Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
ChildOf | Allowed | B | 59 | Improper Link Resolution Before File Access ('Link Following') |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 743 | CERT C Secure Coding Standard (2008) Chapter 10 - Input Output (FIO) |
MemberOf | Prohibited | C | 877 | CERT C++ Secure Coding Section 09 - Input Output (FIO) |
MemberOf | Prohibited | C | 980 | SFP Secondary Cluster: Link in Resource Name Resolution |
MemberOf | Prohibited | C | 1404 | Comprehensive Categorization: File Handling |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | BS | BOSS-275 | Low likelihood of exploit |
MemberOf | Prohibited | BS | BOSS-280 | Separation of Privilege Strategy |
MemberOf | Prohibited | BS | BOSS-294 | Not Language-Specific Weaknesses |
MemberOf | Prohibited | BS | BOSS-296 | Windows(os class) Weaknesses |
MemberOf | Prohibited | BS | BOSS-319 | Read Files or Directories (impact) |
MemberOf | Prohibited | BS | BOSS-320 | Modify Files or Directories (impact) |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 980 | SFP Secondary Cluster: Link in Resource Name Resolution |
Scope | Likelihood | Impact | Note |
---|
Reference | Description |
---|
Ordinality | Description |
---|
Taxonomy Name | Entry ID | Fit | Entry Name |
---|
ID | Name |
---|