| Ambito | Impatto | Probabilità |
|---|---|---|
| Integrity Confidentiality Availability Access Control | Gain Privileges or Assume Identity, Execute Unauthorized Code or Commands Note: If one trusts the system-event information and executes commands based on it, one could potentially take actions based on a spoofed identity. |
| Riferimenti | Descrizione |
|---|---|
CVE-2004-0213 | Attacker uses Shatter attack to bypass GUI-enforced protection for CVE-2003-0908. |
| Nome | Organizzazione | Data | Data di rilascio | Version |
|---|---|---|---|---|
| CLASP | Draft 3 |
| Nome | Organizzazione | Data | Commento |
|---|---|---|---|
| Eric Dalci | Cigital | updated Time_of_Introduction | |
| CWE Content Team | MITRE | updated Common_Consequences, Relationships, Other_Notes, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Description, Other_Notes | |
| CWE Content Team | MITRE | updated Common_Consequences | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Demonstrative_Examples | |
| CWE Content Team | MITRE | updated Potential_Mitigations | |
| CWE Content Team | MITRE | updated Relationships, Taxonomy_Mappings | |
| CWE Content Team | MITRE | updated Applicable_Platforms | |
| CWE Content Team | MITRE | updated References, Relationships | |
| CWE Content Team | MITRE | updated Relationships | |
| CWE Content Team | MITRE | updated Mapping_Notes | |
| CWE Content Team | MITRE | updated Observed_Examples | |
| CWE Content Team | MITRE | updated Weakness_Ordinalities |