method or Function | 暴露危险的方法或函数 |
| Exposed Unsafe ActiveX Method | 暴露不安全的ActiveX方法 |
| Hidden Functionality | 隐藏功能 |
| Inclusion of Undocumented Features or Chicken Bits | 包含未记录的功能或鸡位 |
| Leftover Debug Code (Backdoor) | 遗留调试代码(后门) |
| Obsolete Feature in UI | UI中的过时功能 |
| Unimplemented or Unsupported Feature in UI | UI中未实现或不支持的功能 |
| Use of Prohibited Code | 使用禁止的代码 |
| Using Unpublished Interfaces | 使用未发布的接口 |
| 日志与监控 | |
| Audit Log Manipulation | 审计日志篡改 |
| Block Logging to Central Repository | 阻止日志记录到中央仓库 |
| Insufficient Logging | 日志记录不足 |
| Log Injection-Tampering-Forging | 日志注入-篡改-伪造 |
| Logging of Excessive Data | 记录过多数据 |
| Web Logs Tampering | Web日志篡改 |
6. 业务逻辑与设计缺陷
| 英文名称 | 中文翻译 |
|---|---|
| 业务流程与逻辑 | |
| Business Logic Errors | 业务逻辑错误 |
| Expected Behavior Violation | 预期行为违反 |
| Functionality Bypass | 功能绕过 |
| Improper Enforcement of a Single, Unique Action | 单一、唯一动作执行不当 |
| Improper Enforcement of Behavioral Workflow | 行为工作流执行不当 |
| Improper Restriction of Authentication Attempts | 认证尝试限制不当 |
| Incorrect Behavior Order | 错误的行为顺序 |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | 错误的行为顺序:在解析和规范化之前进行授权 |
| Incorrect Behavior Order: Early Amplification | 错误的行为顺序:过早放大 |
| Incorrect Behavior Order: Early Validation | 错误的行为顺序:过早验证 |
| Incorrect Behavior Order: Validate Before Canonicalize | 错误的行为顺序:在规范化之前验证 |
| Incorrect Behavior Order: Validate Before Filter | 错误的行为顺序:在过滤之前验证 |
| Incorrect Provision of Specified Functionality | 指定功能提供不正确 |
| Insufficient Adherence to Expected Conventions | 未充分遵循预期惯例 |
| Insufficient Control Flow Management | 控制流管理不足 |
| Insufficient UI Warning of Dangerous Operations | 危险操作的UI警告不足 |
| Not Using Complete Mediation | 未使用完整中介 |
| Product UI does not Warn User of Unsafe Actions | 产品UI未向用户警告不安全操作 |
| UI Discrepancy for Security Feature | 安全功能的UI差异 |
| UI Redressing (Clickjacking) | UI重绘(点击劫持) |
| 设计缺陷 | |
| Architecture with Number of Horizontal Layers Outside of Expected Range | 水平层数超出预期范围的架构 |
| Behavioral Change in New Version or Environment | 新版本或环境中的行为变化 |
| Creation of Emergent Resource | 创建应急资源 |
| Excessive Attack Surface | 攻击面过大 |
| Excessively Complex Data Representation | 过于复杂的数据表示 |
| Excessive Reliance on Global Variables | 过度依赖全局变量 |
| Improper Adherence to Coding Standards | 未正确遵守编码标准 |
| Improper Interaction Between Multiple Correctly-Behaving Entities | 多个行为正确实体之间的交互不当 |
| Improper Isolation or Compartmentalization | 隔离或分区不当 |
| Improper Physical Access Control | 物理访问控制不当 |
| Incomplete Model of Endpoint Features | 端点功能模型不完整 |
| Inconsistency Between Implementation and Documented Design | 实现与文档设计不一致 |
| Incorrect Chaining or Granularity of Debug Components | 调试组件的链或粒度不正确 |
| Insufficient Encapsulation | 封装不足 |
| Insufficient Psychological Acceptability | 心理可接受性不足 |
| Insufficient Technical Documentation | 技术文档不足 |
| Insufficient Type Distinction | 类型区分不足 |
| Missing Documentation for Design | 设计文档缺失 |
| Not Using Complete Mediation | 未使用完整中介 |
| Reliance on Component That is Not Updateable | 依赖不可更新的组件 |
| Security Through Obscurity | 通过模糊实现安全 |
| Unnecessary Complexity in Protection Mechanism | 保护机制不必要地复杂 |
| Violation of Secure Design Principles | 违反安全设计原则 |
7. 硬件、固件与供应链
| 英文名称 | 中文翻译 |
|---|---|
| 硬件攻击与缺陷 | |
| ASIC With Malicious Functionality | 具有恶意功能的ASIC |
| Bypassing ATA Password Security | 绕过ATA密码安全 |
| Bypassing Electronic Locks and Access Controls | 绕过电子锁和访问控制 |
| Bypassing Physical Locks | 绕过物理锁 |
| Bypassing Physical Security | 绕过物理安全 |
| DMA Device Enabled Too Early in Boot Phase | DMA设备在启动阶段过早启用 |
| Electromagnetic Side-Channel Attack | 电磁侧信道攻击 |
| Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities | 利用具有不可修补漏洞的固件或ROM代码 |
| Exploitation of Improperly Configured or Implemented Memory Protections | 利用配置或实现不当的内存保护 |
| Exploitation of Improperly Controlled Hardware Security Identifiers | 利用控制不当的硬件安全标识符 |
| Exploitation of Improperly Controlled Registers | 利用控制不当的寄存器 |
| Exploitation of Thunderbolt Protection Flaws | 利用Thunderbolt保护缺陷 |
| Exploitation of Transient Instruction Execution | 利用瞬态指令执行 |
| Exploitation of Trusted Identifiers | 利用可信标识符 |
| Exploiting Incorrect Chaining or Granularity of Hardware Debug Components | 利用硬件调试组件的错误链或粒度 |
| Exploiting Incorrectly Configured Access Control Security Levels | 利用配置错误的访问控制安全级别 |
| Hardware Allows Activation of Test or Debug Logic at Runtime | 硬件允许在运行时激活测试或调试逻辑 |
| Hardware Child Block Incorrectly Connected to Parent System | 硬件子块与父系统连接不正确 |
| Hardware Design Specifications Are Altered | 硬件设计规范被篡改 |
| Hardware Fault Injection | 硬件故障注入 |
| Hardware Integrity Attack | 硬件完整性攻击 |
| Hardware Internal or Debug Modes Allow Override of Locks | 硬件内部或调试模式允许覆盖锁 |
| Hardware Logic Contains Race Conditions | 硬件逻辑包含竞态条件 |
| Hardware Logic with Insecure De-Synchronization between Control and Data Channels | 硬件逻辑在控制和数据通道之间存在不安全的去同步 |
| Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code | IOCTL中使用METHOD_NEITHER I/O控制代码时地址验证不当 |
| Improper Handling of Single Event Upsets | 单粒子翻转处理不当 |
| Improper Lock Behavior After Power State Transition | 电源状态转换后锁行为不当 |
| Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation | 在省电/恢复操作期间硬件配置状态的完整性保留不当 |
| Improper Prevention of Lock Bit Modification | 锁定位修改防护不当 |
| Improper Protection Against Voltage and Clock Glitches | 对电压和时钟毛刺的防护不当 |
| Improper Protection for Out of Bounds Signal Level Alerts | 越界信号级别警报的防护不当 |
| Improper Protections Against Hardware Overheating | 对硬件过热的防护不当 |
| Improper Restriction of Write-Once Bit Fields | 一次性写入位字段的限制不当 |
| Improper Setting of Bus Controlling Capability in Fabric End-point | 结构端点中总线控制能力设置不当 |
| Improper Translation of Security Attributes by Fabric Bridge | 结构桥对安全属性转换不当 |
| Improper Write Handling in Limited-write Non-Volatile Memories | 有限写入非易失性存储器中的写入处理不当 |
| Improper Zeroization of Hardware Register | 硬件寄存器清零不当 |
| Incorrect Register Defaults or Module Parameters | 寄存器默认值或模块参数不正确 |
| Insecure Security Identifier Mechanism | 不安全的的安全标识符机制 |
| Insufficient Granularity of Address Regions Protected by Register Locks | 受寄存器锁保护的地址区域粒度不足 |
| Insufficient or Incomplete Data Removal within Hardware Component | 硬件组件内数据移除不充分或不完整 |
| Lack of Administrator Control over Security | 缺乏管理员对安全性的控制 |
| Load Value Injection | 加载值注入 |
| Missing Ability to Patch ROM Code | 缺少修补ROM代码的能力 |
| Missing Immutable Root of Trust in Hardware | 硬件中缺少不可变的信任根 |
| Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques | 缺乏对使用集成电路成像技术的硬件逆向工程的防护 |
| Missing Protection for Mirrored Regions in On-Chip Fabric Firewall | 片上结构防火墙中镜像区域保护缺失 |
| Missing Security Checks in Fabric Bridge | 结构桥中缺少安全检查 |
| Missing Security Identifier | 缺少安全标识符 |
| Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface | 硬件接口中未执行操作缺少安全相关反馈 |
| Missing Support for Security Features in On-chip Fabrics or Buses | 片上结构或总线中缺少对安全特性的支持 |
| Missing Write Protection for Parametric Data Values | 参数数据值缺少写保护 |
| Physical Destruction of Device or Component | 设备或组件的物理破坏 |
| Physically Hacking Hardware | 物理入侵硬件 |
| Policy Privileges are not Assigned Consistently Between Control and Data Agents | 控制代理和数据代理之间的策略权限分配不一致 |
| Power-On of Untrusted Execution Core Before Enabling Fabric Access Control | 在启用结构访问控制之前启动不受信任的执行核心 |
| Security-Sensitive Hardware Controls with Missing Lock Bit Protection | 缺少锁定位保护的安全敏感硬件控制 |
| Semiconductor Defects in Hardware Logic with Security-Sensitive Implications | 具有安全敏感影响的硬件逻辑中的半导体缺陷 |
| Sensitive Information Accessible by Physical Probing of JTAG Interface | 通过JTAG接口的物理探测可访问敏感信息 |
| Sensitive Non-Volatile Information Not Protected During Debug | 调试期间敏感非易失性信息未受保护 |
| Sequence of Processor Instructions Leads to Unexpected Behavior | 处理器指令序列导致意外行为 |
| System-on-Chip (SoC) Using Components without Unique, Immutable Identifiers | 使用无唯一、不可变标识符组件的片上系统 |
| Uninitialized Value on Reset for Registers Holding Security Settings | 保存安全设置的寄存器复位时值未初始化 |
| 供应链与固件安全 | |
| Altered Component Firmware | 篡改的组件固件 |
| Altered Installed BIOS | 篡改的已安装BIOS |
| Counterfeit Hardware Component Inserted During Product Assembly | 产品组装过程中插入的假冒硬件组件 |
| Counterfeit Organizations | 假冒组织 |
| Design Alteration | 设计篡改 |
| Design for FPGA Maliciously Altered | FPGA设计被恶意篡改 |
| Developer Signing Maliciously Altered Software | 开发者签署恶意篡改的软件 |
| Development Alteration | 开发篡改 |
| Documentation Alteration to Cause Errors in System Design | 文档篡改导致系统设计错误 |
| Documentation Alteration to Circumvent Dial-down | 文档篡改以绕过降级 |
| Documentation Alteration to Produce Under-performing Systems | 文档篡改以产生性能不足的系统 |
| Embedded Malicious Code | 嵌入恶意代码 |
| Exploitation of Improperly Configured or Implemented Memory Protections | 利用配置或实现不当的内存保护 |
| Firmware Not Updateable | 固件不可更新 |
| Hardware Component Substitution | 硬件组件替换 |
| Hardware Component Substitution During Baselining | 基线化期间硬件组件替换 |
| Infected Hardware | 受感染的硬件 |
| Infected Memory | 受感染的内存 |
| Infected Software | 受感染的软件 |
| Infiltration of Hardware Development Environment | 渗透硬件开发环境 |
| Infiltration of Software Development Environment | 渗透软件开发环境 |
| Malicious Code Implanted During Chip Programming | 芯片编程期间植入的恶意代码 |
| Malicious Gray Market Hardware | 恶意灰市硬件 |
| Malicious Hardware Component Replacement | 恶意硬件组件替换 |
| Malicious Hardware Update | 恶意硬件更新 |
| Malicious Logic Inserted Into Product Software by Authorized Developer | 授权开发人员插入产品软件的恶意逻辑 |
| Malicious Logic Insertion | 恶意逻辑插入 |
| Malicious Logic Insertion into Product Software via Configuration Management Manipulation | 通过配置管理操纵向产品软件插入恶意逻辑 |
| Malicious Logic Insertion into Product Software via Inclusion of 3rd Party Component Dependency | 通过包含第三方组件依赖项向产品软件插入恶意逻辑 |
| Malicious Root Certificate | 恶意根证书 |
| Malicious Software Download | 恶意软件下载 |
| Malicious Software Implanted | 植入的恶意软件 |
| Malware | 恶意软件 |
| Modification During Manufacture | 制造期间的修改 |
| Open-Source Library Manipulation | 开源库操纵 |
| Provide Counterfeit Component | 提供假冒组件 |
| Public Key Re-Use for Signing both Debug and Production Code | 公钥重复用于签署调试和生产代码 |
| Repo Jacking | 仓库劫持 |
| Requirements for ASIC Functionality Maliciously Altered | ASIC功能需求被恶意篡改 |
| Rogue Integration Procedures | 恶意集成程序 |
| Rooting SIM Cards | SIM卡Root |
| Software Development Tools Maliciously Altered | 软件开发工具被恶意篡改 |
| Software Integrity Attack | 软件完整性攻击 |
| Spoof Open-Source Software Metadata | 欺骗开源软件元数据 |
| Spoof Version Control System Commit Metadata | 欺骗版本控制系统提交元数据 |
| Subvert Code-signing Facilities | 破坏代码签名设施 |
| System Build Data Maliciously Altered | 系统构建数据被恶意篡改 |
| Use of Unmaintained Third Party Components | 使用无人维护的第三方组件 |
| Using Components with Known Vulnerabilities | 使用含有已知漏洞的组件 |
8. 社会工程学与人为因素
| 英文名称 | 中文翻译 |
|---|---|
| 社会工程学攻击 | |
| Dumpster Diving | 垃圾搜寻 |
| Influence Perception | 影响感知 |
| Influence Perception of Authority | 影响权威感知 |
| Influence Perception of Commitment and Consistency | 影响承诺与一致性感知 |
| Influence Perception of Consensus or Social Proof | 影响共识或社会认同感知 |
| Influence Perception of Liking | 影响喜好感知 |
| Influence Perception of Reciprocation | 影响互惠感知 |
| Influence Perception of Scarcity | 影响稀缺性感知 |
| Influence via Incentives | 通过激励影响 |
| Influence via Modes of Thinking | 通过思维模式影响 |
| Influence via Psychological Principles | 通过心理原则影响 |
| Manipulate Human Behavior | 操纵人类行为 |
| Pharming | 网页欺诈 |
| Phishing | 网络钓鱼 |
| Pretexting | 借口 |
| Pretexting via Customer Service | 通过客服借口 |
| Pretexting via Delivery Person | 通过送货员借口 |
| Pretexting via Phone | 通过电话借口 |
| Pretexting via Tech Support | 通过技术支持借口 |
| Scams | 诈骗 |
| Shoulder Surfing | 肩窥 |
| Smudge Attack | 污迹攻击 |
| Spear Phishing | 鱼叉式网络钓鱼 |
| Target Influence via Eye Cues | 通过眼神暗示影响目标 |
| Target Influence via Framing | 通过框架效应影响目标 |
| Target Influence via The Human Buffer Overflow | 通过“人类缓冲区溢出”影响目标 |
| Voice Phishing | 语音网络钓鱼 |
| 设备物理攻击 | |
| Cloning Magnetic Strip Cards | 克隆磁条卡 |
| Cloning RFID Cards or Chips | 克隆RFID卡或芯片 |
| Device Unlock Credential Sharing | 设备解锁凭据共享 |
| Lock Bumping | 撞锁 |
| Lock Picking | 撬锁 |
| Mobile Phishing | 移动端网络钓鱼 |
| Physical Theft | 物理盗窃 |
| RFID Chip Deactivation or Destruction | RFID芯片停用或销毁 |
| Root/Jailbreak Detection Evasion via Debugging | 通过调试绕过Root/越狱检测 |
| Root/Jailbreak Detection Evasion via Hooking | 通过Hook绕过Root/越狱检测 |
| Tapjacking | 屏幕劫持 |
| Using a Snap Gun Lock to Force a Lock | 使用撞枪强行开锁 |
9. 网络协议与通信安全
| 英文名称 | 中文翻译 |
|---|---|
| 网络嗅探与拦截 | |
| Adversary in the Browser (AiTB) | 浏览器中的对手 |
| Adversary in the Middle (AiTM) | 中间人攻击 |
| Browser in the Middle (BiTM) | 浏览器中间人攻击 |
| Eavesdropping | 窃听 |
| Eavesdropping on a Monitor | 窃听显示器 |
| Interception | 拦截 |
| Man-in-the-Middle | 中间人攻击 |
| Sniffing Attacks | 嗅探攻击 |
| Sniffing Network Traffic | 嗅探网络流量 |
| 网络协议攻击 | |
| BGP Route Disabling | BGP路由禁用 |
| Bluetooth Impersonation AttackS (BIAS) | 蓝牙冒充攻击 |
| Cellular Broadcast Message Request | 蜂窝广播消息请求 |
| Cellular Data Injection | 蜂窝数据注入 |
| Cellular Jamming | 蜂窝网络干扰 |
| Cellular Rogue Base Station | 蜂窝恶意基站 |
| Cellular Traffic Intercept | 蜂窝流量拦截 |
| Counterfeit GPS Signals | 假冒GPS信号 |
| DHCP Spoofing | DHCP欺骗 |
| DNS Blocking | DNS阻断 |
| DNS Cache Poisoning | DNS缓存投毒 |
| DNS Domain Seizure | DNS域名劫持 |
| DNS Rebinding | DNS重绑定 |
| DNS Spoofing | DNS欺骗 |
| DNS Zone Transfers | DNS区域传输 |
| HTTP Request Smuggling | HTTP请求走私 |
| HTTP Request Splitting | HTTP请求拆分 |
| HTTP Response Smuggling | HTTP响应走私 |
| HTTP Response Splitting | HTTP响应拆分 |
| HTTP Verb Tampering | HTTP动词篡改 |
| Key Negotiation of Bluetooth Attack (KNOB) | 蓝牙密钥协商攻击 |
| Route Disabling | 路由禁用 |
| SSL Flood | SSL洪水攻击 |
| TCP RST Injection | TCP重置包注入 |
| Traffic Injection | 流量注入 |
| Transparent Proxy Abuse | 透明代理滥用 |
| 拒绝服务 | |
| Amplification | 放大 |
| Asymmetric Resource Consumption (Amplification) | 不对称资源消耗(放大) |
| Excessive Platform Resource Consumption within a Loop | 循环内平台资源消耗过大 |
| Excessive Resource Consumption | 过度资源消耗 |
| Flooding | 洪水攻击 |
| HTTP DoS | HTTP拒绝服务 |
| HTTP Flood | HTTP洪水攻击 |
| Jamming | 干扰 |
| Large Data Table with Excessive Number of Indices | 具有过多索引的大型数据表 |
| Network Amplification | 网络放大 |
| Orbital Jamming | 轨道干扰 |
| Regular Expression Exponential Blowup | 正则表达式指数级爆炸 |
| SSL Flood | SSL洪水攻击 |
| TCP Flood | TCP洪水攻击 |
| Terrestrial Jamming | 地面干扰 |
| UDP Flood | UDP洪水攻击 |
| Uncontrolled Resource Consumption | 不受控制的资源消耗 |
| Wi-Fi Jamming | Wi-Fi干扰 |
| XML Entity Expansion | XML实体扩展 |
| XML Flood | XML洪水攻击 |
| XML Ping of the Death | XML死亡Ping |
| 侦察与指纹识别 | |
| Active OS Fingerprinting | 主动操作系统指纹识别 |
| AJAX Footprinting | AJAX足迹 |
| Application Fingerprinting | 应用程序指纹识别 |
| Black Box Reverse Engineering | 黑盒逆向工程 |
| Browser Fingerprinting | 浏览器指纹识别 |
| Detect Unpublicized Web Pages | 检测未公开的网页 |
| Detect Unpublicized Web Services | 检测未公开的Web服务 |
| DNS Zone Transfers | DNS区域传输 |
| File Discovery | 文件发现 |
| Fingerprinting | 指纹识别 |
| Footprinting | 足迹 |
| Fuzzing | 模糊测试 |
| Fuzzing for application mapping | 用于应用映射的模糊测试 |
| Fuzzing for garnering other adjacent user/sensitive data | 用于获取其他相邻用户/敏感数据的模糊测试 |
| Group Permission Footprinting | 组权限足迹 |
| Host Discovery | 主机发现 |
| Identify Shared Files/Directories on System | 识别系统上的共享文件/目录 |
| Network Topology Mapping | 网络拓扑映射 |
| Owner Footprinting | 所有者足迹 |
| Passive OS Fingerprinting | 被动操作系统指纹识别 |
| Peripheral Footprinting | 外设足迹 |
| Port Scanning | 端口扫描 |
| Process Footprinting | 进程足迹 |
| Probe Audio and Video Peripherals | 探测音频和视频外设 |
| Probe iOS Screenshots | 探测iOS截图 |
| Probe System Files | 探测系统文件 |
| Query System for Information | 查询系统信息 |
| Reverse Engineer an Executable to Expose Assumed Hidden Functionality | 逆向工程可执行文件以暴露假定的隐藏功能 |
| Reverse Engineering | 逆向工程 |
| Scanning for Vulnerable Software | 扫描易受攻击的软件 |
| Security Software Footprinting | 安全软件足迹 |
| Services Footprinting | 服务足迹 |
| System Footprinting | 系统足迹 |
| System Location Discovery | 系统位置发现 |
| TCP ACK Ping | TCP ACK Ping |
| TCP ACK Scan | TCP ACK扫描 |
| TCP Connect Scan | TCP连接扫描 |
| TCP FIN Scan | TCP FIN扫描 |
| TCP Null Scan | TCP空扫描 |
| TCP RPC Scan | TCP RPC扫描 |
| TCP SYN Ping | TCP SYN Ping |
| TCP SYN Scan | TCP SYN扫描 |
| TCP Window Scan | TCP窗口扫描 |
| TCP Xmas Scan | TCP XMAS扫描 |
| Traceroute Route Enumeration | 路由追踪枚举 |
| UDP Ping | UDP Ping |
| UDP Scan | UDP扫描 |
| Web Application Fingerprinting | Web应用程序指纹识别 |
| WSDL Scanning | WSDL扫描 |
| 其他网络攻击 | |
| BGP Route Disabling | BGP路由禁用 |
| Carry-Off GPS Attack | GPS劫持攻击 |
| Counterfeit GPS Signals | 假冒GPS信号 |
| DNS Domain Seizure | DNS域名劫持 |
| Domain Seizure | 域名劫持 |
| Route Disabling | 路由禁用 |
| TCP RST Injection | TCP重置包注入 |
10. AI/LLM安全
| 英文名称 | 中文翻译 |
|---|---|
| LLM漏洞与风险 (OWASP Top 10 for LLMs) | |
| LLM01:2025 Prompt Injection | LLM01:2025 提示词注入 |
| LLM02:2025 Sensitive Information Disclosure | LLM02:2025 敏感信息披露 |
| LLM03:2025 Supply Chain | LLM03:2025 供应链 |
| LLM04:2025 Data and Model Poisoning | LLM04:2025 数据和模型投毒 |
| LLM05:2025 Improper Output Handling | LLM05:2025 输出处理不当 |
| LLM06:2025 Excessive Agency | LLM06:2025 过度代理 |
| LLM07:2025 System Prompt Leakage | LLM07:2025 系统提示词泄露 |
| LLM08:2025 Vector and Embedding Weaknesses | LLM08:2025 向量与嵌入弱点 |
| LLM09:2025 Misinformation | LLM09:2025 错误信息 |
| LLM10:2025 Unbounded Consumption | LLM10:2025 无限制消耗 |
| AI系统安全 | |
| ASI01: Agent Goal Hijack | ASI01: 代理目标劫持 |
| ASI02: Tool Misuse and Exploitation | ASI02: 工具滥用与利用 |
| ASI03: Identity and Privilege Abuse | ASI03: 身份与权限滥用 |
| ASI04: Agentic Supply Chain Vulnerabilities | ASI04: 代理供应链漏洞 |
| ASI05: Unexpected Code Execution (RCE) | ASI05: 意外代码执行 |
| ASI06: Memory & Context Poisoning | ASI06: 内存与上下文投毒 |
| ASI07: Insecure Inter-Agent Communication | ASI07: 不安全的代理间通信 |
| ASI08: Cascading Failures | ASI08: 级联故障 |
| ASI09: Human-Agent Trust Exploitation | ASI09: 人-代理信任利用 |
| ASI10: Rogue Agents | ASI10: 恶意代理 |
| AI相关攻击 | |
| Adversarial Input Perturbations | 对抗性输入扰动 |
| Automated Recognition Mechanism with Inadequate Detection or Handling of Adversarial Input Perturbations | 自动识别机制对对抗性输入扰动的检测或处理不足 |
| Insecure Setting of Generative AI/ML Model Inference Parameters | 生成式AI/ML模型推理参数设置不安全 |
| Improper Validation of Generative AI Output | 生成式AI输出验证不当 |
| AI相关漏洞 | |
| LLM01: Prompt Injection | LLM01: 提示词注入 |
| LLM02: Insecure Output Handling | LLM02: 不安全的输出处理 |
| LLM03: Training Data Poisoning | LLM03: 训练数据投毒 |
| LLM04: Model Denial of Service | LLM04: 模型拒绝服务 |
| LLM05: Supply Chain Vulnerabilities | LLM05: 供应链漏洞 |
| LLM06: Sensitive Information Disclosure | LLM06: 敏感信息披露 |
| LLM07: Insecure Plugin Design | LLM07: 不安全的插件设计 |
| LLM08: Excessive Agency | LLM08: 过度代理 |
| LLM09: Overreliance | LLM09: 过度依赖 |
| LLM10: Model Theft | LLM10: 模型窃取 |
11. 其他攻击与侦察技术
| 英文名称 | 中文翻译 |
|---|---|
| 恶意软件与持久化 | |
| Adware | 广告软件 |
| Backdoor | 后门 |
| Botnet | 僵尸网络 |
| Crimeware | 犯罪软件 |
| Dropper | 释放器 |
| Exploit Kit | 漏洞利用工具包 |
| Keylogger | 键盘记录器 |
| Malware | 恶意软件 |
| Ransomware | 勒索软件 |
| Rootkit | 根工具包 |
| Spyware | 间谍软件 |
| Trojan Horse | 特洛伊木马 |
| Virus | 病毒 |
| Worm | 蠕虫 |
| 持久化机制 | |
| Create New Service | 创建新服务 |
| Install Malicious Extension | 安装恶意扩展 |
| Install New Service | 安装新服务 |
| Install Rootkit | 安装Rootkit |
| Modify Existing Service | 修改现有服务 |
| Modify Registry Run Keys | 修改注册表运行键 |
| Modification of Windows Service Configuration | 修改Windows服务配置 |
| Replace Binaries | 替换二进制文件 |
| Replace File Extension Handlers | 替换文件扩展名处理程序 |
| Replace Trusted Executable | 替换受信任的可执行文件 |
| Replace Winlogon Helper DLL | 替换Winlogon Helper DLL |
| Run Software at Logon | 登录时运行软件 |
| 侦察与枚举 | |
| Enumerate Mail Exchange (MX) Records | 枚举邮件交换记录 |
| Fuzzing | 模糊测试 |
| Harvesting Information via API Event Monitoring | 通过API事件监控收集信息 |
| IP Address Blocking | IP地址阻断 |
| Malware-Directed Internal Reconnaissance | 恶意软件引导的内部侦察 |
| Query System for Information | 查询系统信息 |
| Screen Temporary Files for Sensitive Information | 扫描临时文件中的敏感信息 |
| 其他 | |
| BitSquatting | 位蹲守 |
| Evercookie | 超级Cookie |
| Homograph Attack via Homoglyphs | 通过同形异义词的同形异义攻击 |
| Scheme Squatting | 方案蹲守 |
| SoundSquatting | 声音蹲守 |
| StarJacking | 星号劫持 |
| Subdomain Takeover | 子域名接管 |
| TypoSquatting | 域名仿冒 |
| URL Encoding | URL编码 |
| WiFi MAC Address Tracking | WiFi MAC地址追踪 |
| WiFi SSID Tracking | WiFi SSID追踪 |