Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:SFP Secondary Cluster: Tainted Input to Variable
Category ID:994
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

This category identifies Software Fault Patterns (SFPs) within the Tainted Input to Variable cluster (SFP25).

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV888Software Fault Pattern (SFP) Clusters
HasMemberAllowedB15External Control of System or Configuration Setting
HasMemberDiscouragedC20Improper Input Validation
HasMemberAllowedB454External Initialization of Trusted Variables or Data Stores
HasMemberAllowedV496Public Data Assigned to Private Array-Typed Field
HasMemberAllowedB502Deserialization of Untrusted Data
HasMemberAllowedV566Authorization Bypass Through User-Controlled SQL Primary Key
HasMemberAllowedB606Unchecked Input for Loop Condition
HasMemberAllowedV616Incomplete Identification of Uploaded File Variables (PHP)
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 888
Name: Software Fault Pattern (SFP) Clusters
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 15
Name: External Control of System or Configuration Setting
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 20
Name: Improper Input Validation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 454
Name: External Initialization of Trusted Variables or Data Stores
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 496
Name: Public Data Assigned to Private Array-Typed Field
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 502
Name: Deserialization of Untrusted Data
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 566
Name: Authorization Bypass Through User-Controlled SQL Primary Key
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 606
Name: Unchecked Input for Loop Condition
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 616
Name: Incomplete Identification of Uploaded File Variables (PHP)
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found