| Existing Patterns
Modified with Enhanced Material
|
| CAPEC-3 |
Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
| CAPEC-21 |
Exploitation of Trusted Credentials |
| CAPEC-32 |
Embedding Scripts in HTTP Query Strings |
| CAPEC-37 |
Retrieve Embedded Sensitive Data |
| CAPEC-47 |
Buffer Overflow via Parameter Expansion |
| CAPEC-54 |
Query System for Information |
| CAPEC-62 |
Cross Site Request Forgery (aka Session Riding) |
| CAPEC-65 |
Passively Sniff and Capture Application Code Bound for Authorized Client |
| CAPEC-69 |
Target Programs with Elevated Privileges |
| CAPEC-90 |
Reflection Attack in Authentication Protocol |
| CAPEC-93 |
Log Injection-Tampering-Forging |
| CAPEC-97 |
Cryptanalysis |
| CAPEC-114 |
Authentication Abuse |
| CAPEC-115 |
Authentication Bypass |
| CAPEC-116 |
Excavation |
| CAPEC-127 |
Directory Indexing |
| CAPEC-132 |
Symlink Attack |
| CAPEC-139 |
Relative Path Traversal |
| CAPEC-150 |
Common Resource Location Exploration |
| CAPEC-154 |
Resource Location Spoofing |
| CAPEC-158 |
Sniffing Network Traffic |
| CAPEC-159 |
Redirect Access to Libraries |
| CAPEC-167 |
White Box Reverse Engineering |
| CAPEC-170 |
Web Application Fingerprinting |
| CAPEC-177 |
Create files with the same name as files protected with a higher classification |
| CAPEC-180 |
Exploiting Incorrectly Configured Access Control Security Levels |
| CAPEC-184 |
Software Integrity Attack |
| CAPEC-186 |
Malicious Software Update |
| CAPEC-187 |
Malicious Automated Software Update |
| CAPEC-188 |
Reverse Engineering |
| CAPEC-189 |
Black Box Reverse Engineering |
| CAPEC-190 |
Reverse Engineer an Executable to Expose Assumed Hidden Functionality or Content |
| CAPEC-191 |
Read Sensitive Strings Within an Executable |
| CAPEC-192 |
Protocol Analysis |
| CAPEC-203 |
Manipulate Application Registry Values |
| CAPEC-204 |
Lifting Sensitive Data Embedded in Cache |
| CAPEC-251 |
Local Code Inclusion |
| CAPEC-261 |
Fuzzing for garnering other adjacent user/sensitive data |
| CAPEC-270 |
Modification of Registry Run Keys |
| CAPEC-292 |
Host Discovery |
| CAPEC-309 |
Network Topology Mapping |
| CAPEC-311 |
OS Fingerprinting |
| CAPEC-401 |
Hacking Hardware |
| CAPEC-440 |
Hardware Integrity Attack |
| CAPEC-441 |
Malicious Logic Insertion |
| CAPEC-442 |
Malicious Logic Inserted Into To Product Software |
| CAPEC-443 |
Malicious Logic Inserted Into Product Software by Authorized Developer |
| CAPEC-444 |
Development Alteration |
| CAPEC-447 |
Design Alteration |
| CAPEC-456 |
Malicious Logic Insertion into Product Memory |
| CAPEC-457 |
USB Memory Attacks |
| CAPEC-462 |
Cross-Domain Search Timing |
| CAPEC-468 |
Generic Cross-Browser Cross-Domain Theft |
| CAPEC-471 |
DLL Search Order Hijacking |
| CAPEC-498 |
Probe iOS Screenshots |
| CAPEC-511 |
Infiltration of Software Development Environment |
| CAPEC-516 |
Hardware Component Substitution During Baselining |
| CAPEC-517 |
Documentation Alteration to Circumvent Dial-down |
| CAPEC-518 |
Documentation Alteration to Produce Under-performing Systems |
| CAPEC-519 |
Documentation Alteration to Cause Errors in System Design |
| CAPEC-520 |
Counterfeit Hardware Component Inserted During Product Assembly |
| CAPEC-521 |
Hardware Design Specifications Are Altered |
| CAPEC-522 |
Malicious Hardware Component Replacement |
| CAPEC-523 |
Malicious Software Implanted |
| CAPEC-524 |
Rogue Integration Procedures |
| CAPEC-530 |
Provide Counterfeit Component |
| CAPEC-531 |
Hardware Component Substitution |
| CAPEC-532 |
Altered Installed BIOS |
| CAPEC-533 |
Malicious Manual Software Update |
| CAPEC-534 |
Malicious Hardware Update |
| CAPEC-535 |
Malicious Gray Market Hardware |
| CAPEC-536 |
Data Injected During Configuration |
| CAPEC-537 |
Infiltration of Hardware Development Environment |
| CAPEC-538 |
Open Source Libraries Altered |
| CAPEC-539 |
ASIC With Malicious Functionality |
| CAPEC-542 |
Targeted Malware |
| CAPEC-545 |
Pull Data from System Resources |
| CAPEC-546 |
Probe Application Memory |
| CAPEC-547 |
Physical Destruction of Device or Component |
| CAPEC --> CWE
Mappings Added
|
| CAPEC-204 Lifting Sensitive Data Embedded in Cache |
| --> |
CWE-524 |
Information Exposure Through Caching |
| CAPEC-606 Weakening of Cellular Encryption |
| --> |
CWE-757 |
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') |
| CAPEC-608 Cryptanalysis of Cellular Encryption |
| --> |
CWE-327 |
Use of a Broken or Risky Cryptographic Algorithm |
| CAPEC-612 WiFi MAC Address Tracking |
| --> |
CWE-201 |
Information Exposure Through Sent Data |
| CAPEC-613 WiFi SSID Tracking |
| --> |
CWE-201 |
Information Exposure Through Sent Data |
| CAPEC-614 Rooting SIM CardS |
| --> |
CWE-327 |
Use of a Broken or Risky Cryptographic Algorithm |
| CAPEC-618 Cellular Broadcast Message Request |
| --> |
CWE-201 |
Information Exposure Through Sent Data |
| CAPEC-619 Signal Strength Tracking |
| --> |
CWE-201 |
Information Exposure Through Sent Data |
| CAPEC-620 Drop Encryption Level |
| --> |
CWE-757 |
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') |
| CAPEC-621 Analysis of Packet Timing and Sizes |
| --> |
CWE-201 |
Information Exposure Through Sent Data |
| CAPEC-622 Electromagnetic Side-Channel Attack |
| --> |
CWE-201 |
Information Exposure Through Sent Data |
| CAPEC-623 Compromising Emanations Attack |
| --> |
CWE-201 |
Information Exposure Through Sent Data |
| CAPEC --> CWE
Mappings Removed
|
| CAPEC-167 Lifting Sensitive Data from the Client |
| --> |
CWE-311 |
Missing Encryption of Sensitive Data |
| --> |
CWE-642 |
External Control of Critical State Data |
| CAPEC-188 Reverse Engineering |
| --> |
CWE-259 |
Use of Hard-coded Password |
| --> |
CWE-798 |
Use of Hard-coded Credentials |
| CAPEC-189 Software Reverse Engineering |
| --> |
CWE-259 |
Use of Hard-coded Password |
| --> |
CWE-798 |
Use of Hard-coded Credentials |
| CAPEC-192 Protocol Reverse Engineering |
| --> |
CWE-259 |
Use of Hard-coded Password |
| --> |
CWE-798 |
Use of Hard-coded Credentials |