Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Memory and Storage Issues
Category ID:1202
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are typically associated with memory (e.g., DRAM, SRAM) and storage technologies (e.g., NAND Flash, OTP, EEPROM, and eMMC).

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV1194Hardware Design
HasMemberAllowedB1246Improper Write Handling in Limited-write Non-Volatile Memories
HasMemberAllowedB1251Mirrored Regions with Different Values
HasMemberAllowedB1257Improper Access Control Applied to Mirrored or Aliased Memory Regions
HasMemberAllowedB1282Assumed-Immutable Data is Stored in Writable Memory
HasMemberAllowed-with-ReviewB1420Exposure of Sensitive Information during Transient Execution
HasMemberAllowedB226Sensitive Information in Resource Not Removed Before Reuse
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 1194
Name: Hardware Design
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1246
Name: Improper Write Handling in Limited-write Non-Volatile Memories
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1251
Name: Mirrored Regions with Different Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1257
Name: Improper Access Control Applied to Mirrored or Aliased Memory Regions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1282
Name: Assumed-Immutable Data is Stored in Writable Memory
Nature: HasMember
Mapping: Allowed-with-Review
Type: Base
ID: 1420
Name: Exposure of Sensitive Information during Transient Execution
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 226
Name: Sensitive Information in Resource Not Removed Before Reuse
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found