Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Data Integrity Issues
Category ID:1214
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to a software system's data integrity components. Frequently these deal with the ability to ensure the integrity of data, such as messages, resource files, deployment files, and configuration files. The weaknesses in this category could lead to a degradation of data integrity quality if they are not addressed.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV699Software Development
HasMemberAllowedB322Key Exchange without Entity Authentication
HasMemberAllowed-with-ReviewC346Origin Validation Error
HasMemberAllowedB347Improper Verification of Cryptographic Signature
HasMemberAllowedB348Use of Less Trusted Source
HasMemberAllowedB349Acceptance of Extraneous Untrusted Data With Trusted Data
HasMemberAllowedB351Insufficient Type Distinction
HasMemberAllowedB353Missing Support for Integrity Check
HasMemberAllowedB354Improper Validation of Integrity Check Value
HasMemberAllowedB494Download of Code Without Integrity Check
HasMemberAllowedB565Reliance on Cookies without Validation and Integrity Checking
HasMemberAllowedB649Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
HasMemberAllowedB829Inclusion of Functionality from Untrusted Control Sphere
HasMemberAllowedB924Improper Enforcement of Message Integrity During Transmission in a Communication Channel
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 699
Name: Software Development
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 322
Name: Key Exchange without Entity Authentication
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 346
Name: Origin Validation Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 347
Name: Improper Verification of Cryptographic Signature
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 348
Name: Use of Less Trusted Source
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 349
Name: Acceptance of Extraneous Untrusted Data With Trusted Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 351
Name: Insufficient Type Distinction
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 353
Name: Missing Support for Integrity Check
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 354
Name: Improper Validation of Integrity Check Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 494
Name: Download of Code Without Integrity Check
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 565
Name: Reliance on Cookies without Validation and Integrity Checking
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 649
Name: Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 829
Name: Inclusion of Functionality from Untrusted Control Sphere
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 924
Name: Improper Enforcement of Message Integrity During Transmission in a Communication Channel
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found