Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
ChildOf | Allowed-with-Review | C | 436 | Interpretation Conflict |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 945 | SFP Secondary Cluster: Insecure Resource Access |
MemberOf | Prohibited | C | 1348 | OWASP Top Ten 2021 Category A04:2021 - Insecure Design |
MemberOf | Prohibited | C | 1398 | Comprehensive Categorization: Component Interaction |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | BS | BOSS-274 | High likelihood of exploit |
MemberOf | Prohibited | BS | BOSS-294 | Not Language-Specific Weaknesses |
MemberOf | Prohibited | BS | BOSS-318 | Modify Application Data (impact) |
MemberOf | Prohibited | BS | BOSS-328 | Read Application Data (impact) |
MemberOf | Prohibited | BS | BOSS-332 | Gain Privileges or Assume Identity (impact) |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1348 | OWASP Top Ten 2021 Category A04:2021 - Insecure Design |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 945 | SFP Secondary Cluster: Insecure Resource Access |
Scope | Likelihood | Impact | Note |
---|
Reference | Description |
---|
Ordinality | Description |
---|
Taxonomy Name | Entry ID | Fit | Entry Name |
---|
ID | Name |
---|