ID: 1009 Status: Draft
Weaknesses in this category are related to the design and architecture of audit-based components of the system. Frequently these deal with logging user activities in order to identify attackers and modifications to the system. The weaknesses in this category could lead to a degradation of the quality of the audit capability if they are not addressed when designing or implementing a secure architecture.
ID | NAME |
---|---|
CWE-117 | 日志输出的转义处理不恰当 |
CWE-223 | 安全相关信息的遗漏 |
CWE-224 | 通过候选名称导致的安全相关信息混淆 |
CWE-532 | 通过日志文件的信息暴露 |
CWE-778 | 不充分的日志记录 |
CWE-779 | 日志记录过多数据 |
REF-9 A Catalog of Security Architecture Weaknesses. REF-10 Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird.