Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Varies by Context (impact)
ID:BOSS-326
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view categorizes and displays weaknesses based on the 'Varies by Context' consequence impact.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedB1024Comparison of Incompatible Types
HasMemberAllowedB1025Comparison Using Wrong Factors
HasMemberAllowed-with-ReviewC1039Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
HasMemberProhibitedC1059Insufficient Technical Documentation
HasMemberDiscouragedC118Incorrect Access of Indexable Resource ('Range Error')
HasMemberAllowedB1209Failure to Disable Reserved Bits
HasMemberAllowedB1221Incorrect Register Defaults or Module Parameters
HasMemberAllowedB1224Improper Restriction of Write-Once Bit Fields
HasMemberAllowedV1239Improper Zeroization of Hardware Register
HasMemberAllowedB1249Application-Level Admin Tool with Inconsistent View of Underlying Operating System
HasMemberAllowedB125Out-of-bounds Read
HasMemberAllowedB1251Mirrored Regions with Different Values
HasMemberAllowed-with-ReviewC1263Improper Physical Access Control
HasMemberAllowedB1271Uninitialized Value on Reset for Registers Holding Security Settings
HasMemberAllowedB1276Hardware Child Block Incorrectly Connected to Parent System
HasMemberAllowedB1278Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
HasMemberAllowedB1279Cryptographic Operations are run Before Supporting Units are Ready
HasMemberAllowedB1281Sequence of Processor Instructions Leads to Unexpected Behavior
HasMemberAllowedB1282Assumed-Immutable Data is Stored in Writable Memory
HasMemberAllowedB1284Improper Validation of Specified Quantity in Input
HasMemberAllowedB1285Improper Validation of Specified Index, Position, or Offset in Input
HasMemberAllowedB1286Improper Validation of Syntactic Correctness of Input
HasMemberAllowedB1287Improper Validation of Specified Type of Input
HasMemberAllowedB1288Improper Validation of Consistency within Input
HasMemberAllowedB1289Improper Validation of Unsafe Equivalence in Input
HasMemberAllowedB1291Public Key Re-Use for Signing both Debug and Production Code
HasMemberAllowedB1295Debug Messages Revealing Unnecessary Information
HasMemberAllowedB130Improper Handling of Length Parameter Inconsistency
HasMemberAllowedB1310Missing Ability to Patch ROM Code
HasMemberAllowedB1331Improper Isolation of Shared Resources in Network On Chip (NoC)
HasMemberAllowedB1351Improper Handling of Hardware Behavior in Exceptionally Cold Environments
HasMemberAllowed-with-ReviewC1384Improper Handling of Physical or Environmental Conditions
HasMemberAllowedV1385Missing Origin Validation in WebSockets
HasMemberAllowed-with-ReviewC1395Dependency on Vulnerable Third-Party Component
HasMemberAllowed-with-ReviewC1419Incorrect Initialization of Resource
HasMemberDiscouragedB1426Improper Validation of Generative AI Output
HasMemberAllowedB1427Improper Neutralization of Input Used for LLM Prompting
HasMemberAllowedB15External Control of System or Configuration Setting
HasMemberAllowedV174Double Decoding of the Same Data
HasMemberAllowed-with-ReviewC185Incorrect Regular Expression
HasMemberAllowedV239Failure to Handle Incomplete Element
HasMemberAllowedB240Improper Handling of Inconsistent Structural Elements
HasMemberAllowedB241Improper Handling of Unexpected Data Type
HasMemberAllowedB242Use of Inherently Dangerous Function
HasMemberDiscouragedP284Improper Access Control
HasMemberAllowed-with-ReviewC286Incorrect User Management
HasMemberAllowedB306Missing Authentication for Critical Function
HasMemberAllowedV337Predictable Seed in Pseudo-Random Number Generator (PRNG)
HasMemberAllowedV339Small Seed Space in PRNG
HasMemberAllowed-with-ReviewC340Generation of Predictable Numbers or Identifiers
HasMemberAllowedB341Predictable from Observable State
HasMemberAllowedB342Predictable Exact Value from Previous Values
HasMemberAllowedB343Predictable Value Range from Previous Values
HasMemberAllowedB344Use of Invariant Value in Dynamically Changing Context
HasMemberDiscouragedC345Insufficient Verification of Data Authenticity
HasMemberAllowed-with-ReviewC346Origin Validation Error
HasMemberDiscouragedB372Incomplete Internal State Distinction
HasMemberAllowedB390Detection of Error Condition Without Action
HasMemberProhibitedB391Unchecked Error Condition
HasMemberAllowedB392Missing Report of Error Condition
HasMemberAllowed-with-ReviewC404Improper Resource Shutdown or Release
HasMemberAllowedB430Deployment of Wrong Handler
HasMemberAllowedB431Missing Handler
HasMemberDiscouragedP435Improper Interaction Between Multiple Correctly-Behaving Entities
HasMemberAllowed-with-ReviewC436Interpretation Conflict
HasMemberAllowedB437Incomplete Model of Endpoint Features
HasMemberAllowedB439Behavioral Change in New Version or Environment
HasMemberAllowedB440Expected Behavior Violation
HasMemberAllowed-with-ReviewC446UI Discrepancy for Security Feature
HasMemberAllowedB447Unimplemented or Unsupported Feature in UI
HasMemberAllowedB448Obsolete Feature in UI
HasMemberAllowedB449The UI Performs the Wrong Action
HasMemberAllowedB450Multiple Interpretations of UI Input
HasMemberAllowedV456Missing Initialization of a Variable
HasMemberAllowedB460Improper Cleanup on Thrown Exception
HasMemberAllowedV462Duplicate Key in Associative List (Alist)
HasMemberAllowedB474Use of Function with Inconsistent Implementations
HasMemberAllowedB475Undefined Behavior for Input to API
HasMemberAllowedB478Missing Default Case in Multiple Condition Expression
HasMemberAllowedB489Active Debug Code
HasMemberAllowedV491Public cloneable() Method Without Final ('Object Hijack')
HasMemberAllowedB502Deserialization of Untrusted Data
HasMemberAllowedB511Logic/Time Bomb
HasMemberAllowedB544Missing Standardized Error Handling Mechanism
HasMemberAllowedB547Use of Hard-coded, Security-relevant Constants
HasMemberAllowedB563Assignment to Variable without Use
HasMemberAllowedB570Expression is Always False
HasMemberAllowedB571Expression is Always True
HasMemberAllowedV572Call to Thread run() instead of start()
HasMemberAllowed-with-ReviewC573Improper Following of Specification by Caller
HasMemberAllowedV578EJB Bad Practices: Use of Class Loader
HasMemberAllowedV595Comparison of Object References Instead of Object Contents
HasMemberDiscouragedC668Exposure of Resource to Wrong Sphere
HasMemberAllowed-with-ReviewC671Lack of Administrator Control over Security
HasMemberAllowedB676Use of Potentially Dangerous Function
HasMemberDiscouragedP697Incorrect Comparison
HasMemberAllowedV768Incorrect Short Circuit Evaluation
HasMemberAllowedV782Exposed IOCTL with Insufficient Access Control
HasMemberAllowedB783Operator Precedence Logic Error
HasMemberAllowedB807Reliance on Untrusted Inputs in a Security Decision
HasMemberAllowedV831Signal Handler Function Associated with Multiple Signals
HasMemberAllowedB837Improper Enforcement of a Single, Unique Action
HasMemberAllowed-with-ReviewC912Hidden Functionality
HasMemberAllowed-with-ReviewC913Improper Control of Dynamically-Managed Code Resources
HasMemberAllowedB914Improper Control of Dynamically-Identified Variables
HasMemberAllowedB915Improperly Controlled Modification of Dynamically-Determined Object Attributes
HasMemberAllowedV926Improper Export of Android Application Components
HasMemberAllowedV927Use of Implicit Intent for Sensitive Communication
HasMemberAllowedB940Improper Verification of Source of a Communication Channel
HasMemberAllowedV942Permissive Cross-domain Policy with Untrusted Domains
HasMemberAllowed-with-ReviewC943Improper Neutralization of Special Elements in Data Query Logic
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1024
Name: Comparison of Incompatible Types
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1025
Name: Comparison Using Wrong Factors
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1039
Name: Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
Nature: HasMember
Mapping: Prohibited
Type: Class
ID: 1059
Name: Insufficient Technical Documentation
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 118
Name: Incorrect Access of Indexable Resource ('Range Error')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1209
Name: Failure to Disable Reserved Bits
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1221
Name: Incorrect Register Defaults or Module Parameters
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1224
Name: Improper Restriction of Write-Once Bit Fields
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1239
Name: Improper Zeroization of Hardware Register
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1249
Name: Application-Level Admin Tool with Inconsistent View of Underlying Operating System
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 125
Name: Out-of-bounds Read
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1251
Name: Mirrored Regions with Different Values
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1263
Name: Improper Physical Access Control
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1271
Name: Uninitialized Value on Reset for Registers Holding Security Settings
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1276
Name: Hardware Child Block Incorrectly Connected to Parent System
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1278
Name: Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1279
Name: Cryptographic Operations are run Before Supporting Units are Ready
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1281
Name: Sequence of Processor Instructions Leads to Unexpected Behavior
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1282
Name: Assumed-Immutable Data is Stored in Writable Memory
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1284
Name: Improper Validation of Specified Quantity in Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1285
Name: Improper Validation of Specified Index, Position, or Offset in Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1286
Name: Improper Validation of Syntactic Correctness of Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1287
Name: Improper Validation of Specified Type of Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1288
Name: Improper Validation of Consistency within Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1289
Name: Improper Validation of Unsafe Equivalence in Input
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1291
Name: Public Key Re-Use for Signing both Debug and Production Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1295
Name: Debug Messages Revealing Unnecessary Information
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 130
Name: Improper Handling of Length Parameter Inconsistency
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1310
Name: Missing Ability to Patch ROM Code
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1331
Name: Improper Isolation of Shared Resources in Network On Chip (NoC)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1351
Name: Improper Handling of Hardware Behavior in Exceptionally Cold Environments
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1384
Name: Improper Handling of Physical or Environmental Conditions
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1385
Name: Missing Origin Validation in WebSockets
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1395
Name: Dependency on Vulnerable Third-Party Component
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 1419
Name: Incorrect Initialization of Resource
Nature: HasMember
Mapping: Discouraged
Type: Base
ID: 1426
Name: Improper Validation of Generative AI Output
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1427
Name: Improper Neutralization of Input Used for LLM Prompting
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 15
Name: External Control of System or Configuration Setting
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 174
Name: Double Decoding of the Same Data
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 185
Name: Incorrect Regular Expression
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 239
Name: Failure to Handle Incomplete Element
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 240
Name: Improper Handling of Inconsistent Structural Elements
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 241
Name: Improper Handling of Unexpected Data Type
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 242
Name: Use of Inherently Dangerous Function
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 284
Name: Improper Access Control
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 286
Name: Incorrect User Management
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 306
Name: Missing Authentication for Critical Function
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 337
Name: Predictable Seed in Pseudo-Random Number Generator (PRNG)
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 339
Name: Small Seed Space in PRNG
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 340
Name: Generation of Predictable Numbers or Identifiers
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 341
Name: Predictable from Observable State
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 342
Name: Predictable Exact Value from Previous Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 343
Name: Predictable Value Range from Previous Values
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 344
Name: Use of Invariant Value in Dynamically Changing Context
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 345
Name: Insufficient Verification of Data Authenticity
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 346
Name: Origin Validation Error
Nature: HasMember
Mapping: Discouraged
Type: Base
ID: 372
Name: Incomplete Internal State Distinction
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 390
Name: Detection of Error Condition Without Action
Nature: HasMember
Mapping: Prohibited
Type: Base
ID: 391
Name: Unchecked Error Condition
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 392
Name: Missing Report of Error Condition
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 404
Name: Improper Resource Shutdown or Release
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 430
Name: Deployment of Wrong Handler
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 431
Name: Missing Handler
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 435
Name: Improper Interaction Between Multiple Correctly-Behaving Entities
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 436
Name: Interpretation Conflict
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 437
Name: Incomplete Model of Endpoint Features
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 439
Name: Behavioral Change in New Version or Environment
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 440
Name: Expected Behavior Violation
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 446
Name: UI Discrepancy for Security Feature
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 447
Name: Unimplemented or Unsupported Feature in UI
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 448
Name: Obsolete Feature in UI
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 449
Name: The UI Performs the Wrong Action
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 450
Name: Multiple Interpretations of UI Input
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 456
Name: Missing Initialization of a Variable
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 460
Name: Improper Cleanup on Thrown Exception
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 462
Name: Duplicate Key in Associative List (Alist)
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 474
Name: Use of Function with Inconsistent Implementations
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 475
Name: Undefined Behavior for Input to API
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 478
Name: Missing Default Case in Multiple Condition Expression
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 489
Name: Active Debug Code
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 491
Name: Public cloneable() Method Without Final ('Object Hijack')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 502
Name: Deserialization of Untrusted Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 511
Name: Logic/Time Bomb
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 544
Name: Missing Standardized Error Handling Mechanism
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 547
Name: Use of Hard-coded, Security-relevant Constants
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 563
Name: Assignment to Variable without Use
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 570
Name: Expression is Always False
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 571
Name: Expression is Always True
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 572
Name: Call to Thread run() instead of start()
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 573
Name: Improper Following of Specification by Caller
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 578
Name: EJB Bad Practices: Use of Class Loader
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 595
Name: Comparison of Object References Instead of Object Contents
Nature: HasMember
Mapping: Discouraged
Type: Class
ID: 668
Name: Exposure of Resource to Wrong Sphere
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 671
Name: Lack of Administrator Control over Security
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 676
Name: Use of Potentially Dangerous Function
Nature: HasMember
Mapping: Discouraged
Type: Pillar
ID: 697
Name: Incorrect Comparison
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 768
Name: Incorrect Short Circuit Evaluation
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 782
Name: Exposed IOCTL with Insufficient Access Control
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 783
Name: Operator Precedence Logic Error
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 807
Name: Reliance on Untrusted Inputs in a Security Decision
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 831
Name: Signal Handler Function Associated with Multiple Signals
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 837
Name: Improper Enforcement of a Single, Unique Action
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 912
Name: Hidden Functionality
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 913
Name: Improper Control of Dynamically-Managed Code Resources
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 914
Name: Improper Control of Dynamically-Identified Variables
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 915
Name: Improperly Controlled Modification of Dynamically-Determined Object Attributes
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 926
Name: Improper Export of Android Application Components
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 927
Name: Use of Implicit Intent for Sensitive Communication
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 940
Name: Improper Verification of Source of a Communication Channel
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 942
Name: Permissive Cross-domain Policy with Untrusted Domains
Nature: HasMember
Mapping: Allowed-with-Review
Type: Class
ID: 943
Name: Improper Neutralization of Special Elements in Data Query Logic
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-326 - Varies by Context (impact)
Details not found