Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:Behavioral Problems
Category ID:438
Vulnerability Mapping:Prohibited
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to unexpected behaviors from code that an application uses.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV699Software Development
HasMemberAllowedB551Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
HasMemberAllowedB1025Comparison Using Wrong Factors
HasMemberAllowedB1037Processor Optimization Removal or Modification of Security-critical Code
HasMemberAllowedB115Misinterpretation of Input
HasMemberAllowedB179Incorrect Behavior Order: Early Validation
HasMemberAllowedB408Incorrect Behavior Order: Early Amplification
HasMemberAllowedB437Incomplete Model of Endpoint Features
HasMemberAllowedB439Behavioral Change in New Version or Environment
HasMemberAllowedB440Expected Behavior Violation
HasMemberAllowedB444Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
HasMemberAllowedB480Use of Incorrect Operator
HasMemberAllowedB483Incorrect Block Delimitation
HasMemberAllowedB484Omitted Break Statement in Switch
HasMemberAllowedB698Execution After Redirect (EAR)
HasMemberAllowedB733Compiler Optimization Removal or Modification of Security-critical Code
HasMemberAllowedB835Loop with Unreachable Exit Condition ('Infinite Loop')
HasMemberAllowedB783Operator Precedence Logic Error
HasMemberAllowedB837Improper Enforcement of a Single, Unique Action
HasMemberAllowedB841Improper Enforcement of Behavioral Workflow
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 699
Name: Software Development
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 551
Name: Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1025
Name: Comparison Using Wrong Factors
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1037
Name: Processor Optimization Removal or Modification of Security-critical Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 115
Name: Misinterpretation of Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 179
Name: Incorrect Behavior Order: Early Validation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 408
Name: Incorrect Behavior Order: Early Amplification
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 437
Name: Incomplete Model of Endpoint Features
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 439
Name: Behavioral Change in New Version or Environment
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 440
Name: Expected Behavior Violation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 444
Name: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 480
Name: Use of Incorrect Operator
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 483
Name: Incorrect Block Delimitation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 484
Name: Omitted Break Statement in Switch
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 698
Name: Execution After Redirect (EAR)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 733
Name: Compiler Optimization Removal or Modification of Security-critical Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 835
Name: Loop with Unreachable Exit Condition ('Infinite Loop')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 783
Name: Operator Precedence Logic Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 837
Name: Improper Enforcement of a Single, Unique Action
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 841
Name: Improper Enforcement of Behavioral Workflow
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
PLOVERN/AN/ABehavioral problems
Taxonomy Name: PLOVER
Entry ID: N/A
Fit: N/A
Entry Name: Behavioral problems
▼References
Details not found