Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
:
Weakness ID:
Version:
Weakness Name:
Vulnerability Mapping:
Abstraction:
Structure:
Status:
Likelihood of Exploit:
DetailsContent HistoryObserved CVE ExamplesReports
▼Description

▼Extended Description

▼Alternate Terms
▼Relationships
Relevant to the view"Research Concepts - (1000)"
NatureMappingTypeIDName
ChildOfDiscouragedP710Improper Adherence to Coding Standards
ParentOfAllowedB1192Improper Identifier for IP Block used in System-On-Chip (SOC)
ParentOfAllowed-with-ReviewC1395Dependency on Vulnerable Third-Party Component
ParentOfAllowedB250Execution with Unnecessary Privileges
ParentOfAllowedC653Improper Isolation or Compartmentalization
ParentOfAllowed-with-ReviewC636Not Failing Securely ('Failing Open')
ParentOfAllowed-with-ReviewC637Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')
ParentOfAllowed-with-ReviewC638Not Using Complete Mediation
ParentOfAllowedB654Reliance on a Single Factor in a Security Decision
ParentOfAllowed-with-ReviewC655Insufficient Psychological Acceptability
ParentOfAllowed-with-ReviewC656Reliance on Security Through Obscurity
ParentOfAllowed-with-ReviewC671Lack of Administrator Control over Security
Nature: ChildOf
Mapping: Discouraged
Type: Pillar
ID: 710
Name: Improper Adherence to Coding Standards
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 1192
Name: Improper Identifier for IP Block used in System-On-Chip (SOC)
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 1395
Name: Dependency on Vulnerable Third-Party Component
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 250
Name: Execution with Unnecessary Privileges
Nature: ParentOf
Mapping: Allowed
Type: Class
ID: 653
Name: Improper Isolation or Compartmentalization
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 636
Name: Not Failing Securely ('Failing Open')
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 637
Name: Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 638
Name: Not Using Complete Mediation
Nature: ParentOf
Mapping: Allowed
Type: Base
ID: 654
Name: Reliance on a Single Factor in a Security Decision
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 655
Name: Insufficient Psychological Acceptability
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 656
Name: Reliance on Security Through Obscurity
Nature: ParentOf
Mapping: Allowed-with-Review
Type: Class
ID: 671
Name: Lack of Administrator Control over Security
▼Memberships
NatureMappingTypeIDName
MemberOfProhibitedC975SFP Secondary Cluster: Architecture
MemberOfProhibitedC1348OWASP Top Ten 2021 Category A04:2021 - Insecure Design
MemberOfProhibitedC1418Comprehensive Categorization: Violation of Secure Design Principles
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 975
Name: SFP Secondary Cluster: Architecture
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1348
Name: OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Nature: MemberOf
Mapping: Prohibited
Type:Category
ID: 1418
Name: Comprehensive Categorization: Violation of Secure Design Principles
▼Tags
NatureMappingTypeIDName
MemberOfProhibitedBSBOSS-312Other (impact)
Nature: MemberOf
Mapping: Prohibited
Type:BOSSView
ID: BOSS-312
Name: Other (impact)
▼Relevant To View
Relevant to the view"OWASP Top Ten (2021) - (1344)"
NatureMappingTypeIDName
MemberOfProhibitedC1348OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 1348
Name: OWASP Top Ten 2021 Category A04:2021 - Insecure Design
Relevant to the view"Software Fault Pattern (SFP) Clusters - (888)"
NatureMappingTypeIDName
MemberOfProhibitedC975SFP Secondary Cluster: Architecture
Nature: MemberOf
Mapping: Prohibited
Type: Category
ID: 975
Name: SFP Secondary Cluster: Architecture
▼Background Detail

▼Common Consequences
ScopeLikelihoodImpactNote
▼Potential Mitigations
▼Modes Of Introduction
▼Applicable Platforms
▼Demonstrative Examples
▼Observed Examples
ReferenceDescription
▼Affected Resources
    ▼Functional Areas
      ▼Weakness Ordinalities
      OrdinalityDescription
      ▼Detection Methods
      ▼Vulnerability Mapping Notes
      ▼Notes
      ▼Taxonomy Mappings
      Taxonomy NameEntry IDFitEntry Name
      ▼Related Attack Patterns
      IDName
      ▼References
      Details not found