Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
ChildOf | Discouraged | C | 269 | Improper Privilege Management |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 265 | Privilege Issues |
MemberOf | Prohibited | V | 884 | CWE Cross-section |
MemberOf | Prohibited | C | 977 | SFP Secondary Cluster: Design |
MemberOf | Prohibited | C | 1366 | ICS Communications: Frail Security in Protocols |
MemberOf | Prohibited | C | 1396 | Comprehensive Categorization: Access Control |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | BS | BOSS-275 | Low likelihood of exploit |
MemberOf | Prohibited | BS | BOSS-294 | Not Language-Specific Weaknesses |
MemberOf | Prohibited | BS | BOSS-311 | Execute Unauthorized Code or Commands (impact) |
MemberOf | Prohibited | BS | BOSS-328 | Read Application Data (impact) |
MemberOf | Prohibited | BS | BOSS-332 | Gain Privileges or Assume Identity (impact) |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1366 | ICS Communications: Frail Security in Protocols |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 265 | Privilege Issues |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 977 | SFP Secondary Cluster: Design |
Scope | Likelihood | Impact | Note |
---|
Reference | Description |
---|
Ordinality | Description |
---|
Taxonomy Name | Entry ID | Fit | Entry Name |
---|
ID | Name |
---|