Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
:
Weakness ID:
Version:
Weakness Name:
Vulnerability Mapping:
Abstraction:
Structure:
Status:
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

▼Extended Description

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfDiscouragedP703Improper Check or Handling of Exceptional Conditions
ChildOfDiscouragedP707Improper Neutralization
ParentOfAllowedB241Improper Handling of Unexpected Data Type
ParentOfAllowedB168Improper Handling of Inconsistent Special Elements
ParentOfAllowedB166Improper Handling of Missing Special Element
ParentOfAllowedB167Improper Handling of Additional Special Element
ParentOfAllowedB229Improper Handling of Values
ParentOfAllowedB233Improper Handling of Parameters
ParentOfAllowedB237Improper Handling of Structural Elements
Nature: ChildOf
Mapping: Discouraged
Type: Pillar
ID: 703
Name: Improper Check or Handling of Exceptional Conditions
Nature: ChildOf
Mapping: Discouraged
Type: Pillar
ID: 707
Name: Improper Neutralization
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 241
Name: Improper Handling of Unexpected Data Type
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 168
Name: Improper Handling of Inconsistent Special Elements
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 166
Name: Improper Handling of Missing Special Element
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 167
Name: Improper Handling of Additional Special Element
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 229
Name: Improper Handling of Values
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 233
Name: Improper Handling of Parameters
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 237
Name: Improper Handling of Structural Elements
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC728OWASP Top Ten 2004 Category A7 - Improper Error Handling
MemberOfProhibitedV884CWE Cross-section
MemberOfProhibitedC993SFP Secondary Cluster: Incorrect Input Handling
MemberOfProhibitedC1407Comprehensive Categorization: Improper Neutralization
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 728
Name: OWASP Top Ten 2004 Category A7 - Improper Error Handling
Nature: MemberOf
Mapping: Prohibited
Type:View
ID: 884
Name: CWE Cross-section
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 993
Name: SFP Secondary Cluster: Incorrect Input Handling
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1407
Name: Comprehensive Categorization: Improper Neutralization
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-314DoS: Resource Consumption (CPU) (impact)
MemberOfProhibitedBSBOSS-315Unexpected State (impact)
MemberOfProhibitedBSBOSS-324DoS: Crash, Exit, or Restart (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-314
Name: DoS: Resource Consumption (CPU) (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-315
Name: Unexpected State (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-324
Name: DoS: Crash, Exit, or Restart (impact)
▼Relevant To View
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC993SFP Secondary Cluster: Incorrect Input Handling
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 993
Name: SFP Secondary Cluster: Incorrect Input Handling
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
▼Potential Mitigations
▼Modes Of Introduction
▼Applicable Platforms
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      ▼Related Attack Patterns
      IDName
      ▼References
      Details not found