Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Encapsulation Issues
Category ID:1227
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to issues surrounding the bundling of data with the methods intended to operate on that data.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV699Software Development
HasMemberProhibitedB1057Data Access Operations Outside of Expected Data Manager Component
HasMemberProhibitedB1054Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer
HasMemberProhibitedB1062Parent Class with References to Child Class
HasMemberProhibitedB1083Data Access from Outside Expected Data Manager Component
HasMemberProhibitedB1090Method Containing Access of a Member Element from Another Class
HasMemberAllowedB1100Insufficient Isolation of System-Dependent Functions
HasMemberProhibitedB1105Insufficient Encapsulation of Machine-Dependent Functionality
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 699
Name: Software Development
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1057
Name: Data Access Operations Outside of Expected Data Manager Component
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1054
Name: Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1062
Name: Parent Class with References to Child Class
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1083
Name: Data Access from Outside Expected Data Manager Component
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1090
Name: Method Containing Access of a Member Element from Another Class
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1100
Name: Insufficient Isolation of System-Dependent Functions
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1105
Name: Insufficient Encapsulation of Machine-Dependent Functionality
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found