Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Information Management Errors
Category ID:199
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to improper handling of sensitive information.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV699Software Development
HasMemberAllowedB208Observable Timing Discrepancy
HasMemberAllowedB209Generation of Error Message Containing Sensitive Information
HasMemberAllowedB1230Exposure of Sensitive Information Through Metadata
HasMemberAllowedB201Insertion of Sensitive Information Into Sent Data
HasMemberAllowedB204Observable Response Discrepancy
HasMemberAllowedB205Observable Behavioral Discrepancy
HasMemberAllowedB212Improper Removal of Sensitive Information Before Storage or Transfer
HasMemberAllowedB213Exposure of Sensitive Information Due to Incompatible Policies
HasMemberAllowedB214Invocation of Process Using Visible Sensitive Information
HasMemberAllowedB215Insertion of Sensitive Information Into Debugging Code
HasMemberAllowedB312Cleartext Storage of Sensitive Information
HasMemberAllowedB319Cleartext Transmission of Sensitive Information
HasMemberAllowedB359Exposure of Private Personal Information to an Unauthorized Actor
HasMemberAllowedB497Exposure of Sensitive System Information to an Unauthorized Control Sphere
HasMemberAllowedB524Use of Cache Containing Sensitive Information
HasMemberAllowedB538Insertion of Sensitive Information into Externally-Accessible File or Directory
HasMemberAllowedB921Storage of Sensitive Data in a Mechanism without Access Control
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 699
Name: Software Development
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 208
Name: Observable Timing Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 209
Name: Generation of Error Message Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1230
Name: Exposure of Sensitive Information Through Metadata
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 201
Name: Insertion of Sensitive Information Into Sent Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 204
Name: Observable Response Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 205
Name: Observable Behavioral Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 212
Name: Improper Removal of Sensitive Information Before Storage or Transfer
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 213
Name: Exposure of Sensitive Information Due to Incompatible Policies
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 214
Name: Invocation of Process Using Visible Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 215
Name: Insertion of Sensitive Information Into Debugging Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 312
Name: Cleartext Storage of Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 319
Name: Cleartext Transmission of Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 359
Name: Exposure of Private Personal Information to an Unauthorized Actor
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 497
Name: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 524
Name: Use of Cache Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 538
Name: Insertion of Sensitive Information into Externally-Accessible File or Directory
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 921
Name: Storage of Sensitive Data in a Mechanism without Access Control
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found