Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
ChildOf | Allowed-with-Review | C | 282 | Improper Ownership Management |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 723 | OWASP Top Ten 2004 Category A2 - Broken Access Control |
MemberOf | Prohibited | C | 840 | Business Logic Errors |
MemberOf | Prohibited | V | 884 | CWE Cross-section |
MemberOf | Prohibited | C | 944 | SFP Secondary Cluster: Access Management |
MemberOf | Prohibited | C | 1011 | Authorize Actors |
MemberOf | Prohibited | C | 1396 | Comprehensive Categorization: Access Control |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | BS | BOSS-280 | Separation of Privilege Strategy |
MemberOf | Prohibited | BS | BOSS-294 | Not Language-Specific Weaknesses |
MemberOf | Prohibited | BS | BOSS-332 | Gain Privileges or Assume Identity (impact) |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1011 | Authorize Actors |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 840 | Business Logic Errors |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 944 | SFP Secondary Cluster: Access Management |
Scope | Likelihood | Impact | Note |
---|
Reference | Description |
---|
Ordinality | Description |
---|
Taxonomy Name | Entry ID | Fit | Entry Name |
---|
ID | Name |
---|