Home > CAPEC List > CAPEC-483: Deprecated Entries (Version 2.9)  

CAPEC VIEW: Deprecated Entries

 
Deprecated Entries
Definition in a New Window Definition in a New Window
View ID: 483
Structure: Implicit Slice
Status: Draft
+ View Objective

CAPEC nodes in this view (slice) have been deprecated.

+ Relationships
DeprecatedDeprecated Abuse of Transaction Data Structure - (257)
DeprecatedDeprecated Alter System Components - (526)
DeprecatedDeprecated Analyze Target - (281)
DeprecatedDeprecated Code Injection - (241)
DeprecatedDeprecated Degradation - (602)
DeprecatedDeprecated Deplete Resources - (119)
DeprecatedDeprecated DEPRECATED: Directory Traversal - (213)
DeprecatedDeprecated DEPRECATED: ICMP Echo Request Ping - (288)
DeprecatedDeprecated DEPRECATED: Infrastructure-based footprinting - (289)
DeprecatedDeprecated DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Dynamic Update - (258)
DeprecatedDeprecated DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Initial Distribution - (260)
DeprecatedDeprecated DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Patching - (259)
DeprecatedDeprecated DEPRECATED: Pretexting - (411)
DeprecatedDeprecated DEPRECATED: Registry Manipulation - (269)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-01 - Insufficient Authentication - (334)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-02 - Insufficient Authorization - (335)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-04 - Insufficient Transport Layer Protection - (337)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-13 - Information Leakage - (346)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-14 - Server Misconfiguration - (347)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-15 - Application Misconfiguration - (348)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-16 - Directory Indexing - (349)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-17 - Improper Filesystem Permissions - (350)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-20 - Improper Input Handling - (353)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-21 - Insufficient Anti-automation - (354)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-22 - Improper Output Handling - (355)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-40 - Insufficient Process Validation - (373)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-47 - Insufficient Session Expiration - (380)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-48 - Insecure Indexing - (381)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-49 - Insufficient Password Recovery - (382)
DeprecatedDeprecated DTD Injection in a SOAP Message - (254)
DeprecatedDeprecated Environment Variable Manipulation - (264)
DeprecatedDeprecated Execute Code - (525)
DeprecatedDeprecated Exploitation of Authorization - (232)
DeprecatedDeprecated Gain Physical Access - (436)
DeprecatedDeprecated Global variable manipulation - (265)
DeprecatedDeprecated Leveraging web tools (e.g. Mozilla's GreaseMonkey, Firebug) to change application behavior - (211)
DeprecatedDeprecated Lifting credential(s)/key material embedded in client distributions (thick or thin) - (205)
DeprecatedDeprecated Malicious Logic Insertion via Counterfeit Hardware - (453)
DeprecatedDeprecated Malicious Logic Insertion via Inclusion of Counterfeit Hardware Components - (455)
DeprecatedDeprecated Malware Propagation via Infected Peripheral Device - (451)
DeprecatedDeprecated Malware Propagation via USB Stick - (449)
DeprecatedDeprecated Malware Propagation via USB U3 Autorun - (450)
DeprecatedDeprecated Manipulate Canonicalization - (266)
DeprecatedDeprecated Manipulate System Users - (527)
DeprecatedDeprecated Modification of Existing Components with Counterfeit Hardware - (454)
DeprecatedDeprecated Reconnaissance - (286)
DeprecatedDeprecated Removing/short-circuiting 'guard logic' - (56)
DeprecatedDeprecated Variable Manipulation - (171)
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team

Filter Used: .//@Status='Deprecated'

CAPECs in this viewTotal CAPECs
Total48out of609
Views0out of9
Categories23out of72
Attack Patterns25out of528

More information is available — Please select a different filter.
Page Last Updated or Reviewed: December 07, 2015