Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:SFP Secondary Cluster: Design
Category ID:977
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

This category identifies Software Fault Patterns (SFPs) within the Design cluster.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV888Software Fault Pattern (SFP) Clusters
HasMemberAllowedB115Misinterpretation of Input
HasMemberAllowedV187Partial String Comparison
HasMemberAllowedB188Reliance on Data/Memory Layout
HasMemberAllowedB193Off-by-one Error
HasMemberAllowedB349Acceptance of Extraneous Untrusted Data With Trusted Data
HasMemberAllowed-with-ReviewC405Asymmetric Resource Consumption (Amplification)
HasMemberAllowed-with-ReviewC406Insufficient Control of Network Message Volume (Network Amplification)
HasMemberAllowed-with-ReviewC407Inefficient Algorithmic Complexity
HasMemberAllowedB408Incorrect Behavior Order: Early Amplification
HasMemberAllowedB409Improper Handling of Highly Compressed Data (Data Amplification)
HasMemberAllowedC410Insufficient Resource Pool
HasMemberAllowedB430Deployment of Wrong Handler
HasMemberAllowedV462Duplicate Key in Associative List (Alist)
HasMemberAllowedB463Deletion of Data Structure Sentinel
HasMemberAllowedB464Addition of Data Structure Sentinel
HasMemberAllowedB483Incorrect Block Delimitation
HasMemberAllowedV595Comparison of Object References Instead of Object Contents
HasMemberAllowedV581Object Model Violation: Just One of Equals and Hashcode Defined
HasMemberAllowedV618Exposed Unsafe ActiveX Method
HasMemberAllowedB648Incorrect Use of Privileged APIs
HasMemberAllowed-with-ReviewC670Always-Incorrect Control Flow Implementation
HasMemberDiscouragedP682Incorrect Calculation
HasMemberDiscouragedP691Insufficient Control Flow Management
HasMemberAllowed-with-ReviewC696Incorrect Behavior Order
HasMemberDiscouragedP697Incorrect Comparison
HasMemberAllowedB698Execution After Redirect (EAR)
HasMemberAllowed-with-ReviewC705Incorrect Control Flow Scoping
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 888
Name: Software Fault Pattern (SFP) Clusters
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 115
Name: Misinterpretation of Input
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 187
Name: Partial String Comparison
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 188
Name: Reliance on Data/Memory Layout
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 193
Name: Off-by-one Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 349
Name: Acceptance of Extraneous Untrusted Data With Trusted Data
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 405
Name: Asymmetric Resource Consumption (Amplification)
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 406
Name: Insufficient Control of Network Message Volume (Network Amplification)
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 407
Name: Inefficient Algorithmic Complexity
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 408
Name: Incorrect Behavior Order: Early Amplification
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 409
Name: Improper Handling of Highly Compressed Data (Data Amplification)
Nature: HasMember
Mapping: Allowed
Type: Class
ID: 410
Name: Insufficient Resource Pool
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 430
Name: Deployment of Wrong Handler
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 462
Name: Duplicate Key in Associative List (Alist)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 463
Name: Deletion of Data Structure Sentinel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 464
Name: Addition of Data Structure Sentinel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 483
Name: Incorrect Block Delimitation
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 595
Name: Comparison of Object References Instead of Object Contents
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 581
Name: Object Model Violation: Just One of Equals and Hashcode Defined
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 618
Name: Exposed Unsafe ActiveX Method
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 648
Name: Incorrect Use of Privileged APIs
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 670
Name: Always-Incorrect Control Flow Implementation
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 682
Name: Incorrect Calculation
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 691
Name: Insufficient Control Flow Management
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 696
Name: Incorrect Behavior Order
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 697
Name: Incorrect Comparison
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 698
Name: Execution After Redirect (EAR)
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 705
Name: Incorrect Control Flow Scoping
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found