Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Read Application Data (impact)
ID:BOSS-328
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view categorizes and displays weaknesses based on the 'Read Application Data' consequence impact.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedV1004Sensitive Cookie Without 'HttpOnly' Flag
HasMemberAllowedB1021Improper Restriction of Rendered UI Layers or Frames
HasMemberAllowed-with-ReviewC1039Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
HasMemberAllowedV11ASP.NET Misconfiguration: Creating Debug Binary
HasMemberAllowedB1191On-Chip Debug and Test Interface With Improper Access Control
HasMemberAllowedV12ASP.NET Misconfiguration: Missing Custom Error Page
HasMemberAllowedB1204Generation of Weak Initialization Vector (IV)
HasMemberAllowedB1236Improper Neutralization of Formula Elements in a CSV File
HasMemberAllowedB1240Use of a Cryptographic Primitive with a Risky Implementation
HasMemberAllowedB1241Use of Predictable Algorithm in Random Number Generator
HasMemberAllowedV1255Comparison Logic is Vulnerable to Power Side-Channel Attacks
HasMemberAllowedB1262Improper Access Control for Register Interface
HasMemberAllowedB1264Hardware Logic with Insecure De-Synchronization between Control and Data Channels
HasMemberAllowedB1272Sensitive Information Uncleared Before Debug/Power State Transition
HasMemberAllowedB1280Access Control Check Implemented After Asset is Accessed
HasMemberAllowedB1283Mutable Attestation or Measurement Reporting Data
HasMemberAllowedB1293Missing Source Correlation of Multiple Independent Data
HasMemberAllowedB1300Improper Protection of Physical Side Channels
HasMemberAllowedB1301Insufficient or Incomplete Data Removal within Hardware Component
HasMemberAllowedB1303Non-Transparent Sharing of Microarchitectural Resources
HasMemberAllowedB1339Insufficient Precision or Accuracy of a Real Number
HasMemberAllowedV1385Missing Origin Validation in WebSockets
HasMemberAllowedB1389Incorrect Parsing of Numbers with Different Radices
HasMemberAllowed-with-ReviewC1390Weak Authentication
HasMemberAllowed-with-ReviewC1419Incorrect Initialization of Resource
HasMemberAllowedB1427Improper Neutralization of Input Used for LLM Prompting
HasMemberAllowedB1428Reliance on HTTP instead of HTTPS
HasMemberAllowedB1431Driving Intermediate Cryptographic State/Results to Hardware Module Outputs
HasMemberDiscouragedC200Exposure of Sensitive Information to an Unauthorized Actor
HasMemberAllowedB201Insertion of Sensitive Information Into Sent Data
HasMemberAllowedB202Exposure of Sensitive Information Through Data Queries
HasMemberAllowedB203Observable Discrepancy
HasMemberAllowedB204Observable Response Discrepancy
HasMemberAllowedB205Observable Behavioral Discrepancy
HasMemberAllowedV206Observable Internal Behavioral Discrepancy
HasMemberAllowedV207Observable Behavioral Discrepancy With Equivalent Products
HasMemberAllowedB208Observable Timing Discrepancy
HasMemberAllowedB209Generation of Error Message Containing Sensitive Information
HasMemberAllowedB210Self-generated Error Message Containing Sensitive Information
HasMemberAllowedB211Externally-Generated Error Message Containing Sensitive Information
HasMemberAllowedB212Improper Removal of Sensitive Information Before Storage or Transfer
HasMemberAllowedB213Exposure of Sensitive Information Due to Incompatible Policies
HasMemberAllowedB214Invocation of Process Using Visible Sensitive Information
HasMemberAllowedB215Insertion of Sensitive Information Into Debugging Code
HasMemberAllowedV219Storage of File with Sensitive Data Under Web Root
HasMemberAllowedV220Storage of File With Sensitive Data Under FTP Root
HasMemberAllowedB226Sensitive Information in Resource Not Removed Before Reuse
HasMemberAllowedB248Uncaught Exception
HasMemberAllowedB250Execution with Unnecessary Privileges
HasMemberAllowedB272Least Privilege Violation
HasMemberAllowedB276Incorrect Default Permissions
HasMemberAllowedV277Insecure Inherited Permissions
HasMemberAllowedV278Insecure Preserved Inherited Permissions
HasMemberAllowedV279Incorrect Execution-Assigned Permissions
HasMemberAllowedB281Improper Preservation of Permissions
HasMemberDiscouragedC285Improper Authorization
HasMemberDiscouragedC287Improper Authentication
HasMemberAllowedB299Improper Check for Certificate Revocation
HasMemberDiscouragedC300Channel Accessible by Non-Endpoint
HasMemberAllowedB304Missing Critical Step in Authentication
HasMemberDiscouragedC311Missing Encryption of Sensitive Data
HasMemberAllowedB312Cleartext Storage of Sensitive Information
HasMemberAllowedV313Cleartext Storage in a File or on Disk
HasMemberAllowedV314Cleartext Storage in the Registry
HasMemberAllowedV315Cleartext Storage of Sensitive Information in a Cookie
HasMemberAllowedV317Cleartext Storage of Sensitive Information in GUI
HasMemberAllowedV318Cleartext Storage of Sensitive Information in Executable
HasMemberAllowedB319Cleartext Transmission of Sensitive Information
HasMemberAllowedV321Use of Hard-coded Cryptographic Key
HasMemberAllowedB322Key Exchange without Entity Authentication
HasMemberAllowedB325Missing Cryptographic Step
HasMemberAllowed-with-ReviewC326Inadequate Encryption Strength
HasMemberAllowed-with-ReviewC327Use of a Broken or Risky Cryptographic Algorithm
HasMemberAllowedV329Generation of Predictable IV with CBC Mode
HasMemberAllowedC352Cross-Site Request Forgery (CSRF)
HasMemberAllowedB359Exposure of Private Personal Information to an Unauthorized Actor
HasMemberAllowed-with-ReviewC362Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
HasMemberAllowedB368Context Switching Race Condition
HasMemberAllowedV370Missing Check for Certificate Revocation after Initial Check
HasMemberAllowedB378Creation of Temporary File With Insecure Permissions
HasMemberAllowedB379Creation of Temporary File in Directory with Insecure Permissions
HasMemberAllowedB385Covert Timing Channel
HasMemberAllowedB386Symbolic Name not Mapping to Correct Object
HasMemberAllowed-with-ReviewC402Transmission of Private Resources into a New Sphere ('Resource Leak')
HasMemberAllowedB403Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
HasMemberAllowed-with-ReviewC404Improper Resource Shutdown or Release
HasMemberAllowedB425Direct Request ('Forced Browsing')
HasMemberAllowedV433Unparsed Raw Web Content Delivery
HasMemberAllowedB459Incomplete Cleanup
HasMemberAllowedB470Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
HasMemberAllowedB487Reliance on Package-level Scope
HasMemberAllowedB488Exposure of Data Element to Wrong Session
HasMemberAllowedB489Active Debug Code
HasMemberAllowedV492Use of Inner Class Containing Sensitive Data
HasMemberAllowedV493Critical Public Variable Without Final Modifier
HasMemberAllowedB497Exposure of Sensitive System Information to an Unauthorized Control Sphere
HasMemberAllowedV499Serializable Class Containing Sensitive Data
HasMemberAllowedV5J2EE Misconfiguration: Data Transmission Without Encryption
HasMemberAllowedV500Public Static Field Not Marked Final
HasMemberAllowedB512Spyware
HasMemberAllowed-with-ReviewC514Covert Channel
HasMemberAllowedB515Covert Storage Channel
HasMemberAllowedB524Use of Cache Containing Sensitive Information
HasMemberAllowedV525Use of Web Browser Cache Containing Sensitive Information
HasMemberAllowedV526Cleartext Storage of Sensitive Information in an Environment Variable
HasMemberAllowedV527Exposure of Version-Control Repository to an Unauthorized Control Sphere
HasMemberAllowedV528Exposure of Core Dump File to an Unauthorized Control Sphere
HasMemberAllowedV529Exposure of Access Control List Files to an Unauthorized Control Sphere
HasMemberAllowedV530Exposure of Backup File to an Unauthorized Control Sphere
HasMemberAllowedV531Inclusion of Sensitive Information in Test Code
HasMemberAllowedB532Insertion of Sensitive Information into Log File
HasMemberAllowedV535Exposure of Information Through Shell Error Message
HasMemberAllowedV536Servlet Runtime Error Message Containing Sensitive Information
HasMemberAllowedV537Java Runtime Error Message Containing Sensitive Information
HasMemberAllowedV539Use of Persistent Cookies Containing Sensitive Information
HasMemberAllowedB540Inclusion of Sensitive Information in Source Code
HasMemberAllowedV541Inclusion of Sensitive Information in an Include File
HasMemberAllowedV550Server-generated Error Message Containing Sensitive Information
HasMemberAllowedV564SQL Injection: Hibernate
HasMemberAllowedV566Authorization Bypass Through User-Controlled SQL Primary Key
HasMemberAllowedB567Unsynchronized Access to Shared Data in a Multithreaded Context
HasMemberAllowedV591Sensitive Data Storage in Improperly Locked Memory
HasMemberAllowedV593Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
HasMemberAllowedV598Use of GET Request Method With Sensitive Query Strings
HasMemberAllowedV599Missing Validation of OpenSSL Certificate
HasMemberAllowedV600Uncaught Exception in Servlet
HasMemberAllowedV605Multiple Binds to the Same Port
HasMemberAllowedV608Struts: Non-private Field in ActionForm Class
HasMemberDiscouragedC610Externally Controlled Reference to a Resource in Another Sphere
HasMemberAllowedB611Improper Restriction of XML External Entity Reference
HasMemberAllowedB612Improper Authorization of Index Containing Sensitive Information
HasMemberAllowedV614Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
HasMemberAllowedV615Inclusion of Sensitive Information in Source Code Comments
HasMemberAllowedB619Dangling Database Cursor ('Cursor Injection')
HasMemberAllowed-with-ReviewC638Not Using Complete Mediation
HasMemberAllowedB641Improper Restriction of Names for Files and Other Resources
HasMemberAllowed-with-ReviewC642External Control of Critical State Data
HasMemberAllowedB643Improper Neutralization of Data within XPath Expressions ('XPath Injection')
HasMemberAllowedV644Improper Neutralization of HTTP Headers for Scripting Syntax
HasMemberAllowedV646Reliance on File Name or Extension of Externally-Supplied File
HasMemberAllowedB648Incorrect Use of Privileged APIs
HasMemberAllowedV650Trusting HTTP Permission Methods on the Server Side
HasMemberAllowedV651Exposure of WSDL File Containing Sensitive Information
HasMemberAllowedB652Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')
HasMemberDiscouragedC662Improper Synchronization
HasMemberAllowedB663Use of a Non-reentrant Function in a Concurrent Context
HasMemberDiscouragedC665Improper Initialization
HasMemberDiscouragedC668Exposure of Resource to Wrong Sphere
HasMemberAllowed-with-ReviewC669Incorrect Resource Transfer Between Spheres
HasMemberAllowedV67Improper Handling of Windows Device Names
HasMemberAllowed-with-ReviewC672Operation on a Resource after Expiration or Release
HasMemberAllowed-with-ReviewC674Uncontrolled Recursion
HasMemberAllowedC689Permission Race Condition During Resource Copy
HasMemberAllowedV7J2EE Misconfiguration: Missing Custom Error Page
HasMemberDiscouragedP703Improper Check or Handling of Exceptional Conditions
HasMemberAllowed-with-ReviewC706Use of Incorrectly-Resolved Name or Reference
HasMemberAllowedB708Incorrect Ownership Assignment
HasMemberAllowed-with-ReviewC732Incorrect Permission Assignment for Critical Resource
HasMemberDiscouragedC74Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
HasMemberAllowedB749Exposed Dangerous Method or Function
HasMemberAllowedB756Missing Custom Error Page
HasMemberAllowedB766Critical Data Element Declared Public
HasMemberAllowedB78Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
HasMemberAllowedB79Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
HasMemberAllowedB798Use of Hard-coded Credentials
HasMemberAllowedV8J2EE Misconfiguration: Entity Bean Declared Remote
HasMemberAllowedV80Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
HasMemberAllowedV81Improper Neutralization of Script in an Error Message Web Page
HasMemberAllowedV82Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
HasMemberAllowedB820Missing Synchronization
HasMemberAllowedB821Incorrect Synchronization
HasMemberAllowedB826Premature Release of Resource During Expected Lifetime
HasMemberAllowedV83Improper Neutralization of Script in Attributes in a Web Page
HasMemberAllowedV831Signal Handler Function Associated with Multiple Signals
HasMemberAllowedV85Doubled Character XSS Manipulations
HasMemberAllowedV86Improper Neutralization of Invalid Characters in Identifiers in Web Pages
HasMemberAllowed-with-ReviewC862Missing Authorization
HasMemberAllowed-with-ReviewC863Incorrect Authorization
HasMemberAllowedV87Improper Neutralization of Alternate XSS Syntax
HasMemberAllowedB88Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
HasMemberAllowedB89Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
HasMemberAllowedB90Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
HasMemberAllowedB908Use of Uninitialized Resource
HasMemberAllowed-with-ReviewC909Missing Initialization of Resource
HasMemberAllowedB91XML Injection (aka Blind XPath Injection)
HasMemberAllowedB917Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
HasMemberAllowedB918Server-Side Request Forgery (SSRF)
HasMemberAllowedB921Storage of Sensitive Data in a Mechanism without Access Control
HasMemberAllowed-with-ReviewC922Insecure Storage of Sensitive Information
HasMemberAllowedV926Improper Export of Android Application Components
HasMemberAllowedV927Use of Implicit Intent for Sensitive Communication
HasMemberAllowedV942Permissive Cross-domain Policy with Untrusted Domains
HasMemberAllowed-with-ReviewC943Improper Neutralization of Special Elements in Data Query Logic
HasMemberAllowedV95Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
HasMemberAllowedB96Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
HasMemberAllowed-with-ReviewC99Improper Control of Resource Identifiers ('Resource Injection')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1004
Name: Sensitive Cookie Without 'HttpOnly' Flag
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1021
Name: Improper Restriction of Rendered UI Layers or Frames
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1039
Name: Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 11
Name: ASP.NET Misconfiguration: Creating Debug Binary
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1191
Name: On-Chip Debug and Test Interface With Improper Access Control
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 12
Name: ASP.NET Misconfiguration: Missing Custom Error Page
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1204
Name: Generation of Weak Initialization Vector (IV)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1236
Name: Improper Neutralization of Formula Elements in a CSV File
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1240
Name: Use of a Cryptographic Primitive with a Risky Implementation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1241
Name: Use of Predictable Algorithm in Random Number Generator
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1255
Name: Comparison Logic is Vulnerable to Power Side-Channel Attacks
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1262
Name: Improper Access Control for Register Interface
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1264
Name: Hardware Logic with Insecure De-Synchronization between Control and Data Channels
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1272
Name: Sensitive Information Uncleared Before Debug/Power State Transition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1280
Name: Access Control Check Implemented After Asset is Accessed
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1283
Name: Mutable Attestation or Measurement Reporting Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1293
Name: Missing Source Correlation of Multiple Independent Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1300
Name: Improper Protection of Physical Side Channels
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1301
Name: Insufficient or Incomplete Data Removal within Hardware Component
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1303
Name: Non-Transparent Sharing of Microarchitectural Resources
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1339
Name: Insufficient Precision or Accuracy of a Real Number
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1385
Name: Missing Origin Validation in WebSockets
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1389
Name: Incorrect Parsing of Numbers with Different Radices
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1390
Name: Weak Authentication
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1419
Name: Incorrect Initialization of Resource
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1427
Name: Improper Neutralization of Input Used for LLM Prompting
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1428
Name: Reliance on HTTP instead of HTTPS
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1431
Name: Driving Intermediate Cryptographic State/Results to Hardware Module Outputs
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 200
Name: Exposure of Sensitive Information to an Unauthorized Actor
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 201
Name: Insertion of Sensitive Information Into Sent Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 202
Name: Exposure of Sensitive Information Through Data Queries
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 203
Name: Observable Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 204
Name: Observable Response Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 205
Name: Observable Behavioral Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 206
Name: Observable Internal Behavioral Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 207
Name: Observable Behavioral Discrepancy With Equivalent Products
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 208
Name: Observable Timing Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 209
Name: Generation of Error Message Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 210
Name: Self-generated Error Message Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 211
Name: Externally-Generated Error Message Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 212
Name: Improper Removal of Sensitive Information Before Storage or Transfer
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 213
Name: Exposure of Sensitive Information Due to Incompatible Policies
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 214
Name: Invocation of Process Using Visible Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 215
Name: Insertion of Sensitive Information Into Debugging Code
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 219
Name: Storage of File with Sensitive Data Under Web Root
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 220
Name: Storage of File With Sensitive Data Under FTP Root
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 226
Name: Sensitive Information in Resource Not Removed Before Reuse
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 248
Name: Uncaught Exception
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 250
Name: Execution with Unnecessary Privileges
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 272
Name: Least Privilege Violation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 276
Name: Incorrect Default Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 277
Name: Insecure Inherited Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 278
Name: Insecure Preserved Inherited Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 279
Name: Incorrect Execution-Assigned Permissions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 281
Name: Improper Preservation of Permissions
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 285
Name: Improper Authorization
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 287
Name: Improper Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 299
Name: Improper Check for Certificate Revocation
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 300
Name: Channel Accessible by Non-Endpoint
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 304
Name: Missing Critical Step in Authentication
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 311
Name: Missing Encryption of Sensitive Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 312
Name: Cleartext Storage of Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 313
Name: Cleartext Storage in a File or on Disk
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 314
Name: Cleartext Storage in the Registry
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 315
Name: Cleartext Storage of Sensitive Information in a Cookie
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 317
Name: Cleartext Storage of Sensitive Information in GUI
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 318
Name: Cleartext Storage of Sensitive Information in Executable
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 319
Name: Cleartext Transmission of Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 321
Name: Use of Hard-coded Cryptographic Key
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 322
Name: Key Exchange without Entity Authentication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 325
Name: Missing Cryptographic Step
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 326
Name: Inadequate Encryption Strength
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 327
Name: Use of a Broken or Risky Cryptographic Algorithm
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 329
Name: Generation of Predictable IV with CBC Mode
Nature: HasMember
Mapping: Allowed
Type: Compound
ID: 352
Name: Cross-Site Request Forgery (CSRF)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 359
Name: Exposure of Private Personal Information to an Unauthorized Actor
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 362
Name: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 368
Name: Context Switching Race Condition
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 370
Name: Missing Check for Certificate Revocation after Initial Check
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 378
Name: Creation of Temporary File With Insecure Permissions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 379
Name: Creation of Temporary File in Directory with Insecure Permissions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 385
Name: Covert Timing Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 386
Name: Symbolic Name not Mapping to Correct Object
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 402
Name: Transmission of Private Resources into a New Sphere ('Resource Leak')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 403
Name: Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 404
Name: Improper Resource Shutdown or Release
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 425
Name: Direct Request ('Forced Browsing')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 433
Name: Unparsed Raw Web Content Delivery
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 459
Name: Incomplete Cleanup
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 470
Name: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 487
Name: Reliance on Package-level Scope
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 488
Name: Exposure of Data Element to Wrong Session
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 489
Name: Active Debug Code
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 492
Name: Use of Inner Class Containing Sensitive Data
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 493
Name: Critical Public Variable Without Final Modifier
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 497
Name: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 499
Name: Serializable Class Containing Sensitive Data
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 5
Name: J2EE Misconfiguration: Data Transmission Without Encryption
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 500
Name: Public Static Field Not Marked Final
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 512
Name: Spyware
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 514
Name: Covert Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 515
Name: Covert Storage Channel
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 524
Name: Use of Cache Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 525
Name: Use of Web Browser Cache Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 526
Name: Cleartext Storage of Sensitive Information in an Environment Variable
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 527
Name: Exposure of Version-Control Repository to an Unauthorized Control Sphere
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 528
Name: Exposure of Core Dump File to an Unauthorized Control Sphere
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 529
Name: Exposure of Access Control List Files to an Unauthorized Control Sphere
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 530
Name: Exposure of Backup File to an Unauthorized Control Sphere
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 531
Name: Inclusion of Sensitive Information in Test Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 532
Name: Insertion of Sensitive Information into Log File
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 535
Name: Exposure of Information Through Shell Error Message
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 536
Name: Servlet Runtime Error Message Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 537
Name: Java Runtime Error Message Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 539
Name: Use of Persistent Cookies Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 540
Name: Inclusion of Sensitive Information in Source Code
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 541
Name: Inclusion of Sensitive Information in an Include File
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 550
Name: Server-generated Error Message Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 564
Name: SQL Injection: Hibernate
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 566
Name: Authorization Bypass Through User-Controlled SQL Primary Key
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 567
Name: Unsynchronized Access to Shared Data in a Multithreaded Context
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 591
Name: Sensitive Data Storage in Improperly Locked Memory
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 593
Name: Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 598
Name: Use of GET Request Method With Sensitive Query Strings
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 599
Name: Missing Validation of OpenSSL Certificate
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 600
Name: Uncaught Exception in Servlet
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 605
Name: Multiple Binds to the Same Port
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 608
Name: Struts: Non-private Field in ActionForm Class
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 610
Name: Externally Controlled Reference to a Resource in Another Sphere
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 611
Name: Improper Restriction of XML External Entity Reference
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 612
Name: Improper Authorization of Index Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 614
Name: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 615
Name: Inclusion of Sensitive Information in Source Code Comments
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 619
Name: Dangling Database Cursor ('Cursor Injection')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 638
Name: Not Using Complete Mediation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 641
Name: Improper Restriction of Names for Files and Other Resources
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 642
Name: External Control of Critical State Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 643
Name: Improper Neutralization of Data within XPath Expressions ('XPath Injection')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 644
Name: Improper Neutralization of HTTP Headers for Scripting Syntax
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 646
Name: Reliance on File Name or Extension of Externally-Supplied File
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 648
Name: Incorrect Use of Privileged APIs
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 650
Name: Trusting HTTP Permission Methods on the Server Side
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 651
Name: Exposure of WSDL File Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 652
Name: Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 662
Name: Improper Synchronization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 663
Name: Use of a Non-reentrant Function in a Concurrent Context
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 665
Name: Improper Initialization
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 668
Name: Exposure of Resource to Wrong Sphere
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 669
Name: Incorrect Resource Transfer Between Spheres
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 67
Name: Improper Handling of Windows Device Names
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 672
Name: Operation on a Resource after Expiration or Release
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 674
Name: Uncontrolled Recursion
Nature: HasMember
Mapping: Allowed
Type: Compound
ID: 689
Name: Permission Race Condition During Resource Copy
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 7
Name: J2EE Misconfiguration: Missing Custom Error Page
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 703
Name: Improper Check or Handling of Exceptional Conditions
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 706
Name: Use of Incorrectly-Resolved Name or Reference
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 708
Name: Incorrect Ownership Assignment
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 732
Name: Incorrect Permission Assignment for Critical Resource
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 74
Name: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 749
Name: Exposed Dangerous Method or Function
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 756
Name: Missing Custom Error Page
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 766
Name: Critical Data Element Declared Public
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 78
Name: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 79
Name: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 798
Name: Use of Hard-coded Credentials
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 8
Name: J2EE Misconfiguration: Entity Bean Declared Remote
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 80
Name: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 81
Name: Improper Neutralization of Script in an Error Message Web Page
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 82
Name: Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 820
Name: Missing Synchronization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 821
Name: Incorrect Synchronization
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 826
Name: Premature Release of Resource During Expected Lifetime
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 83
Name: Improper Neutralization of Script in Attributes in a Web Page
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 831
Name: Signal Handler Function Associated with Multiple Signals
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 85
Name: Doubled Character XSS Manipulations
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 86
Name: Improper Neutralization of Invalid Characters in Identifiers in Web Pages
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 862
Name: Missing Authorization
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 863
Name: Incorrect Authorization
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 87
Name: Improper Neutralization of Alternate XSS Syntax
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 88
Name: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 89
Name: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 90
Name: Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 908
Name: Use of Uninitialized Resource
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 909
Name: Missing Initialization of Resource
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 91
Name: XML Injection (aka Blind XPath Injection)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 917
Name: Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 918
Name: Server-Side Request Forgery (SSRF)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 921
Name: Storage of Sensitive Data in a Mechanism without Access Control
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 922
Name: Insecure Storage of Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 926
Name: Improper Export of Android Application Components
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 927
Name: Use of Implicit Intent for Sensitive Communication
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 942
Name: Permissive Cross-domain Policy with Untrusted Domains
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 943
Name: Improper Neutralization of Special Elements in Data Query Logic
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 95
Name: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 96
Name: Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 99
Name: Improper Control of Resource Identifiers ('Resource Injection')
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-328 - Read Application Data (impact)
Details not found