Scope | Impact | Likelihood |
---|---|---|
Access Control | Gain Privileges or Assume Identity Note: The attacker can gain access to otherwise unauthorized resources. | |
Integrity Confidentiality Other | Modify Application Data, Modify Files or Directories, Read Application Data, Read Files or Directories, Other Note: Race conditions such as this kind may be employed to gain read or write access to resources not normally readable or writable by the user in question. | |
Integrity Other | Modify Application Data, Other Note: The resource in question, or other resources (through the corrupted one) may be changed in undesirable ways by a malicious user. | |
Non-Repudiation | Hide Activities Note: If a file or other resource is written in this method, as opposed to a valid way, logging of the activity may not occur. | |
Non-Repudiation Integrity | Modify Files or Directories Note: In some cases it may be possible to delete files that a malicious user might not otherwise have access to -- such as log files. |
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
CLASP | Draft 3 |
Name | Organization | Date | Comment |
---|---|---|---|
Eric Dalci | Cigital | updated Time_of_Introduction | |
CWE Content Team | MITRE | updated Common_Consequences, Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Applicable_Platforms | |
CWE Content Team | MITRE | updated References, Relationships | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes |