The UI Performs the Wrong Action |
Weakness ID: 449 (Weakness Base) | Status: Incomplete |
Reference | Description |
---|---|
CVE-2001-1387 | Network firewall accidentally implements one command line option as if it were another, possibly leading to behavioral infoleak. |
CVE-2001-0081 | Command line option correctly suppresses a user prompt but does not properly disable a feature, although when the product prompts the user, the feature is properly disabled. |
CVE-2002-1977 | Product does not "time out" according to user specification, leaving sensitive data available after it has expired. |
Perform extensive functionality testing of the UI. The UI should behave as specified. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 446 | UI Discrepancy for Security Feature | Development Concepts (primary)699 Research Concepts (primary)1000 |
Mapped Taxonomy Name | Node ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | The UI performs the wrong action |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
PLOVER | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Potential Mitigations, Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Taxonomy Mappings |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.