Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
ChildOf | Allowed-with-Review | C | 1390 | Weak Authentication |
ChildOf | Allowed | B | 654 | Reliance on a Single Factor in a Security Decision |
ParentOf | Allowed | B | 309 | Use of Password System for Primary Authentication |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | V | 884 | CWE Cross-section |
MemberOf | Prohibited | C | 947 | SFP Secondary Cluster: Authentication Bypass |
MemberOf | Prohibited | C | 1010 | Authenticate Actors |
MemberOf | Prohibited | C | 1028 | OWASP Top Ten 2017 Category A2 - Broken Authentication |
MemberOf | Prohibited | C | 1211 | Authentication Errors |
MemberOf | Prohibited | C | 1368 | ICS Dependencies (& Architecture): External Digital Systems |
MemberOf | Prohibited | C | 1396 | Comprehensive Categorization: Access Control |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | BS | BOSS-274 | High likelihood of exploit |
MemberOf | Prohibited | BS | BOSS-294 | Not Language-Specific Weaknesses |
MemberOf | Prohibited | BS | BOSS-316 | Bypass Protection Mechanism (impact) |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1010 | Authenticate Actors |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1211 | Authentication Errors |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1368 | ICS Dependencies (& Architecture): External Digital Systems |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 947 | SFP Secondary Cluster: Authentication Bypass |
Scope | Likelihood | Impact | Note |
---|
Reference | Description |
---|
Ordinality | Description |
---|
Taxonomy Name | Entry ID | Fit | Entry Name |
---|
ID | Name |
---|