Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Modify Application Data (impact)
ID:BOSS-318
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view categorizes and displays weaknesses based on the 'Modify Application Data' consequence impact.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedB1021Improper Restriction of Rendered UI Layers or Frames
HasMemberAllowedV113Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
HasMemberAllowed-with-ReviewC116Improper Encoding or Escaping of Output
HasMemberAllowedB117Improper Output Neutralization for Logs
HasMemberAllowedB1191On-Chip Debug and Test Interface With Improper Access Control
HasMemberAllowedV1255Comparison Logic is Vulnerable to Power Side-Channel Attacks
HasMemberAllowedB1256Improper Restriction of Software Interfaces to Hardware Features
HasMemberAllowedB1262Improper Access Control for Register Interface
HasMemberAllowedB1273Device Unlock Credential Sharing
HasMemberAllowedV1275Sensitive Cookie with Improper SameSite Attribute
HasMemberAllowedB1280Access Control Check Implemented After Asset is Accessed
HasMemberAllowedB1293Missing Source Correlation of Multiple Independent Data
HasMemberAllowedV1321Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
HasMemberAllowedB1339Insufficient Precision or Accuracy of a Real Number
HasMemberAllowedV1385Missing Origin Validation in WebSockets
HasMemberAllowedB1427Improper Neutralization of Input Used for LLM Prompting
HasMemberAllowedB1428Reliance on HTTP instead of HTTPS
HasMemberAllowedB276Incorrect Default Permissions
HasMemberAllowedV277Insecure Inherited Permissions
HasMemberAllowedV278Insecure Preserved Inherited Permissions
HasMemberAllowedV279Incorrect Execution-Assigned Permissions
HasMemberAllowedB281Improper Preservation of Permissions
HasMemberDiscouragedC285Improper Authorization
HasMemberDiscouragedC300Channel Accessible by Non-Endpoint
HasMemberDiscouragedC311Missing Encryption of Sensitive Data
HasMemberAllowedB325Missing Cryptographic Step
HasMemberAllowed-with-ReviewC327Use of a Broken or Risky Cryptographic Algorithm
HasMemberAllowedB347Improper Verification of Cryptographic Signature
HasMemberAllowedB349Acceptance of Extraneous Untrusted Data With Trusted Data
HasMemberAllowedC352Cross-Site Request Forgery (CSRF)
HasMemberAllowedB354Improper Validation of Integrity Check Value
HasMemberAllowedB364Signal Handler Race Condition
HasMemberAllowedB367Time-of-check Time-of-use (TOCTOU) Race Condition
HasMemberAllowedB368Context Switching Race Condition
HasMemberAllowedV370Missing Check for Certificate Revocation after Initial Check
HasMemberAllowedB386Symbolic Name not Mapping to Correct Object
HasMemberAllowedB403Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
HasMemberAllowedB413Improper Resource Locking
HasMemberAllowedB414Missing Lock Check
HasMemberAllowedB425Direct Request ('Forced Browsing')
HasMemberAllowedB432Dangerous Signal Handler not Disabled During Sensitive Operations
HasMemberAllowedV453Insecure Default Variable Initialization
HasMemberAllowedB454External Initialization of Trusted Variables or Data Stores
HasMemberAllowedB455Non-exit on Failed Initialization
HasMemberAllowedB459Incomplete Cleanup
HasMemberAllowedB464Addition of Data Structure Sentinel
HasMemberAllowedB471Modification of Assumed-Immutable Data (MAID)
HasMemberAllowedB472External Control of Assumed-Immutable Web Parameter
HasMemberAllowedV473PHP External Variable Modification
HasMemberAllowedV479Signal Handler Use of a Non-reentrant Function
HasMemberAllowedB487Reliance on Package-level Scope
HasMemberAllowedV493Critical Public Variable Without Final Modifier
HasMemberAllowedV495Private Data Structure Returned From A Public Method
HasMemberAllowedV496Public Data Assigned to Private Array-Typed Field
HasMemberAllowedV5J2EE Misconfiguration: Data Transmission Without Encryption
HasMemberAllowedV500Public Static Field Not Marked Final
HasMemberAllowedB502Deserialization of Untrusted Data
HasMemberAllowedV543Use of Singleton Pattern Without Synchronization in a Multithreaded Context
HasMemberAllowedV558Use of getlogin() in Multithreaded Application
HasMemberAllowedV564SQL Injection: Hibernate
HasMemberAllowedB565Reliance on Cookies without Validation and Integrity Checking
HasMemberAllowedV566Authorization Bypass Through User-Controlled SQL Primary Key
HasMemberAllowedB567Unsynchronized Access to Shared Data in a Multithreaded Context
HasMemberAllowedV582Array Declared Public, Final, and Static
HasMemberAllowedV583finalize() Method Declared Public
HasMemberAllowedV594J2EE Framework: Saving Unserializable Objects to Disk
HasMemberAllowedV607Public Static Final Field References Mutable Object
HasMemberAllowedV608Struts: Non-private Field in ActionForm Class
HasMemberAllowedB609Double-Checked Locking
HasMemberDiscouragedC610Externally Controlled Reference to a Resource in Another Sphere
HasMemberAllowedB619Dangling Database Cursor ('Cursor Injection')
HasMemberAllowedV621Variable Extraction Error
HasMemberAllowedV627Dynamic Variable Evaluation
HasMemberAllowedV650Trusting HTTP Permission Methods on the Server Side
HasMemberDiscouragedC662Improper Synchronization
HasMemberAllowedB663Use of a Non-reentrant Function in a Concurrent Context
HasMemberDiscouragedC668Exposure of Resource to Wrong Sphere
HasMemberAllowed-with-ReviewC669Incorrect Resource Transfer Between Spheres
HasMemberAllowed-with-ReviewC672Operation on a Resource after Expiration or Release
HasMemberAllowedC689Permission Race Condition During Resource Copy
HasMemberAllowed-with-ReviewC706Use of Incorrectly-Resolved Name or Reference
HasMemberAllowedB708Incorrect Ownership Assignment
HasMemberAllowed-with-ReviewC732Incorrect Permission Assignment for Critical Resource
HasMemberAllowedB749Exposed Dangerous Method or Function
HasMemberDiscouragedC75Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
HasMemberAllowedB766Critical Data Element Declared Public
HasMemberAllowedB767Access to Critical Private Variable via Public Method
HasMemberAllowedB78Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
HasMemberAllowedV8J2EE Misconfiguration: Entity Bean Declared Remote
HasMemberAllowedB820Missing Synchronization
HasMemberAllowedB821Incorrect Synchronization
HasMemberAllowedB826Premature Release of Resource During Expected Lifetime
HasMemberAllowedB838Inappropriate Encoding for Output Context
HasMemberAllowedB839Numeric Range Comparison Without Minimum Check
HasMemberAllowed-with-ReviewC862Missing Authorization
HasMemberAllowed-with-ReviewC863Incorrect Authorization
HasMemberAllowedB88Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
HasMemberAllowedB89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
HasMemberAllowedB90Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
HasMemberAllowedB91XML Injection (aka Blind XPath Injection)
HasMemberAllowedB914Improper Control of Dynamically-Identified Variables
HasMemberAllowedB915Improperly Controlled Modification of Dynamically-Determined Object Attributes
HasMemberAllowedB921Storage of Sensitive Data in a Mechanism without Access Control
HasMemberAllowed-with-ReviewC922Insecure Storage of Sensitive Information
HasMemberAllowedV926Improper Export of Android Application Components
HasMemberAllowedB93Improper Neutralization of CRLF Sequences ('CRLF Injection')
HasMemberAllowed-with-ReviewC943Improper Neutralization of Special Elements in Data Query Logic
HasMemberAllowed-with-ReviewC99Improper Control of Resource Identifiers ('Resource Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1021
Name: Improper Restriction of Rendered UI Layers or Frames
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 113
Name: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 116
Name: Improper Encoding or Escaping of Output
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 117
Name: Improper Output Neutralization for Logs
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1191
Name: On-Chip Debug and Test Interface With Improper Access Control
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1255
Name: Comparison Logic is Vulnerable to Power Side-Channel Attacks
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1256
Name: Improper Restriction of Software Interfaces to Hardware Features
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1262
Name: Improper Access Control for Register Interface
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1273
Name: Device Unlock Credential Sharing
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1275
Name: Sensitive Cookie with Improper SameSite Attribute
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1280
Name: Access Control Check Implemented After Asset is Accessed
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1293
Name: Missing Source Correlation of Multiple Independent Data
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1321
Name: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1339
Name: Insufficient Precision or Accuracy of a Real Number
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1385
Name: Missing Origin Validation in WebSockets
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1427
Name: Improper Neutralization of Input Used for LLM Prompting
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1428
Name: Reliance on HTTP instead of HTTPS
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 276
Name: Incorrect Default Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 277
Name: Insecure Inherited Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 278
Name: Insecure Preserved Inherited Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 279
Name: Incorrect Execution-Assigned Permissions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 281
Name: Improper Preservation of Permissions
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 285
Name: Improper Authorization
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 300
Name: Channel Accessible by Non-Endpoint
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 311
Name: Missing Encryption of Sensitive Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 325
Name: Missing Cryptographic Step
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 327
Name: Use of a Broken or Risky Cryptographic Algorithm
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 347
Name: Improper Verification of Cryptographic Signature
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 349
Name: Acceptance of Extraneous Untrusted Data With Trusted Data
Nature: HasMember
Mapping: Allowed
Type: Compound
ID: 352
Name: Cross-Site Request Forgery (CSRF)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 354
Name: Improper Validation of Integrity Check Value
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 364
Name: Signal Handler Race Condition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 367
Name: Time-of-check Time-of-use (TOCTOU) Race Condition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 368
Name: Context Switching Race Condition
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 370
Name: Missing Check for Certificate Revocation after Initial Check
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 386
Name: Symbolic Name not Mapping to Correct Object
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 403
Name: Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 413
Name: Improper Resource Locking
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 414
Name: Missing Lock Check
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 425
Name: Direct Request ('Forced Browsing')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 432
Name: Dangerous Signal Handler not Disabled During Sensitive Operations
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 453
Name: Insecure Default Variable Initialization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 454
Name: External Initialization of Trusted Variables or Data Stores
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 455
Name: Non-exit on Failed Initialization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 459
Name: Incomplete Cleanup
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 464
Name: Addition of Data Structure Sentinel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 471
Name: Modification of Assumed-Immutable Data (MAID)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 472
Name: External Control of Assumed-Immutable Web Parameter
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 473
Name: PHP External Variable Modification
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 479
Name: Signal Handler Use of a Non-reentrant Function
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 487
Name: Reliance on Package-level Scope
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 493
Name: Critical Public Variable Without Final Modifier
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 495
Name: Private Data Structure Returned From A Public Method
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 496
Name: Public Data Assigned to Private Array-Typed Field
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 5
Name: J2EE Misconfiguration: Data Transmission Without Encryption
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 500
Name: Public Static Field Not Marked Final
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 502
Name: Deserialization of Untrusted Data
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 543
Name: Use of Singleton Pattern Without Synchronization in a Multithreaded Context
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 558
Name: Use of getlogin() in Multithreaded Application
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 564
Name: SQL Injection: Hibernate
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 565
Name: Reliance on Cookies without Validation and Integrity Checking
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 566
Name: Authorization Bypass Through User-Controlled SQL Primary Key
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 567
Name: Unsynchronized Access to Shared Data in a Multithreaded Context
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 582
Name: Array Declared Public, Final, and Static
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 583
Name: finalize() Method Declared Public
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 594
Name: J2EE Framework: Saving Unserializable Objects to Disk
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 607
Name: Public Static Final Field References Mutable Object
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 608
Name: Struts: Non-private Field in ActionForm Class
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 609
Name: Double-Checked Locking
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 610
Name: Externally Controlled Reference to a Resource in Another Sphere
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 619
Name: Dangling Database Cursor ('Cursor Injection')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 621
Name: Variable Extraction Error
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 627
Name: Dynamic Variable Evaluation
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 650
Name: Trusting HTTP Permission Methods on the Server Side
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 662
Name: Improper Synchronization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 663
Name: Use of a Non-reentrant Function in a Concurrent Context
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 668
Name: Exposure of Resource to Wrong Sphere
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 669
Name: Incorrect Resource Transfer Between Spheres
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 672
Name: Operation on a Resource after Expiration or Release
Nature: HasMember
Mapping: Allowed
Type: Compound
ID: 689
Name: Permission Race Condition During Resource Copy
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 706
Name: Use of Incorrectly-Resolved Name or Reference
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 708
Name: Incorrect Ownership Assignment
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 732
Name: Incorrect Permission Assignment for Critical Resource
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 749
Name: Exposed Dangerous Method or Function
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 75
Name: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 766
Name: Critical Data Element Declared Public
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 767
Name: Access to Critical Private Variable via Public Method
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 78
Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 8
Name: J2EE Misconfiguration: Entity Bean Declared Remote
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 820
Name: Missing Synchronization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 821
Name: Incorrect Synchronization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 826
Name: Premature Release of Resource During Expected Lifetime
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 838
Name: Inappropriate Encoding for Output Context
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 839
Name: Numeric Range Comparison Without Minimum Check
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 862
Name: Missing Authorization
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 863
Name: Incorrect Authorization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 88
Name: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 89
Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 90
Name: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 91
Name: XML Injection (aka Blind XPath Injection)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 914
Name: Improper Control of Dynamically-Identified Variables
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 915
Name: Improperly Controlled Modification of Dynamically-Determined Object Attributes
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 921
Name: Storage of Sensitive Data in a Mechanism without Access Control
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 922
Name: Insecure Storage of Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 926
Name: Improper Export of Android Application Components
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 93
Name: Improper Neutralization of CRLF Sequences ('CRLF Injection')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 943
Name: Improper Neutralization of Special Elements in Data Query Logic
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 99
Name: Improper Control of Resource Identifiers ('Resource Injection')
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-318 - Modify Application Data (impact)
Details not found