Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
ChildOf | Allowed | B | 260 | Password in Configuration File |
ChildOf | Allowed | B | 521 | Weak Password Requirements |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 254 | 7PK - Security Features |
MemberOf | Prohibited | C | 950 | SFP Secondary Cluster: Hardcoded Sensitive Data |
MemberOf | Prohibited | C | 1010 | Authenticate Actors |
MemberOf | Prohibited | C | 1396 | Comprehensive Categorization: Access Control |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | BS | BOSS-274 | High likelihood of exploit |
MemberOf | Prohibited | BS | BOSS-294 | Not Language-Specific Weaknesses |
MemberOf | Prohibited | BS | BOSS-332 | Gain Privileges or Assume Identity (impact) |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1010 | Authenticate Actors |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 254 | 7PK - Security Features |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 950 | SFP Secondary Cluster: Hardcoded Sensitive Data |
Scope | Likelihood | Impact | Note |
---|
Reference | Description |
---|
Ordinality | Description |
---|
Taxonomy Name | Entry ID | Fit | Entry Name |
---|
ID | Name |
---|