CWE-798 (Use of Hard-coded Credentials)
GPTKB entity
Statements (14)
Predicate | Object |
---|---|
gptkbp:instanceOf |
gptkb:Common_Weakness_Enumeration
|
gptkbp:category |
Security Weakness
|
gptkbp:citation |
https://cwe.mitre.org/data/definitions/798.html
|
gptkbp:consequence |
Allows attackers to gain unauthorized access to systems or data.
|
gptkbp:describes |
The use of hard-coded credentials in software, such as passwords, cryptographic keys, or similar secrets.
|
https://www.w3.org/2000/01/rdf-schema#label |
CWE-798 (Use of Hard-coded Credentials)
|
gptkbp:mitigatedBy |
Do not hard-code credentials; use secure storage mechanisms.
|
gptkbp:name |
Use of Hard-coded Credentials
|
gptkbp:partOf |
gptkb:CWE_Top_25_Most_Dangerous_Software_Weaknesses
|
gptkbp:relatedTo |
CWE-259 (Use of Hard-coded Password)
CWE-321 (Use of Hard-coded Cryptographic Key) |
gptkbp:vulnerableTo |
gptkb:CWE-798
|
gptkbp:bfsParent |
gptkb:Common_Weakness_Enumeration_(CWE)
|
gptkbp:bfsLayer |
7
|