Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
ChildOf | Allowed-with-Review | C | 943 | Improper Neutralization of Special Elements in Data Query Logic |
ParentOf | Allowed | V | 456 | Missing Initialization of a Variable |
ParentOf | Allowed | V | 564 | SQL Injection: Hibernate |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | BS | BOSS-240 | Weaknesses in Software Written in SQL |
MemberOf | Prohibited | BS | BOSS-272 | Weaknesses in Database Server |
MemberOf | Prohibited | BS | BOSS-274 | High likelihood of exploit |
MemberOf | Prohibited | BS | BOSS-276 | Environment Hardening Strategy |
MemberOf | Prohibited | BS | BOSS-278 | Libraries or Frameworks Strategy |
MemberOf | Prohibited | BS | BOSS-279 | Input Validation Strategy |
MemberOf | Prohibited | BS | BOSS-282 | Parameterization Strategy |
MemberOf | Prohibited | BS | BOSS-284 | Output Encoding Strategy |
MemberOf | Prohibited | BS | BOSS-285 | Firewall Strategy |
MemberOf | Prohibited | BS | BOSS-287 | Enforcement by Conversion Strategy |
MemberOf | Prohibited | BS | BOSS-294 | Not Language-Specific Weaknesses |
MemberOf | Prohibited | BS | BOSS-311 | Execute Unauthorized Code or Commands (impact) |
MemberOf | Prohibited | BS | BOSS-316 | Bypass Protection Mechanism (impact) |
MemberOf | Prohibited | BS | BOSS-318 | Modify Application Data (impact) |
MemberOf | Prohibited | BS | BOSS-328 | Read Application Data (impact) |
MemberOf | Prohibited | BS | BOSS-332 | Gain Privileges or Assume Identity (impact) |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1005 | 7PK - Input Validation and Representation |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1019 | Validate Inputs |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1308 | CISQ Quality Measures - Security |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 1347 | OWASP Top Ten 2021 Category A03:2021 - Injection |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 137 | Data Neutralization Issues |
Nature | Mapping | Type | ID | Name |
---|---|---|---|---|
MemberOf | Prohibited | C | 990 | SFP Secondary Cluster: Tainted Input to Command |
Scope | Likelihood | Impact | Note |
---|
Reference | Description |
---|
Ordinality | Description |
---|
Taxonomy Name | Entry ID | Fit | Entry Name |
---|
ID | Name |
---|