Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Reduce Performance (impact)
ID:BOSS-313
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view categorizes and displays weaknesses based on the 'Reduce Performance' consequence impact.

▼Memberships
NatureMappingTypeIDName
HasMemberProhibitedV1042Static Member Data Element outside of a Singleton Class Element
HasMemberProhibitedB1043Data Element Aggregating an Excessively Large Number of Non-Primitive Elements
HasMemberAllowedB1046Creation of Immutable Text Using String Concatenation
HasMemberAllowedB1049Excessive Data Query Operations in a Large Data Table
HasMemberAllowedB1050Excessive Platform Resource Consumption within a Loop
HasMemberProhibitedB1057Data Access Operations Outside of Expected Data Manager Component
HasMemberProhibitedB1060Excessive Number of Inefficient Server-Side Data Accesses
HasMemberProhibitedB1063Creation of Class Instance within a Static Code Block
HasMemberAllowedB1067Excessive Execution of Sequential Searches of Data Resource
HasMemberProhibitedB1072Data Resource Access without Use of Connection Pooling
HasMemberProhibitedB1073Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses
HasMemberAllowedB1089Large Data Table with Excessive Number of Indices
HasMemberAllowedB1091Use of Object without Invoking Destructor Method
HasMemberAllowed-with-ReviewC1093Excessively Complex Data Representation
HasMemberProhibitedB1094Excessive Index Range Scan for a Data Resource
HasMemberAllowed-with-ReviewC1120Excessive Code Complexity
HasMemberAllowed-with-ReviewC1164Irrelevant Code
HasMemberAllowed-with-ReviewC1176Inefficient CPU Computation
HasMemberAllowedB1235Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations
HasMemberAllowedB1304Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
HasMemberAllowedB1313Hardware Allows Activation of Test or Debug Logic at Runtime
HasMemberAllowedB1334Unauthorized Error Injection Can Degrade Hardware Redundancy
HasMemberAllowedV401Missing Release of Memory after Effective Lifetime
Nature: HasMember
Mapping: Prohibited
Type: Variant
ID: 1042
Name: Static Member Data Element outside of a Singleton Class Element
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1043
Name: Data Element Aggregating an Excessively Large Number of Non-Primitive Elements
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1046
Name: Creation of Immutable Text Using String Concatenation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1049
Name: Excessive Data Query Operations in a Large Data Table
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1050
Name: Excessive Platform Resource Consumption within a Loop
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1057
Name: Data Access Operations Outside of Expected Data Manager Component
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1060
Name: Excessive Number of Inefficient Server-Side Data Accesses
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1063
Name: Creation of Class Instance within a Static Code Block
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1067
Name: Excessive Execution of Sequential Searches of Data Resource
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1072
Name: Data Resource Access without Use of Connection Pooling
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1073
Name: Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1089
Name: Large Data Table with Excessive Number of Indices
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1091
Name: Use of Object without Invoking Destructor Method
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1093
Name: Excessively Complex Data Representation
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 1094
Name: Excessive Index Range Scan for a Data Resource
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1120
Name: Excessive Code Complexity
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1164
Name: Irrelevant Code
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1176
Name: Inefficient CPU Computation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1235
Name: Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1304
Name: Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1313
Name: Hardware Allows Activation of Test or Debug Logic at Runtime
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1334
Name: Unauthorized Error Injection Can Degrade Hardware Redundancy
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 401
Name: Missing Release of Memory after Effective Lifetime
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-313 - Reduce Performance (impact)
Details not found