DeprecatedDeprecated DEPRECATED: Abuse of Transaction Data Structure - (257)
DeprecatedDeprecated DEPRECATED: Alter System Components - (526)
DeprecatedDeprecated DEPRECATED: Analyze Target - (281)
DeprecatedDeprecated DEPRECATED: Code Injection - (241)
DeprecatedDeprecated DEPRECATED: Degradation - (602)
DeprecatedDeprecated DEPRECATED: Deplete Resources - (119)
DeprecatedDeprecated DEPRECATED: Directory Traversal - (213)
DeprecatedDeprecated DEPRECATED: DTD Injection in a SOAP Message - (254)
DeprecatedDeprecated DEPRECATED: Environment Variable Manipulation - (264)
DeprecatedDeprecated DEPRECATED: Execute Code - (525)
DeprecatedDeprecated DEPRECATED: Exploitation of Authorization - (232)
DeprecatedDeprecated DEPRECATED: Gain Physical Access - (436)
DeprecatedDeprecated DEPRECATED: Global variable manipulation - (265)
DeprecatedDeprecated DEPRECATED: ICMP Echo Request Ping - (288)
DeprecatedDeprecated DEPRECATED: ICMP Fingerprinting Probes - (316)
DeprecatedDeprecated DEPRECATED: Information Gathering from Non-Traditional Sources - (409)
DeprecatedDeprecated DEPRECATED: Information Gathering from Traditional Sources - (408)
DeprecatedDeprecated DEPRECATED: Infrastructure-based footprinting - (289)
DeprecatedDeprecated DEPRECATED: IP Fingerprinting Probes - (314)
DeprecatedDeprecated DEPRECATED: Leveraging web tools (e.g. Mozilla's GreaseMonkey, Firebug) to change application behavior - (211)
DeprecatedDeprecated DEPRECATED: Lifting credential(s)/key material embedded in client distributions (thick or thin) - (205)
DeprecatedDeprecated DEPRECATED: Malicious Logic Insertion via Counterfeit Hardware - (453)
DeprecatedDeprecated DEPRECATED: Malicious Logic Insertion via Inclusion of Counterfeit Hardware Components - (455)
DeprecatedDeprecated DEPRECATED: Malware Propagation via Infected Peripheral Device - (451)
DeprecatedDeprecated DEPRECATED: Malware Propagation via USB Stick - (449)
DeprecatedDeprecated DEPRECATED: Malware Propagation via USB U3 Autorun - (450)
DeprecatedDeprecated DEPRECATED: Manipulate Canonicalization - (266)
DeprecatedDeprecated DEPRECATED: Manipulate System Users - (527)
DeprecatedDeprecated DEPRECATED: Modification of Existing Components with Counterfeit Hardware - (454)
DeprecatedDeprecated DEPRECATED: OS Fingerprinting - (311)
DeprecatedDeprecated DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Dynamic Update - (258)
DeprecatedDeprecated DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Initial Distribution - (260)
DeprecatedDeprecated DEPRECATED: Passively Sniffing and Capturing Application Code Bound for an Authorized Client During Patching - (259)
DeprecatedDeprecated DEPRECATED: Pretexting - (411)
DeprecatedDeprecated DEPRECATED: Reconnaissance - (286)
DeprecatedDeprecated DEPRECATED: Registry Manipulation - (269)
DeprecatedDeprecated DEPRECATED: Removing/short-circuiting 'guard logic' - (56)
DeprecatedDeprecated DEPRECATED: Social Information Gathering Attacks - (404)
DeprecatedDeprecated DEPRECATED: Social Information Gathering via Research - (405)
DeprecatedDeprecated DEPRECATED: Target Influence via Perception of Concession - (419)
DeprecatedDeprecated DEPRECATED: TCP/IP Fingerprinting Probes - (315)
DeprecatedDeprecated DEPRECATED: Variable Manipulation - (171)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-01 - Insufficient Authentication - (334)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-02 - Insufficient Authorization - (335)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-04 - Insufficient Transport Layer Protection - (337)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-13 - Information Leakage - (346)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-14 - Server Misconfiguration - (347)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-15 - Application Misconfiguration - (348)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-16 - Directory Indexing - (349)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-17 - Improper Filesystem Permissions - (350)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-20 - Improper Input Handling - (353)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-21 - Insufficient Anti-automation - (354)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-22 - Improper Output Handling - (355)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-40 - Insufficient Process Validation - (373)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-47 - Insufficient Session Expiration - (380)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-48 - Insecure Indexing - (381)
DeprecatedDeprecated DEPRECATED: WASC Threat Classification 2.0 - WASC-49 - Insufficient Password Recovery - (382)
DeprecatedDeprecated DEPRECATED: XSS in IMG Tags - (91)
DeprecatedDeprecated DEPRECATED: XSS through Log Files - (106)
DeprecatedDeprecated DEPRECATED: XSS Using Flash - (246)