Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Audit / Logging Errors
Category ID:1210
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to audit-based components of a software system. Frequently these deal with logging user activities in order to identify undesired access and modifications to the system. The weaknesses in this category could lead to a degradation of the quality of the audit capability if they are not addressed.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV699Software Development
HasMemberAllowedB117Improper Output Neutralization for Logs
HasMemberAllowedB222Truncation of Security-relevant Information
HasMemberAllowedB223Omission of Security-relevant Information
HasMemberAllowedB224Obscured Security-relevant Information by Alternate Name
HasMemberAllowedB778Insufficient Logging
HasMemberAllowedB779Logging of Excessive Data
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 699
Name: Software Development
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 117
Name: Improper Output Neutralization for Logs
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 222
Name: Truncation of Security-relevant Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 223
Name: Omission of Security-relevant Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 224
Name: Obscured Security-relevant Information by Alternate Name
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 778
Name: Insufficient Logging
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 779
Name: Logging of Excessive Data
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found