Statements (21)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Common_Weakness_Enumeration
|
| gptkbp:category |
gptkb:Access_Control
|
| gptkbp:citation |
https://cwe.mitre.org/data/definitions/264.html
|
| gptkbp:deprecatedIn |
CWE 4.6
|
| gptkbp:describes |
Weaknesses related to permissions, privileges, and access controls
|
| gptkbp:hasCWE |
gptkb:CWE-264
|
| gptkbp:name |
Permissions, Privileges, and Access Controls
|
| gptkbp:partOf |
gptkb:CWE
|
| gptkbp:replacedBy |
gptkb:CWE-284
gptkb:CWE-732 gptkb:CWE-862 gptkb:CWE-863 CWE-276 CWE-285 CWE-266 CWE-359 |
| gptkbp:status |
Deprecated
|
| gptkbp:usedIn |
Software security
|
| gptkbp:bfsParent |
gptkb:CVE-2017-0263
|
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
CWE-264
|