Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Separation of Privilege Strategy
ID:BOSS-280
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view (slice) displays Separation of Privilege strategy weaknesses.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedB1189Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
HasMemberAllowedB1191On-Chip Debug and Test Interface With Improper Access Control
HasMemberAllowedB1192Improper Identifier for IP Block used in System-On-Chip (SOC)
HasMemberAllowedB1386Insecure Operation on Windows Junction / Mount Point
HasMemberAllowedB15External Control of System or Configuration Setting
HasMemberDiscouragedC200Exposure of Sensitive Information to an Unauthorized Actor
HasMemberAllowedB201Insertion of Sensitive Information Into Sent Data
HasMemberAllowedB203Observable Discrepancy
HasMemberAllowedB204Observable Response Discrepancy
HasMemberAllowedB212Improper Removal of Sensitive Information Before Storage or Transfer
HasMemberAllowedB215Insertion of Sensitive Information Into Debugging Code
HasMemberAllowedB250Execution with Unnecessary Privileges
HasMemberAllowedB268Privilege Chaining
HasMemberDiscouragedC269Improper Privilege Management
HasMemberAllowedB270Privilege Context Switching Error
HasMemberAllowed-with-ReviewC271Privilege Dropping / Lowering Errors
HasMemberAllowedB272Least Privilege Violation
HasMemberAllowedB273Improper Check for Dropped Privileges
HasMemberAllowedB276Incorrect Default Permissions
HasMemberAllowedV277Insecure Inherited Permissions
HasMemberAllowedV278Insecure Preserved Inherited Permissions
HasMemberAllowedV279Incorrect Execution-Assigned Permissions
HasMemberAllowedB280Improper Handling of Insufficient Permissions or Privileges
HasMemberAllowedB283Unverified Ownership
HasMemberDiscouragedP284Improper Access Control
HasMemberDiscouragedC311Missing Encryption of Sensitive Data
HasMemberAllowedV382J2EE Bad Practices: Use of System.exit()
HasMemberAllowed-with-ReviewC406Insufficient Control of Network Message Volume (Network Amplification)
HasMemberAllowedB59Improper Link Resolution Before File Access ('Link Following')
HasMemberAllowedC61UNIX Symbolic Link (Symlink) Following
HasMemberAllowedV62UNIX Hard Link
HasMemberAllowedV64Windows Shortcut Following (.LNK)
HasMemberAllowedV65Windows Hard Link
HasMemberAllowedV651Exposure of WSDL File Containing Sensitive Information
HasMemberAllowedV926Improper Export of Android Application Components
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1189
Name: Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1191
Name: On-Chip Debug and Test Interface With Improper Access Control
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1192
Name: Improper Identifier for IP Block used in System-On-Chip (SOC)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1386
Name: Insecure Operation on Windows Junction / Mount Point
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 15
Name: External Control of System or Configuration Setting
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 200
Name: Exposure of Sensitive Information to an Unauthorized Actor
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 201
Name: Insertion of Sensitive Information Into Sent Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 203
Name: Observable Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 204
Name: Observable Response Discrepancy
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 212
Name: Improper Removal of Sensitive Information Before Storage or Transfer
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 215
Name: Insertion of Sensitive Information Into Debugging Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 250
Name: Execution with Unnecessary Privileges
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 268
Name: Privilege Chaining
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 269
Name: Improper Privilege Management
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 270
Name: Privilege Context Switching Error
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 271
Name: Privilege Dropping / Lowering Errors
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 272
Name: Least Privilege Violation
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 273
Name: Improper Check for Dropped Privileges
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 276
Name: Incorrect Default Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 277
Name: Insecure Inherited Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 278
Name: Insecure Preserved Inherited Permissions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 279
Name: Incorrect Execution-Assigned Permissions
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 280
Name: Improper Handling of Insufficient Permissions or Privileges
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 283
Name: Unverified Ownership
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 284
Name: Improper Access Control
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 311
Name: Missing Encryption of Sensitive Data
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 382
Name: J2EE Bad Practices: Use of System.exit()
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 406
Name: Insufficient Control of Network Message Volume (Network Amplification)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 59
Name: Improper Link Resolution Before File Access ('Link Following')
Nature: HasMember
Mapping: Allowed
Type: Compound
ID: 61
Name: UNIX Symbolic Link (Symlink) Following
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 62
Name: UNIX Hard Link
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 64
Name: Windows Shortcut Following (.LNK)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 65
Name: Windows Hard Link
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 651
Name: Exposure of WSDL File Containing Sensitive Information
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 926
Name: Improper Export of Android Application Components
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-280 - Separation of Privilege Strategy
Details not found