CWE-264
Category ID:264(Category)
Status: Incomplete
ソスFソスツ・ソスソスソスソスソスEソスAソスNソスZソスXソスソスソスソス
ソスソスソス
ソスソスソスソスvソスソス
ソスソスソスフカソスeソスSソスソスソスフ脆弱性ソスヘ、ソスAソスNソスZソスXソスソスソスソスノ暦ソスソスpソスソスソスソスソスAソスFソスツ、ソスソスソスソスソスyソスムゑソスソスフ托ソスソスフセソスLソスソスソスソスソスeソスBソス@ソス\ソスノ関連ソスソスソスソスソスソスフでゑソスソスB
ソスYソスソスソスソスソスソスvソスソスソスbソスgソスtソスHソス[ソスソス
ソスソスソスソス
ソスSソスソス
ソスソスQソスフ緩和ソスソス
ソス\ソスtソスgソスEソスFソスAソスソスソスフエソスソスソスeソスBソスeソスBソスノアソスNソスZソスXソスソスソスソスソスソスtソス^ソスソスソスソス鼾ソスAソスナ擾ソスソスソスソスソスソスフ鯉ソスソスソスソスソスソスソスソス轤オソスト会ソスソスソスソスソスソスB
ソスヨ係ソスソス
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ChildOf | Category | 254 | Security Features | Development Concepts (primary)699 |
ParentOf | Weakness Class | 250 | Execution with Unnecessary Privileges | Development Concepts699 |
ParentOf | Category | 265 | Privilege / Sandbox Issues | Development Concepts (primary)699 |
ParentOf | Category | 275 | Permission Issues | Development Concepts (primary)699 |
ParentOf | Weakness Class | 282 | Improper Ownership Management | Development Concepts (primary)699 |
ParentOf | Weakness Class | 284 | Access Control (Authorization) Issues | Development Concepts (primary)699 |
ParentOf | Weakness Class | 286 | Incorrect User Management | Development Concepts (primary)699 |
MemberOf | View | 635 | Weaknesses Used by NVD | Weaknesses Used by NVD (primary)635 |
CanAlsoBe | Weakness Base | 283 | Unverified Ownership | Research Concepts1000 |
ソスソスソスgソスDソスナの包ソスソスソス
ソスgソスDソスソスソスワゑソスソスヘ組ソスDソスナの包ソスソスソス | ソスmソス[ソスh ID | CWEソスフ包ソスソズとの適ソスソスソスx | ソスソスソズ厄ソス |
---|---|---|---|
PLOVER | Permissions, Privileges, and ACLs |
ソスヨ連ソスソスソスソスUソスソスソスpソス^ソス[ソスソス
CAPEC-ID | ソスUソスソスソスpソス^ソス[ソスソスソスソス (CAPEC Version 1.5) |
---|---|
5 | Analog In-band Switching Signals (aka Blue Boxing) |
17 | Accessing, Modifying or Executing Executable Files |
35 | Leverage Executable Code in Nonexecutable Files |
58 | Restful Privilege Elevation |
69 | Target Programs with Elevated Privileges |
76 | Manipulating Input to File System Calls |
ソスQソスソス
[REF-11] M. Howard and D. LeBlanc. "Writing Secure Code". Chapter 7, "How Tokens, Privileges, SIDs, ACLs, and Processes Relate" Page 218. 2nd Edition. Microsoft. 2002.
ソスXソスVソスソスソスソス
[2011ソスN04ソスソス21ソスソス]
2010ソスN10ソスソス12ソスソスソスソスソス_ソスフデソス[ソス^ソスソスソスソスソスノ更ソスV
[2009ソスN06ソスソス29ソスソス]
2009ソスN02ソスソス02ソスソスソスソスソス_ソスフ会ソスソスL URL ソスソスソスソスソスノ作成
http://cwe.mitre.org/data/definitions/264.html
ソスoソス^ソスソス 2011/04/21
ソスナ終ソスXソスVソスソス 2023/04/04