Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Weaknesses in Software Written in Python
ID:BOSS-246
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view (slice) covers issues that are found in Python programs that are not common to all languages.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedB1336Improper Neutralization of Special Elements Used in a Template Engine
HasMemberAllowedB396Declaration of Catch for Generic Exception
HasMemberAllowedB397Declaration of Throws for Generic Exception
HasMemberAllowedB478Missing Default Case in Multiple Condition Expression
HasMemberAllowedB502Deserialization of Untrusted Data
HasMemberAllowedB915Improperly Controlled Modification of Dynamically-Determined Object Attributes
HasMemberAllowedV95Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 1336
Name: Improper Neutralization of Special Elements Used in a Template Engine
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 396
Name: Declaration of Catch for Generic Exception
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 397
Name: Declaration of Throws for Generic Exception
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 478
Name: Missing Default Case in Multiple Condition Expression
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 502
Name: Deserialization of Untrusted Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 915
Name: Improperly Controlled Modification of Dynamically-Determined Object Attributes
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 95
Name: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-246 - Weaknesses in Software Written in Python
Details not found