CWE-200
Weakness ID:200(Weakness Class)
Status: Incomplete
R
v
̘RƂ́AYɃANZX邽߂̔FIɎĂȂ҂ɑĤӐ}Iɂ邢͈Ӑ}ɊJ邱ƂłB
ڍׂȉ
Ƃ́Aȉ̂ꂩw܂B
1) bZ[WȂǁAî̋@\̒ŐTdɈ
2) U҂ɂƂėLvʏ͓\łȂAiɊւ ([gŃANZX\ȐiCXg[pXȂ)
̘Ȓ́A̐Ǝ㐫Ɗ֘AʂƂĔ܂ (FPHP XNvgG[ɂpX̘R) APƂŔ\܂ (FÍɂ^C~O̕sv) B̘RƎ㐫͑푽lłB̐Ǝ㐫̉ex́AR̎ނɈˑ܂B
ʖ
Information DisclosureiJj:
̗p͐Ǝ㐫f[^x[X₻̑̏ɂĎgp܂A"disclosure(J)" ƂtɃZLeBɊւӖ܂ނ킯ł͂܂B܂A@֘A̕ɂĂ悭gpĂ܂AZLeBɊ֘ǍJɂĂ͌yĂ܂B
Information LeakiRj:
"leak" Ƃt悭gp܂AZLeBɂĂ͕̈Ӗ܂Bŏ炳邱ƂwʁA"memory leak([N)" ̂悤Ɍ͊ɂȂ悤ȃ\[X̕sȒǐՂwꍇ܂B̂߁ACWE ł "leak" ̎gpĂ܂B
Ǝ㐫̔
A[LeN`ѐv
YvbgtH[
S
U\
Q̊ɘa
Mł鋫EŖmɋuSȁvmۂ邽߁AVXe敪ĉB@Mł鋫E̊OɏočsƂAS̈̊ŐɃC^[tF[XŌꍇ͒ӂĉB
ɂ鑼̐Ǝ㐫Ƃ̈ˑW
ˑW | ڍ |
---|---|
ˑI | ̐Ǝ㐫݂邱Ƃɂ蔭 |
W
Nature | Type | ID | Name | View(s) this relationship pertains to |
---|---|---|---|---|
ChildOf | Category | 199 | Information Management Errors | Development Concepts (primary)699 |
ChildOf | Weakness Class | 668 | Exposure of Resource to Wrong Sphere | Research Concepts (primary)1000 |
ChildOf | Category | 717 | OWASP Top Ten 2007 Category A6 - Information Leakage and Improper Error Handling | Weaknesses in OWASP Top Ten (2007) (primary)629 |
ParentOf | Weakness Variant | 201 | Information Exposure Through Sent Data | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Variant | 202 | Privacy Leak through Data Queries | Development Concepts (primary)699 |
ParentOf | Weakness Class | 203 | Information Exposure Through Discrepancy | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Base | 209 | Information Exposure Through an Error Message | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Base | 212 | Improper Cross-boundary Removal of Sensitive Data | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Base | 213 | Intended Information Leak | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Variant | 214 | Process Environment Information Leak | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Variant | 215 | Information Exposure Through Debug Information | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Base | 226 | Sensitive Information Uncleared Before Release | Development Concepts (primary)699 |
Research Concepts1000 | ||||
ParentOf | Weakness Class | 359 | Privacy Violation | Research Concepts (primary)1000 |
ParentOf | Weakness Variant | 497 | Exposure of System Data to an Unauthorized Control Sphere | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Variant | 524 | Information Leak Through Caching | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Variant | 526 | Information Leak Through Environmental Variables | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Base | 538 | File and Directory Information Exposure | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Variant | 598 | Information Leak Through Query Strings in GET Request | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
ParentOf | Weakness Variant | 612 | Information Leak Through Indexing of Private Data | Development Concepts (primary)699 |
Research Concepts (primary)1000 | ||||
MemberOf | View | 635 | Weaknesses Used by NVD | Weaknesses Used by NVD (primary)635 |
CanFollow | Weakness Variant | 498 | Information Leak through Class Cloning | Development Concepts699 |
Research Concepts1000 | ||||
CanFollow | Weakness Variant | 499 | Serializable Class Containing Sensitive Data | Development Concepts699 |
Research Concepts1000 |
gDł̕
gD܂͑gDł̕ | m[h ID | CWE̕ނƂ̓Kx | ޖ |
---|---|---|---|
PLOVER | Information Leak (information disclosure) | ||
OWASP Top Ten 2007 | A6 | CWE ̕ڍ | Information Leakage and Improper Error Handling |
WASC | 13 | Information Leakage |
֘AUp^[
CAPEC-ID | Up^[ (CAPEC Version 1.5) |
---|---|
13 | Subverting Environment Variable Values |
22 | Exploiting Trust in Client (aka Make the Client Invisible) |
59 | Session Credential Falsification through Prediction |
60 | Reusing Session IDs (aka Session Replay) |
79 | Using Slashes in Alternate Encoding |
281 | Analytic Attacks |
XV
[2011N0421]
2010N1012_̃f[^ɍXV
[2009N0629]
2009N0202_̉L URL ɍ쐬
http://cwe.mitre.org/data/definitions/200.html
o^ 2011/04/21
ŏIXV 2023/04/04