Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Weaknesses in Software Written in JavaScript
ID:BOSS-248
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view (slice) covers issues that are found in JavaScript programs that are not common to all languages.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedV1022Use of Web Link to Untrusted Target with window.opener Access
HasMemberAllowedB1024Comparison of Incompatible Types
HasMemberAllowedV1321Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
HasMemberAllowedB1335Incorrect Bitwise Shift of Integer
HasMemberAllowedB1336Improper Neutralization of Special Elements Used in a Template Engine
HasMemberAllowedB478Missing Default Case in Multiple Condition Expression
HasMemberAllowedB502Deserialization of Untrusted Data
HasMemberAllowedV595Comparison of Object References Instead of Object Contents
HasMemberAllowedV95Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1022
Name: Use of Web Link to Untrusted Target with window.opener Access
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1024
Name: Comparison of Incompatible Types
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 1321
Name: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1335
Name: Incorrect Bitwise Shift of Integer
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1336
Name: Improper Neutralization of Special Elements Used in a Template Engine
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 478
Name: Missing Default Case in Multiple Condition Expression
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 502
Name: Deserialization of Untrusted Data
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 595
Name: Comparison of Object References Instead of Object Contents
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 95
Name: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-248 - Weaknesses in Software Written in JavaScript
Details not found