Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:OWASP Top Ten 2004 Category A8 - Insecure Storage
Category ID:729
Vulnerability Mapping:Prohibited
Status:Obsolete
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

Weaknesses in this category are related to the A8 category in the OWASP Top Ten 2004.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV711Weaknesses in OWASP Top Ten (2004)
HasMemberAllowedV14Compiler Removal of Code to Clear Buffers
HasMemberAllowedB226Sensitive Information in Resource Not Removed Before Reuse
HasMemberAllowedB261Weak Encoding for Password
HasMemberDiscouragedC311Missing Encryption of Sensitive Data
HasMemberAllowedV321Use of Hard-coded Cryptographic Key
HasMemberAllowed-with-ReviewC326Inadequate Encryption Strength
HasMemberAllowed-with-ReviewC327Use of a Broken or Risky Cryptographic Algorithm
HasMemberAllowedV539Use of Persistent Cookies Containing Sensitive Information
HasMemberAllowedV591Sensitive Data Storage in Improperly Locked Memory
HasMemberAllowedV598Use of GET Request Method With Sensitive Query Strings
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 711
Name: Weaknesses in OWASP Top Ten (2004)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 14
Name: Compiler Removal of Code to Clear Buffers
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 226
Name: Sensitive Information in Resource Not Removed Before Reuse
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 261
Name: Weak Encoding for Password
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 311
Name: Missing Encryption of Sensitive Data
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 321
Name: Use of Hard-coded Cryptographic Key
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 326
Name: Inadequate Encryption Strength
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 327
Name: Use of a Broken or Risky Cryptographic Algorithm
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 539
Name: Use of Persistent Cookies Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 591
Name: Sensitive Data Storage in Improperly Locked Memory
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 598
Name: Use of GET Request Method With Sensitive Query Strings
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Reference ID: REF-588
Title: A8 Insecure Storage
Version: v4.15
Author: OWASP
Publication:
Publisher:
Edition:
URL:http://sourceforge.net/project/showfiles.php?group_id=64424&package_id=70827
URL Date:
Day:N/A
Month:N/A
Year:2007
Details not found