Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE CATEGORY:SFP Secondary Cluster: Feature
Category ID:995
Vulnerability Mapping:Prohibited
Status:Incomplete
DetailsContent HistoryObserved CVE ExamplesReports
▼Summary

This category identifies Software Fault Patterns (SFPs) within the Feature cluster.

▼Membership
NatureMappingTypeIDName
MemberOfProhibitedV888Software Fault Pattern (SFP) Clusters
HasMemberAllowedB450Multiple Interpretations of UI Input
HasMemberAllowedB447Unimplemented or Unsupported Feature in UI
HasMemberAllowedB448Obsolete Feature in UI
HasMemberAllowedB449The UI Performs the Wrong Action
HasMemberAllowed-with-ReviewC451User Interface (UI) Misrepresentation of Critical Information
HasMemberAllowedB549Missing Password Field Masking
HasMemberAllowed-with-ReviewC655Insufficient Psychological Acceptability
Nature: MemberOf
Mapping: Prohibited
Type: View
ID: 888
Name: Software Fault Pattern (SFP) Clusters
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 450
Name: Multiple Interpretations of UI Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 447
Name: Unimplemented or Unsupported Feature in UI
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 448
Name: Obsolete Feature in UI
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 449
Name: The UI Performs the Wrong Action
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 451
Name: User Interface (UI) Misrepresentation of Critical Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 549
Name: Missing Password Field Masking
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 655
Name: Insufficient Psychological Acceptability
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:
Rationale:

This entry is a Category. Using categories for mapping has been discouraged since 2019. Categories are informal organizational groupings of weaknesses that can help CWE users with data aggregation, navigation, and browsing. However, they are not weaknesses in themselves.

Comments:

See member weaknesses of this category.

▼Notes
▼Taxonomy Mappings
Taxonomy NameEntry IDFitEntry Name
▼References
Details not found