Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:DoS: Resource Consumption (CPU) (impact)
ID:BOSS-314
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view categorizes and displays weaknesses based on the 'DoS: Resource Consumption (CPU)' consequence impact.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowed-with-ReviewC1176Inefficient CPU Computation
HasMemberDiscouragedC119Improper Restriction of Operations within the Bounds of a Memory Buffer
HasMemberAllowed-with-ReviewB120Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
HasMemberAllowedV121Stack-based Buffer Overflow
HasMemberAllowedV122Heap-based Buffer Overflow
HasMemberAllowedB1235Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations
HasMemberAllowedB128Wrap-around Error
HasMemberAllowedB1313Hardware Allows Activation of Test or Debug Logic at Runtime
HasMemberAllowedB1322Use of Blocking Code in Single-threaded, Non-blocking Context
HasMemberAllowedB1333Inefficient Regular Expression Complexity
HasMemberAllowedB1334Unauthorized Error Injection Can Degrade Hardware Redundancy
HasMemberAllowedB135Incorrect Calculation of Multi-Byte String Length
HasMemberAllowedB170Improper Null Termination
HasMemberAllowedB190Integer Overflow or Wraparound
HasMemberAllowedB191Integer Underflow (Wrap or Wraparound)
HasMemberAllowedV192Integer Coercion Error
HasMemberAllowedB193Off-by-one Error
HasMemberDiscouragedC20Improper Input Validation
HasMemberAllowed-with-ReviewC228Improper Handling of Syntactically Invalid Structure
HasMemberAllowed-with-ReviewC362Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
HasMemberAllowedB395Use of NullPointerException Catch to Detect NULL Pointer Dereference
HasMemberDiscouragedC400Uncontrolled Resource Consumption
HasMemberAllowedV401Missing Release of Memory after Effective Lifetime
HasMemberAllowed-with-ReviewC405Asymmetric Resource Consumption (Amplification)
HasMemberAllowed-with-ReviewC406Insufficient Control of Network Message Volume (Network Amplification)
HasMemberAllowed-with-ReviewC407Inefficient Algorithmic Complexity
HasMemberAllowedB408Incorrect Behavior Order: Early Amplification
HasMemberAllowedB409Improper Handling of Highly Compressed Data (Data Amplification)
HasMemberAllowedB502Deserialization of Untrusted Data
HasMemberAllowedB606Unchecked Input for Loop Condition
HasMemberAllowedB611Improper Restriction of XML External Entity Reference
HasMemberAllowed-with-ReviewC667Improper Locking
HasMemberAllowed-with-ReviewC674Uncontrolled Recursion
HasMemberAllowedB764Multiple Locks of a Critical Resource
HasMemberAllowedB770Allocation of Resources Without Limits or Throttling
HasMemberAllowedB779Logging of Excessive Data
HasMemberAllowedB805Buffer Access with Incorrect Length Value
HasMemberAllowedV806Buffer Access Using Size of Source Buffer
HasMemberAllowedV827Improper Control of Document Type Definition
HasMemberAllowedB833Deadlock
HasMemberDiscouragedC834Excessive Iteration
HasMemberAllowedB835Loop with Unreachable Exit Condition ('Infinite Loop')
HasMemberAllowed-with-ReviewC862Missing Authorization
HasMemberAllowed-with-ReviewC863Incorrect Authorization
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1176
Name: Inefficient CPU Computation
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 119
Name: Improper Restriction of Operations within the Bounds of a Memory Buffer
Nature: HasMember
Mapping: Allowed-with-Review
Type: Base
ID: 120
Name: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 121
Name: Stack-based Buffer Overflow
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 122
Name: Heap-based Buffer Overflow
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1235
Name: Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 128
Name: Wrap-around Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1313
Name: Hardware Allows Activation of Test or Debug Logic at Runtime
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1322
Name: Use of Blocking Code in Single-threaded, Non-blocking Context
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1333
Name: Inefficient Regular Expression Complexity
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1334
Name: Unauthorized Error Injection Can Degrade Hardware Redundancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 135
Name: Incorrect Calculation of Multi-Byte String Length
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 170
Name: Improper Null Termination
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 190
Name: Integer Overflow or Wraparound
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 191
Name: Integer Underflow (Wrap or Wraparound)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 192
Name: Integer Coercion Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 193
Name: Off-by-one Error
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 20
Name: Improper Input Validation
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 228
Name: Improper Handling of Syntactically Invalid Structure
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 362
Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 395
Name: Use of NullPointerException Catch to Detect NULL Pointer Dereference
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 400
Name: Uncontrolled Resource Consumption
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 401
Name: Missing Release of Memory after Effective Lifetime
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 405
Name: Asymmetric Resource Consumption (Amplification)
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 406
Name: Insufficient Control of Network Message Volume (Network Amplification)
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 407
Name: Inefficient Algorithmic Complexity
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 408
Name: Incorrect Behavior Order: Early Amplification
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 409
Name: Improper Handling of Highly Compressed Data (Data Amplification)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 502
Name: Deserialization of Untrusted Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 606
Name: Unchecked Input for Loop Condition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 611
Name: Improper Restriction of XML External Entity Reference
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 667
Name: Improper Locking
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 674
Name: Uncontrolled Recursion
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 764
Name: Multiple Locks of a Critical Resource
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 770
Name: Allocation of Resources Without Limits or Throttling
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 779
Name: Logging of Excessive Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 805
Name: Buffer Access with Incorrect Length Value
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 806
Name: Buffer Access Using Size of Source Buffer
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 827
Name: Improper Control of Document Type Definition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 833
Name: Deadlock
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 834
Name: Excessive Iteration
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 835
Name: Loop with Unreachable Exit Condition ('Infinite Loop')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 862
Name: Missing Authorization
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 863
Name: Incorrect Authorization
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-314 - DoS: Resource Consumption (CPU) (impact)
Details not found