Deprecated
DEPRECATED: Abuse of Transaction Data Structure
-
(257)
Deprecated
DEPRECATED: Alter System Components
-
(526)
Deprecated
DEPRECATED: Analyze Target
-
(281)
Deprecated
DEPRECATED: Code Injection
-
(241)
Deprecated
DEPRECATED: Degradation
-
(602)
Deprecated
DEPRECATED: Deplete Resources
-
(119)
Deprecated
DEPRECATED: Directory Traversal
-
(213)
Deprecated
DEPRECATED: DTD Injection in a SOAP Message
-
(254)
Deprecated
DEPRECATED: Environment Variable Manipulation
-
(264)
Deprecated
DEPRECATED: Execute Code
-
(525)
Deprecated
DEPRECATED: Exploitation of Authorization
-
(232)
Deprecated
DEPRECATED: Gain Physical Access
-
(436)
Deprecated
DEPRECATED: Global variable manipulation
-
(265)
Deprecated
DEPRECATED: ICMP Echo Request Ping
-
(288)
Deprecated
DEPRECATED: ICMP Fingerprinting Probes
-
(316)
Deprecated
DEPRECATED: Information Gathering from Non-Traditional Sources
-
(409)
Deprecated
DEPRECATED: Information Gathering from Traditional Sources
-
(408)
Deprecated
DEPRECATED: Infrastructure-based footprinting
-
(289)
Deprecated
DEPRECATED: IP Fingerprinting Probes
-
(314)
Deprecated
DEPRECATED: Leveraging web tools (e.g. Mozilla's GreaseMonkey, Firebug) to change application behavior
-
(211)
Deprecated
DEPRECATED: Lifting credential(s)/key material embedded in client distributions (thick or thin)
-
(205)
Deprecated
DEPRECATED: Malicious Logic Insertion via Counterfeit Hardware
-
(453)
Deprecated
DEPRECATED: Malicious Logic Insertion via Inclusion of Counterfeit Hardware Components
-
(455)
Deprecated
DEPRECATED: Malware Propagation via Infected Peripheral Device
-
(451)
Deprecated
DEPRECATED: Malware Propagation via USB Stick
-
(449)
Deprecated
DEPRECATED: Malware Propagation via USB U3 Autorun
-
(450)
Deprecated
DEPRECATED: Manipulate Canonicalization
-
(266)
Deprecated
DEPRECATED: Manipulate System Users
-
(527)
Deprecated
DEPRECATED: Modification of Existing Components with Counterfeit Hardware
-
(454)
Deprecated
DEPRECATED: OS Fingerprinting
-
(311)
Deprecated
DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Dynamic Update
-
(258)
Deprecated
DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Initial Distribution
-
(260)
Deprecated
DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Patching
-
(259)
Deprecated
DEPRECATED: Pretexting
-
(411)
Deprecated
DEPRECATED: Reconnaissance
-
(286)
Deprecated
DEPRECATED: Registry Manipulation
-
(269)
Deprecated
DEPRECATED: Removing/short-circuiting 'guard logic'
-
(56)
Deprecated
DEPRECATED: Social Information Gathering Attacks
-
(404)
Deprecated
DEPRECATED: Social Information Gathering via Research
-
(405)
Deprecated
DEPRECATED: Target Influence via Perception of Concession
-
(419)
Deprecated
DEPRECATED: TCP/IP Fingerprinting Probes
-
(315)
Deprecated
DEPRECATED: Variable Manipulation
-
(171)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-01 - Insufficient Authentication
-
(334)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-02 - Insufficient Authorization
-
(335)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-04 - Insufficient Transport Layer Protection
-
(337)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-13 - Information Leakage
-
(346)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-14 - Server Misconfiguration
-
(347)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-15 - Application Misconfiguration
-
(348)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-16 - Directory Indexing
-
(349)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-17 - Improper Filesystem Permissions
-
(350)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-20 - Improper Input Handling
-
(353)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-21 - Insufficient Anti-automation
-
(354)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-22 - Improper Output Handling
-
(355)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-40 - Insufficient Process Validation
-
(373)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-47 - Insufficient Session Expiration
-
(380)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-48 - Insecure Indexing
-
(381)
Deprecated
DEPRECATED: WASC Threat Classification 2.0 - WASC-49 - Insufficient Password Recovery
-
(382)
Deprecated
DEPRECATED: XSS in IMG Tags
-
(91)
Deprecated
DEPRECATED: XSS through Log Files
-
(106)
Deprecated
DEPRECATED: XSS Using Flash
-
(246)