Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools


CWE VIEW:Weaknesses in Software Written in Ruby
ID:BOSS-252
Vulnerability Mapping:Prohibited
Type:Implicit
Status:Draft
DetailsContent HistoryObserved CVE ExamplesReports
▼Objective

This view (slice) covers issues that are found in Ruby programs that are not common to all languages.

▼Memberships
NatureMappingTypeIDName
HasMemberAllowedB502Deserialization of Untrusted Data
HasMemberAllowedB915Improperly Controlled Modification of Dynamically-Determined Object Attributes
HasMemberAllowedV95Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 502
Name: Deserialization of Untrusted Data
Nature: HasMember
Mapping: Allowed
Type: Base
ID: 915
Name: Improperly Controlled Modification of Dynamically-Determined Object Attributes
Nature: HasMember
Mapping: Allowed
Type: Variant
ID: 95
Name: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
▼Vulnerability Mapping Notes
Usage:Prohibited
Reason:View
Rationale:

This entry is a View. Views are not weaknesses and therefore inappropriate to describe the root causes of vulnerabilities.

Comments:

Use this View or other Views to search and navigate for the appropriate weakness.

▼Notes
▼Audience
StakeholderDescription
▼References

Expand AllCollapse All

BOSS-252 - Weaknesses in Software Written in Ruby
Details not found