Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Bypass Protection Mechanism (impact)
ID:BOSS-316
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view categorizes and displays weaknesses based on the 'Bypass Protection Mechanism' consequence impact.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedB1021Improper Restriction of Rendered UI Layers or Frames
HasMemberAllowed-with-ReviewC1023Incomplete Comparison with Missing Factors
HasMemberAllowedB1037Processor Optimization Removal or Modification of Security-critical Code
HasMemberAllowed-with-ReviewC1039Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
HasMemberAllowedV105Struts: Form Field Without Validator
HasMemberAllowedV109Struts: Validator Turned Off
HasMemberAllowedV111Direct Use of Unsafe JNI
HasMemberAllowed-with-ReviewC116Improper Encoding or Escaping of Output
HasMemberAllowedB1189Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
HasMemberAllowedB1190DMA Device Enabled Too Early in Boot Phase
HasMemberAllowedB1191On-Chip Debug and Test Interface With Improper Access Control
HasMemberAllowedB1192Improper Identifier for IP Block used in System-On-Chip (SOC)
HasMemberAllowedB1193Power-On of Untrusted Execution Core Before Enabling Fabric Access Control
HasMemberAllowedV121Stack-based Buffer Overflow
HasMemberAllowedV122Heap-based Buffer Overflow
HasMemberAllowedB1220Insufficient Granularity of Access Control
HasMemberAllowedB1223Race Condition for Write-Once Attributes
HasMemberAllowedB123Write-what-where Condition
HasMemberAllowedB1234Hardware Internal or Debug Modes Allow Override of Locks
HasMemberAllowedB124Buffer Underwrite ('Buffer Underflow')
HasMemberAllowedB1242Inclusion of Undocumented Features or Chicken Bits
HasMemberAllowedB1243Sensitive Non-Volatile Information Not Protected During Debug
HasMemberAllowedB1244Internal Asset Exposed to Unsafe Debug Access Level or State
HasMemberAllowedB1247Improper Protection Against Voltage and Clock Glitches
HasMemberAllowedB125Out-of-bounds Read
HasMemberAllowedB1253Incorrect Selection of Fuse Values
HasMemberAllowedB1254Incorrect Comparison Logic Granularity
HasMemberAllowedV1255Comparison Logic is Vulnerable to Power Side-Channel Attacks
HasMemberAllowedB1256Improper Restriction of Software Interfaces to Hardware Features
HasMemberAllowedB1258Exposure of Sensitive System Information Due to Uncleared Debug Information
HasMemberAllowedB1259Improper Restriction of Security Token Assignment
HasMemberAllowedV126Buffer Over-read
HasMemberAllowedB1261Improper Handling of Single Event Upsets
HasMemberAllowedB1262Improper Access Control for Register Interface
HasMemberAllowedB1267Policy Uses Obsolete Encoding
HasMemberAllowedB1268Policy Privileges are not Assigned Consistently Between Control and Data Agents
HasMemberAllowedV127Buffer Under-read
HasMemberAllowedB1270Generation of Incorrect Security Tokens
HasMemberAllowedB1273Device Unlock Credential Sharing
HasMemberAllowedB1277Firmware Not Updateable
HasMemberAllowedB128Wrap-around Error
HasMemberAllowedB1280Access Control Check Implemented After Asset is Accessed
HasMemberAllowedB1295Debug Messages Revealing Unnecessary Information
HasMemberAllowedB1296Incorrect Chaining or Granularity of Debug Components
HasMemberAllowedB1297Unprotected Confidential Information on Device is Accessible by OSAT Vendors
HasMemberAllowedB1298Hardware Logic Contains Race Conditions
HasMemberAllowedB1299Missing Protection Mechanism for Alternate Hardware Interface
HasMemberAllowedB1302Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
HasMemberAllowedB1304Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
HasMemberAllowedB1311Improper Translation of Security Attributes by Fabric Bridge
HasMemberAllowedB1312Missing Protection for Mirrored Regions in On-Chip Fabric Firewall
HasMemberAllowedB1313Hardware Allows Activation of Test or Debug Logic at Runtime
HasMemberAllowedB1315Improper Setting of Bus Controlling Capability in Fabric End-point
HasMemberAllowedB1316Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges
HasMemberAllowedB1317Improper Access Control in Fabric Bridge
HasMemberAllowedB1319Improper Protection against Electromagnetic Fault Injection (EM-FI)
HasMemberAllowedB1329Reliance on Component That is Not Updateable
HasMemberAllowedB1332Improper Handling of Faults that Lead to Instruction Skips
HasMemberAllowedV1385Missing Origin Validation in WebSockets
HasMemberAllowedB1389Incorrect Parsing of Numbers with Different Radices
HasMemberAllowedV14Compiler Removal of Code to Clear Buffers
HasMemberAllowedB168Improper Handling of Inconsistent Special Elements
HasMemberAllowedV173Improper Handling of Alternate Encoding
HasMemberAllowedV174Double Decoding of the Same Data
HasMemberAllowedB178Improper Handling of Case Sensitivity
HasMemberAllowedB179Incorrect Behavior Order: Early Validation
HasMemberAllowedV180Incorrect Behavior Order: Validate Before Canonicalize
HasMemberAllowedV181Incorrect Behavior Order: Validate Before Filter
HasMemberAllowedB182Collapse of Data into Unsafe Value
HasMemberAllowedB183Permissive List of Allowed Inputs
HasMemberAllowedB184Incomplete List of Disallowed Inputs
HasMemberAllowed-with-ReviewC185Incorrect Regular Expression
HasMemberAllowedB186Overly Restrictive Regular Expression
HasMemberAllowedV187Partial String Comparison
HasMemberAllowedB190Integer Overflow or Wraparound
HasMemberAllowedB191Integer Underflow (Wrap or Wraparound)
HasMemberAllowedB193Off-by-one Error
HasMemberAllowedV196Unsigned to Signed Conversion Error
HasMemberAllowedB203Observable Discrepancy
HasMemberAllowedB204Observable Response Discrepancy
HasMemberAllowedB205Observable Behavioral Discrepancy
HasMemberAllowedV206Observable Internal Behavioral Discrepancy
HasMemberAllowedV207Observable Behavioral Discrepancy With Equivalent Products
HasMemberAllowedB208Observable Timing Discrepancy
HasMemberAllowedB288Authentication Bypass Using an Alternate Path or Channel
HasMemberAllowedB289Authentication Bypass by Alternate Name
HasMemberAllowedB290Authentication Bypass by Spoofing
HasMemberAllowedB295Improper Certificate Validation
HasMemberAllowedB302Authentication Bypass by Assumed-Immutable Data
HasMemberAllowedB303Incorrect Implementation of Authentication Algorithm
HasMemberAllowedB304Missing Critical Step in Authentication
HasMemberAllowedB305Authentication Bypass by Primary Weakness
HasMemberAllowedB307Improper Restriction of Excessive Authentication Attempts
HasMemberAllowedB308Use of Single-factor Authentication
HasMemberAllowedB309Use of Password System for Primary Authentication
HasMemberAllowedV321Use of Hard-coded Cryptographic Key
HasMemberAllowedB322Key Exchange without Entity Authentication
HasMemberAllowedB323Reusing a Nonce, Key Pair in Encryption
HasMemberAllowedB324Use of a Key Past its Expiration Date
HasMemberAllowedB325Missing Cryptographic Step
HasMemberAllowed-with-ReviewC326Inadequate Encryption Strength
HasMemberAllowedB328Use of Weak Hash
HasMemberDiscouragedC330Use of Insufficiently Random Values
HasMemberAllowedB331Insufficient Entropy
HasMemberAllowedV332Insufficient Entropy in PRNG
HasMemberAllowedB334Small Space of Random Values
HasMemberAllowedB335Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
HasMemberAllowedV336Same Seed in Pseudo-Random Number Generator (PRNG)
HasMemberAllowedB338Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
HasMemberAllowedB348Use of Less Trusted Source
HasMemberAllowedB349Acceptance of Extraneous Untrusted Data With Trusted Data
HasMemberAllowedV350Reliance on Reverse DNS Resolution for a Security-Critical Action
HasMemberAllowedC352Cross-Site Request Forgery (CSRF)
HasMemberAllowedB358Improperly Implemented Security Check for Standard
HasMemberAllowed-with-ReviewC362Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
HasMemberDiscouragedC400Uncontrolled Resource Consumption
HasMemberAllowedB41Improper Resolution of Path Equivalence
HasMemberAllowedB419Unprotected Primary Channel
HasMemberAllowedV42Path Equivalence: 'filename.' (Trailing Dot)
HasMemberAllowedB420Unprotected Alternate Channel
HasMemberAllowedB421Race Condition During Access to Alternate Channel
HasMemberAllowedV422Unprotected Windows Messaging Channel ('Shatter')
HasMemberAllowed-with-ReviewC424Improper Protection of Alternate Path
HasMemberAllowedB444Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
HasMemberAllowed-with-ReviewC451User Interface (UI) Misrepresentation of Critical Information
HasMemberAllowedB489Active Debug Code
HasMemberAllowedV498Cloneable Class Containing Sensitive Information
HasMemberAllowedB501Trust Boundary Violation
HasMemberAllowedB510Trapdoor
HasMemberAllowed-with-ReviewC514Covert Channel
HasMemberAllowedV529Exposure of Access Control List Files to an Unauthorized Control Sphere
HasMemberAllowedB549Missing Password Field Masking
HasMemberAllowedB551Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
HasMemberAllowedV555J2EE Misconfiguration: Plaintext Password in Configuration File
HasMemberAllowedV558Use of getlogin() in Multithreaded Application
HasMemberAllowedV560Use of umask() with chmod-style Argument
HasMemberAllowedV566Authorization Bypass Through User-Controlled SQL Primary Key
HasMemberAllowedB59Improper Link Resolution Before File Access ('Link Following')
HasMemberAllowedV593Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
HasMemberAllowedV599Missing Validation of OpenSSL Certificate
HasMemberAllowedB601URL Redirection to Untrusted Site ('Open Redirect')
HasMemberAllowed-with-ReviewC602Client-Side Enforcement of Server-Side Security
HasMemberAllowedB603Use of Client-Side Authentication
HasMemberAllowedB611Improper Restriction of XML External Entity Reference
HasMemberAllowedB613Insufficient Session Expiration
HasMemberAllowedB620Unverified Password Change
HasMemberAllowedB625Permissive Regular Expression
HasMemberAllowed-with-ReviewC636Not Failing Securely ('Failing Open')
HasMemberAllowed-with-ReviewC638Not Using Complete Mediation
HasMemberAllowedB639Authorization Bypass Through User-Controlled Key
HasMemberAllowed-with-ReviewC642External Control of Critical State Data
HasMemberAllowedB643Improper Neutralization of Data within XPath Expressions ('XPath Injection')
HasMemberAllowedV647Use of Non-Canonical URL Paths for Authorization Decisions
HasMemberAllowedC653Improper Isolation or Compartmentalization
HasMemberAllowed-with-ReviewC655Insufficient Psychological Acceptability
HasMemberDiscouragedC665Improper Initialization
HasMemberDiscouragedP682Incorrect Calculation
HasMemberAllowedV69Improper Handling of Windows ::DATA Alternate Data Stream
HasMemberDiscouragedP693Protection Mechanism Failure
HasMemberAllowedB694Use of Multiple Resources with Duplicate Identifier
HasMemberAllowedB733Compiler Optimization Removal or Modification of Security-critical Code
HasMemberDiscouragedC74Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
HasMemberAllowedB757Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
HasMemberAllowedV759Use of a One-Way Hash without a Salt
HasMemberAllowedV760Use of a One-Way Hash with a Predictable Salt
HasMemberAllowedV777Regular Expression without Anchors
HasMemberAllowedV780Use of RSA Algorithm without OAEP
HasMemberAllowedV784Reliance on Cookies without Validation and Integrity Checking in a Security Decision
HasMemberAllowedB79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HasMemberAllowedB798Use of Hard-coded Credentials
HasMemberAllowed-with-ReviewC799Improper Control of Interaction Frequency
HasMemberAllowedB804Guessable CAPTCHA
HasMemberAllowedV806Buffer Access Using Size of Source Buffer
HasMemberAllowedB807Reliance on Untrusted Inputs in a Security Decision
HasMemberAllowedV831Signal Handler Function Associated with Multiple Signals
HasMemberAllowedB836Use of Password Hash Instead of Password for Authentication
HasMemberAllowed-with-ReviewC862Missing Authorization
HasMemberAllowed-with-ReviewC863Incorrect Authorization
HasMemberAllowedB89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
HasMemberAllowedB916Use of Password Hash With Insufficient Computational Effort
HasMemberAllowedB918Server-Side Request Forgery (SSRF)
HasMemberAllowed-with-ReviewB94Improper Control of Generation of Code ('Code Injection')
HasMemberAllowedV942Permissive Cross-domain Policy with Untrusted Domains
HasMemberAllowed-with-ReviewC943Improper Neutralization of Special Elements in Data Query Logic
HasMemberAllowedV95Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
HasMemberAllowedB96Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1021
Name: Improper Restriction of Rendered UI Layers or Frames
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1023
Name: Incomplete Comparison with Missing Factors
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1037
Name: Processor Optimization Removal or Modification of Security-critical Code
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1039
Name: Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 105
Name: Struts: Form Field Without Validator
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 109
Name: Struts: Validator Turned Off
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 111
Name: Direct Use of Unsafe JNI
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 116
Name: Improper Encoding or Escaping of Output
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1189
Name: Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1190
Name: DMA Device Enabled Too Early in Boot Phase
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1191
Name: On-Chip Debug and Test Interface With Improper Access Control
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1192
Name: Improper Identifier for IP Block used in System-On-Chip (SOC)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1193
Name: Power-On of Untrusted Execution Core Before Enabling Fabric Access Control
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 121
Name: Stack-based Buffer Overflow
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 122
Name: Heap-based Buffer Overflow
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1220
Name: Insufficient Granularity of Access Control
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1223
Name: Race Condition for Write-Once Attributes
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 123
Name: Write-what-where Condition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1234
Name: Hardware Internal or Debug Modes Allow Override of Locks
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 124
Name: Buffer Underwrite ('Buffer Underflow')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1242
Name: Inclusion of Undocumented Features or Chicken Bits
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1243
Name: Sensitive Non-Volatile Information Not Protected During Debug
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1244
Name: Internal Asset Exposed to Unsafe Debug Access Level or State
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1247
Name: Improper Protection Against Voltage and Clock Glitches
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 125
Name: Out-of-bounds Read
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1253
Name: Incorrect Selection of Fuse Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1254
Name: Incorrect Comparison Logic Granularity
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1255
Name: Comparison Logic is Vulnerable to Power Side-Channel Attacks
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1256
Name: Improper Restriction of Software Interfaces to Hardware Features
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1258
Name: Exposure of Sensitive System Information Due to Uncleared Debug Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1259
Name: Improper Restriction of Security Token Assignment
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 126
Name: Buffer Over-read
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1261
Name: Improper Handling of Single Event Upsets
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1262
Name: Improper Access Control for Register Interface
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1267
Name: Policy Uses Obsolete Encoding
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1268
Name: Policy Privileges are not Assigned Consistently Between Control and Data Agents
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 127
Name: Buffer Under-read
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1270
Name: Generation of Incorrect Security Tokens
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1273
Name: Device Unlock Credential Sharing
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1277
Name: Firmware Not Updateable
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 128
Name: Wrap-around Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1280
Name: Access Control Check Implemented After Asset is Accessed
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1295
Name: Debug Messages Revealing Unnecessary Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1296
Name: Incorrect Chaining or Granularity of Debug Components
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1297
Name: Unprotected Confidential Information on Device is Accessible by OSAT Vendors
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1298
Name: Hardware Logic Contains Race Conditions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1299
Name: Missing Protection Mechanism for Alternate Hardware Interface
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1302
Name: Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1304
Name: Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1311
Name: Improper Translation of Security Attributes by Fabric Bridge
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1312
Name: Missing Protection for Mirrored Regions in On-Chip Fabric Firewall
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1313
Name: Hardware Allows Activation of Test or Debug Logic at Runtime
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1315
Name: Improper Setting of Bus Controlling Capability in Fabric End-point
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1316
Name: Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1317
Name: Improper Access Control in Fabric Bridge
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1319
Name: Improper Protection against Electromagnetic Fault Injection (EM-FI)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1329
Name: Reliance on Component That is Not Updateable
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1332
Name: Improper Handling of Faults that Lead to Instruction Skips
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1385
Name: Missing Origin Validation in WebSockets
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1389
Name: Incorrect Parsing of Numbers with Different Radices
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 14
Name: Compiler Removal of Code to Clear Buffers
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 168
Name: Improper Handling of Inconsistent Special Elements
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 173
Name: Improper Handling of Alternate Encoding
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 174
Name: Double Decoding of the Same Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 178
Name: Improper Handling of Case Sensitivity
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 179
Name: Incorrect Behavior Order: Early Validation
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 180
Name: Incorrect Behavior Order: Validate Before Canonicalize
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 181
Name: Incorrect Behavior Order: Validate Before Filter
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 182
Name: Collapse of Data into Unsafe Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 183
Name: Permissive List of Allowed Inputs
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 184
Name: Incomplete List of Disallowed Inputs
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 185
Name: Incorrect Regular Expression
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 186
Name: Overly Restrictive Regular Expression
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 187
Name: Partial String Comparison
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 190
Name: Integer Overflow or Wraparound
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 191
Name: Integer Underflow (Wrap or Wraparound)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 193
Name: Off-by-one Error
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 196
Name: Unsigned to Signed Conversion Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 203
Name: Observable Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 204
Name: Observable Response Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 205
Name: Observable Behavioral Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 206
Name: Observable Internal Behavioral Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 207
Name: Observable Behavioral Discrepancy With Equivalent Products
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 208
Name: Observable Timing Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 288
Name: Authentication Bypass Using an Alternate Path or Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 289
Name: Authentication Bypass by Alternate Name
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 290
Name: Authentication Bypass by Spoofing
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 295
Name: Improper Certificate Validation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 302
Name: Authentication Bypass by Assumed-Immutable Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 303
Name: Incorrect Implementation of Authentication Algorithm
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 304
Name: Missing Critical Step in Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 305
Name: Authentication Bypass by Primary Weakness
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 307
Name: Improper Restriction of Excessive Authentication Attempts
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 308
Name: Use of Single-factor Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 309
Name: Use of Password System for Primary Authentication
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 321
Name: Use of Hard-coded Cryptographic Key
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 322
Name: Key Exchange without Entity Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 323
Name: Reusing a Nonce, Key Pair in Encryption
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 324
Name: Use of a Key Past its Expiration Date
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 325
Name: Missing Cryptographic Step
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 326
Name: Inadequate Encryption Strength
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 328
Name: Use of Weak Hash
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 330
Name: Use of Insufficiently Random Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 331
Name: Insufficient Entropy
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 332
Name: Insufficient Entropy in PRNG
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 334
Name: Small Space of Random Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 335
Name: Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 336
Name: Same Seed in Pseudo-Random Number Generator (PRNG)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 338
Name: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 348
Name: Use of Less Trusted Source
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 349
Name: Acceptance of Extraneous Untrusted Data With Trusted Data
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 350
Name: Reliance on Reverse DNS Resolution for a Security-Critical Action
Nature: HasMember
Mapping: Allowed
Type: Compound
ID: 352
Name: Cross-Site Request Forgery (CSRF)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 358
Name: Improperly Implemented Security Check for Standard
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 362
Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 400
Name: Uncontrolled Resource Consumption
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 41
Name: Improper Resolution of Path Equivalence
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 419
Name: Unprotected Primary Channel
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 42
Name: Path Equivalence: 'filename.' (Trailing Dot)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 420
Name: Unprotected Alternate Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 421
Name: Race Condition During Access to Alternate Channel
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 422
Name: Unprotected Windows Messaging Channel ('Shatter')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 424
Name: Improper Protection of Alternate Path
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 444
Name: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 451
Name: User Interface (UI) Misrepresentation of Critical Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 489
Name: Active Debug Code
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 498
Name: Cloneable Class Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 501
Name: Trust Boundary Violation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 510
Name: Trapdoor
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 514
Name: Covert Channel
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 529
Name: Exposure of Access Control List Files to an Unauthorized Control Sphere
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 549
Name: Missing Password Field Masking
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 551
Name: Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 555
Name: J2EE Misconfiguration: Plaintext Password in Configuration File
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 558
Name: Use of getlogin() in Multithreaded Application
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 560
Name: Use of umask() with chmod-style Argument
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 566
Name: Authorization Bypass Through User-Controlled SQL Primary Key
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 59
Name: Improper Link Resolution Before File Access ('Link Following')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 593
Name: Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 599
Name: Missing Validation of OpenSSL Certificate
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 601
Name: URL Redirection to Untrusted Site ('Open Redirect')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 602
Name: Client-Side Enforcement of Server-Side Security
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 603
Name: Use of Client-Side Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 611
Name: Improper Restriction of XML External Entity Reference
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 613
Name: Insufficient Session Expiration
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 620
Name: Unverified Password Change
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 625
Name: Permissive Regular Expression
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 636
Name: Not Failing Securely ('Failing Open')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 638
Name: Not Using Complete Mediation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 639
Name: Authorization Bypass Through User-Controlled Key
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 642
Name: External Control of Critical State Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 643
Name: Improper Neutralization of Data within XPath Expressions ('XPath Injection')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 647
Name: Use of Non-Canonical URL Paths for Authorization Decisions
Nature: HasMember
Mapping: Allowed
Type: Class
ID: 653
Name: Improper Isolation or Compartmentalization
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 655
Name: Insufficient Psychological Acceptability
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 665
Name: Improper Initialization
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 682
Name: Incorrect Calculation
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 69
Name: Improper Handling of Windows ::DATA Alternate Data Stream
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 693
Name: Protection Mechanism Failure
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 694
Name: Use of Multiple Resources with Duplicate Identifier
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 733
Name: Compiler Optimization Removal or Modification of Security-critical Code
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 74
Name: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 757
Name: Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 759
Name: Use of a One-Way Hash without a Salt
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 760
Name: Use of a One-Way Hash with a Predictable Salt
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 777
Name: Regular Expression without Anchors
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 780
Name: Use of RSA Algorithm without OAEP
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 784
Name: Reliance on Cookies without Validation and Integrity Checking in a Security Decision
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 79
Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 798
Name: Use of Hard-coded Credentials
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 799
Name: Improper Control of Interaction Frequency
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 804
Name: Guessable CAPTCHA
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 806
Name: Buffer Access Using Size of Source Buffer
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 807
Name: Reliance on Untrusted Inputs in a Security Decision
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 831
Name: Signal Handler Function Associated with Multiple Signals
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 836
Name: Use of Password Hash Instead of Password for Authentication
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 862
Name: Missing Authorization
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 863
Name: Incorrect Authorization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 89
Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 916
Name: Use of Password Hash With Insufficient Computational Effort
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 918
Name: Server-Side Request Forgery (SSRF)
Nature: HasMember
Mapping: Allowed-with-Review
Type: Base
ID: 94
Name: Improper Control of Generation of Code ('Code Injection')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 942
Name: Permissive Cross-domain Policy with Untrusted Domains
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 943
Name: Improper Neutralization of Special Elements in Data Query Logic
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 95
Name: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 96
Name: Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-316 - Bypass Protection Mechanism (impact)
Details not found