Home > CAPEC List > CAPEC-513: Software (Version 2.11)  

CAPEC CATEGORY: Software

 
Software
Definition in a New Window Definition in a New Window
Category ID: 513
 
Status: Draft
+ Description

Summary

Attack patterns within this category focus on the exploitation of software applications. The techniques defined by each pattern are used to exploit these weaknesses in the application's design or implementation in an attempt to achieve a desired negative technical impact.
+ Relationships
NatureTypeIDNameView(s) this relationship pertains toView(s)
HasMemberMeta Attack PatternMeta Attack Pattern112Brute Force
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern114Authentication Abuse
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern115Authentication Bypass
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern116Excavation
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern123Buffer Manipulation
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern125Flooding
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern129Pointer Manipulation
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern130Excessive Allocation
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern131Resource Leak Exposure
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern137Parameter Injection
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern148Content Spoofing
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern151Identity Spoofing
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern153Input Data Manipulation
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern154Resource Location Spoofing
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern169Footprinting
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern173Action Spoofing
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern175Code Inclusion
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern184Software Integrity Attack
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern188Reverse Engineering
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern212Functionality Misuse
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern224Fingerprinting
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern227Sustained Client Engagement
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern242Code Injection
Domains of Attack (primary)3000
HasMemberMeta Attack PatternMeta Attack Pattern248Command Injection
Domains of Attack (primary)3000
MemberOfViewView3000Domains of Attack
Domains of Attack3000
+ Content History
Submissions
SubmitterOrganizationDateSource
CAPEC Content TeamThe MITRE Corporation2014-06-23Internal_CAPEC_Team
Modifications
ModifierOrganizationDateCommentsSource
CAPEC Content TeamThe MITRE Corporation2015-11-09Updated RelationshipsInternal
CAPEC Content TeamThe MITRE Corporation2017-01-09Updated RelationshipsInternal

More information is available — Please select a different filter.
Page Last Updated or Reviewed: July 31, 2017