Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:SFP Secondary Cluster: Architecture
Category ID:975
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

This category identifies Software Fault Patterns (SFPs) within the Architecture cluster.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV888Software Fault Pattern (SFP) Clusters
HasMemberAllowedB348Use of Less Trusted Source
HasMemberAllowedB359Exposure of Private Personal Information to an Unauthorized Actor
HasMemberAllowed-with-ReviewC602Client-Side Enforcement of Server-Side Security
HasMemberAllowed-with-ReviewC637Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')
HasMemberAllowedB649Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
HasMemberAllowedB654Reliance on a Single Factor in a Security Decision
HasMemberAllowed-with-ReviewC656Reliance on Security Through Obscurity
HasMemberDiscouragedC657Violation of Secure Design Principles
HasMemberAllowed-with-ReviewC671Lack of Administrator Control over Security
HasMemberDiscouragedP693Protection Mechanism Failure
HasMemberAllowedB749Exposed Dangerous Method or Function
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 888
Name: Software Fault Pattern (SFP) Clusters
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 348
Name: Use of Less Trusted Source
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 359
Name: Exposure of Private Personal Information to an Unauthorized Actor
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 602
Name: Client-Side Enforcement of Server-Side Security
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 637
Name: Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 649
Name: Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 654
Name: Reliance on a Single Factor in a Security Decision
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 656
Name: Reliance on Security Through Obscurity
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 657
Name: Violation of Secure Design Principles
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 671
Name: Lack of Administrator Control over Security
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 693
Name: Protection Mechanism Failure
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 749
Name: Exposed Dangerous Method or Function
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found