MemberOf |
View - a subset of CWE entries that provides a way of examining CWE content. The two main view structures are Slices (flat lists) and Graphs (containing relationships between entries). |
699 |
Software Development
|
MemberOf |
Category - a CWE entry that contains a set of other entries that share a common characteristic. |
723 |
OWASP Top Ten 2004 Category A2 - Broken Access Control
|
MemberOf |
Category - a CWE entry that contains a set of other entries that share a common characteristic. |
731 |
OWASP Top Ten 2004 Category A10 - Insecure Configuration Management
|
MemberOf |
Category - a CWE entry that contains a set of other entries that share a common characteristic. |
1345 |
OWASP Top Ten 2021 Category A01:2021 - Broken Access Control
|
HasMember |
Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. |
276 |
Incorrect Default Permissions
|
HasMember |
Variant - a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource. |
277 |
Insecure Inherited Permissions
|
HasMember |
Variant - a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource. |
278 |
Insecure Preserved Inherited Permissions
|
HasMember |
Variant - a weakness that is linked to a certain type of product, typically involving a specific language or technology. More specific than a Base weakness. Variant level weaknesses typically describe issues in terms of 3 to 5 of the following dimensions: behavior, property, technology, language, and resource. |
279 |
Incorrect Execution-Assigned Permissions
|
HasMember |
Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. |
280 |
Improper Handling of Insufficient Permissions or Privileges
|
HasMember |
|