| Nature | Mapping | Type | ID | Name |
|---|---|---|---|---|
| ChildOf | Allowed | B | 540 | Inclusion of Sensitive Information in Source Code |
| Nature | Mapping | Type | ID | Name |
|---|---|---|---|---|
| MemberOf | Prohibited | C | 731 | OWASP Top Ten 2004 Category A10 - Insecure Configuration Management |
| MemberOf | Prohibited | C | 1002 | SFP Secondary Cluster: Unexpected Entry Points |
| MemberOf | Prohibited | C | 1417 | Comprehensive Categorization: Sensitive Information Exposure |
| Nature | Mapping | Type | ID | Name |
|---|---|---|---|---|
| MemberOf | Prohibited | BS | BOSS-328 | Read Application Data (impact) |
| Nature | Mapping | Type | ID | Name |
|---|---|---|---|---|
| MemberOf | Prohibited | C | 1002 | SFP Secondary Cluster: Unexpected Entry Points |
| Scope | Likelihood | Impact | Note |
|---|
| Reference | Description |
|---|
| Ordinality | Description |
|---|
| Taxonomy Name | Entry ID | Fit | Entry Name |
|---|
| ID | Name |
|---|