Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
ChildOf | Allowed | B | 916 | Use of Password Hash With Insufficient Computational Effort |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 816 | OWASP Top Ten 2010 Category A7 - Insecure Cryptographic Storage |
MemberOf | Prohibited | C | 866 | 2011 Top 25 - Porous Defenses |
MemberOf | Prohibited | C | 958 | SFP Secondary Cluster: Broken Cryptography |
MemberOf | Prohibited | C | 1013 | Encrypt Data |
MemberOf | Prohibited | C | 1346 | OWASP Top Ten 2021 Category A02:2021 - Cryptographic Failures |
MemberOf | Prohibited | C | 1402 | Comprehensive Categorization: Encryption |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | BS | BOSS-316 | Bypass Protection Mechanism (impact) |
MemberOf | Prohibited | BS | BOSS-332 | Gain Privileges or Assume Identity (impact) |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1013 | Encrypt Data |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1346 | OWASP Top Ten 2021 Category A02:2021 - Cryptographic Failures |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 958 | SFP Secondary Cluster: Broken Cryptography |
Scope | Likelihood | Impact | Note |
---|
Reference | Description |
---|
Ordinality | Description |
---|
Taxonomy Name | Entry ID | Fit | Entry Name |
---|
ID | Name |
---|