Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CWE-1047:Modules with Circular Dependencies
Weakness ID:1047
Version:v4.17
Weakness Name:Modules with Circular Dependencies
Vulnerability Mapping:Prohibited
Abstraction:Base
Structure:Simple
Status:Incomplete
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

The product contains modules in which one module has references that cycle back to itself, i.e., there are circular dependencies.

▼Extended Description

As an example, with Java, this weakness might indicate cycles between packages.

This issue makes it more difficult to maintain the product due to insufficient modularity, which indirectly affects security by making it more difficult or time-consuming to find and/or fix vulnerabilities. It also might make it easier to introduce vulnerabilities.

This issue can prevent the product from running reliably. If the relevant code is reachable by an attacker, then this reliability problem might introduce a vulnerability.

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
▼Memberships
NatureMappingTypeIDName
▼Tags
NatureMappingTypeIDName
▼Relevant To View
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
OtherN/AReduce Reliability
N/A
Scope: Other
Likelihood: N/A
Impact: Reduce Reliability
Note:
N/A
▼Potential Mitigations
▼Modes Of Introduction
▼Applicable Platforms
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      Indirect
      N/A
      Ordinality: Indirect
      Description:
      N/A
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      Usage:Prohibited
      Reason:Other
      Rationale:

      This entry is primarily a quality issue with no direct security implications.

      Comments:

      Look for weaknesses that are focused specifically on insecure behaviors that have more direct security implications.

      Suggestions:
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      OMG ASCMMASCMM-MNT-7N/AN/A
      OMG ASCRMASCRM-RLB-13N/AN/A
      Taxonomy Name: OMG ASCMM
      Entry ID: ASCMM-MNT-7
      Fit: N/A
      Entry Name: N/A
      Taxonomy Name: OMG ASCRM
      Entry ID: ASCRM-RLB-13
      Fit: N/A
      Entry Name: N/A
      ▼Related Attack Patterns
      IDName
      ▼References
      Reference ID: REF-960
      Title: Automated Source Code Maintainability Measure (ASCMM)
      Author: Object Management Group (OMG)
      Section: ASCMM-MNT-7
      Publication:
      Publisher:
      Edition:
      URL:https://www.omg.org/spec/ASCMM/
      URL Date:2023-04-07
      Day:N/A
      Month:01
      Year:2016
      Reference ID: REF-961
      Title: Automated Source Code Reliability Measure (ASCRM)
      Author: Object Management Group (OMG)
      Section: ASCRM-RLB-13
      Publication:
      Publisher:
      Edition:
      URL:http://www.omg.org/spec/ASCRM/1.0/
      URL Date:
      Day:N/A
      Month:01
      Year:2016
      Details not found