Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Low likelihood of exploit
ID:BOSS-275
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view displays only Low likelihood of exploit weaknesses.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedB1037Processor Optimization Removal or Modification of Security-critical Code
HasMemberAllowed-with-ReviewC1038Insecure Automated Optimizations
HasMemberAllowedB188Reliance on Data/Memory Layout
HasMemberAllowedB197Numeric Truncation Error
HasMemberAllowedB252Unchecked Return Value
HasMemberAllowedB253Incorrect Check of Function Return Value
HasMemberAllowedB262Not Using Password Aging
HasMemberAllowedB263Password Aging with Long Expiration
HasMemberAllowedB296Improper Following of a Certificate's Chain of Trust
HasMemberAllowedV298Improper Validation of Certificate Expiration
HasMemberAllowedB324Use of a Key Past its Expiration Date
HasMemberAllowedV333Improper Handling of Insufficient Entropy in TRNG
HasMemberAllowedB379Creation of Temporary File in Directory with Insecure Permissions
HasMemberAllowed-with-ReviewC407Inefficient Algorithmic Complexity
HasMemberAllowedV462Duplicate Key in Associative List (Alist)
HasMemberAllowedV479Signal Handler Use of a Non-reentrant Function
HasMemberAllowedB480Use of Incorrect Operator
HasMemberAllowedV481Assigning instead of Comparing
HasMemberAllowedV482Comparing instead of Assigning
HasMemberAllowedB483Incorrect Block Delimitation
HasMemberAllowedB601URL Redirection to Untrusted Site ('Open Redirect')
HasMemberAllowedV64Windows Shortcut Following (.LNK)
HasMemberAllowedB641Improper Restriction of Names for Files and Other Resources
HasMemberAllowedB648Incorrect Use of Privileged APIs
HasMemberAllowedB749Exposed Dangerous Method or Function
HasMemberAllowedV762Mismatched Memory Management Routines
HasMemberAllowedV768Incorrect Short Circuit Evaluation
HasMemberAllowedV774Allocation of File Descriptors or Handles Without Limits or Throttling
HasMemberAllowedB779Logging of Excessive Data
HasMemberAllowedB783Operator Precedence Logic Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1037
Name: Processor Optimization Removal or Modification of Security-critical Code
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1038
Name: Insecure Automated Optimizations
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 188
Name: Reliance on Data/Memory Layout
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 197
Name: Numeric Truncation Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 252
Name: Unchecked Return Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 253
Name: Incorrect Check of Function Return Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 262
Name: Not Using Password Aging
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 263
Name: Password Aging with Long Expiration
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 296
Name: Improper Following of a Certificate's Chain of Trust
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 298
Name: Improper Validation of Certificate Expiration
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 324
Name: Use of a Key Past its Expiration Date
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 333
Name: Improper Handling of Insufficient Entropy in TRNG
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 379
Name: Creation of Temporary File in Directory with Insecure Permissions
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 407
Name: Inefficient Algorithmic Complexity
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 462
Name: Duplicate Key in Associative List (Alist)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 479
Name: Signal Handler Use of a Non-reentrant Function
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 480
Name: Use of Incorrect Operator
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 481
Name: Assigning instead of Comparing
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 482
Name: Comparing instead of Assigning
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 483
Name: Incorrect Block Delimitation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 601
Name: URL Redirection to Untrusted Site ('Open Redirect')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 64
Name: Windows Shortcut Following (.LNK)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 641
Name: Improper Restriction of Names for Files and Other Resources
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 648
Name: Incorrect Use of Privileged APIs
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 749
Name: Exposed Dangerous Method or Function
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 762
Name: Mismatched Memory Management Routines
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 768
Name: Incorrect Short Circuit Evaluation
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 774
Name: Allocation of File Descriptors or Handles Without Limits or Throttling
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 779
Name: Logging of Excessive Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 783
Name: Operator Precedence Logic Error
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-275 - Low likelihood of exploit
Details not found