Existing Patterns
Modified with Enhanced Material
|
CAPEC-3 |
Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-21 |
Exploitation of Trusted Credentials |
CAPEC-32 |
Embedding Scripts in HTTP Query Strings |
CAPEC-37 |
Retrieve Embedded Sensitive Data |
CAPEC-47 |
Buffer Overflow via Parameter Expansion |
CAPEC-54 |
Query System for Information |
CAPEC-62 |
Cross Site Request Forgery (aka Session Riding) |
CAPEC-65 |
Passively Sniff and Capture Application Code Bound for Authorized Client |
CAPEC-69 |
Target Programs with Elevated Privileges |
CAPEC-90 |
Reflection Attack in Authentication Protocol |
CAPEC-93 |
Log Injection-Tampering-Forging |
CAPEC-97 |
Cryptanalysis |
CAPEC-114 |
Authentication Abuse |
CAPEC-115 |
Authentication Bypass |
CAPEC-116 |
Excavation |
CAPEC-127 |
Directory Indexing |
CAPEC-132 |
Symlink Attack |
CAPEC-139 |
Relative Path Traversal |
CAPEC-150 |
Common Resource Location Exploration |
CAPEC-154 |
Resource Location Spoofing |
CAPEC-158 |
Sniffing Network Traffic |
CAPEC-159 |
Redirect Access to Libraries |
CAPEC-167 |
White Box Reverse Engineering |
CAPEC-170 |
Web Application Fingerprinting |
CAPEC-177 |
Create files with the same name as files protected with a higher classification |
CAPEC-180 |
Exploiting Incorrectly Configured Access Control Security Levels |
CAPEC-184 |
Software Integrity Attack |
CAPEC-186 |
Malicious Software Update |
CAPEC-187 |
Malicious Automated Software Update |
CAPEC-188 |
Reverse Engineering |
CAPEC-189 |
Black Box Reverse Engineering |
CAPEC-190 |
Reverse Engineer an Executable to Expose Assumed Hidden Functionality or Content |
CAPEC-191 |
Read Sensitive Strings Within an Executable |
CAPEC-192 |
Protocol Analysis |
CAPEC-203 |
Manipulate Application Registry Values |
CAPEC-204 |
Lifting Sensitive Data Embedded in Cache |
CAPEC-251 |
Local Code Inclusion |
CAPEC-261 |
Fuzzing for garnering other adjacent user/sensitive data |
CAPEC-270 |
Modification of Registry Run Keys |
CAPEC-292 |
Host Discovery |
CAPEC-309 |
Network Topology Mapping |
CAPEC-311 |
OS Fingerprinting |
CAPEC-401 |
Hacking Hardware |
CAPEC-440 |
Hardware Integrity Attack |
CAPEC-441 |
Malicious Logic Insertion |
CAPEC-442 |
Malicious Logic Inserted Into To Product Software |
CAPEC-443 |
Malicious Logic Inserted Into Product Software by Authorized Developer |
CAPEC-444 |
Development Alteration |
CAPEC-447 |
Design Alteration |
CAPEC-456 |
Malicious Logic Insertion into Product Memory |
CAPEC-457 |
USB Memory Attacks |
CAPEC-462 |
Cross-Domain Search Timing |
CAPEC-468 |
Generic Cross-Browser Cross-Domain Theft |
CAPEC-471 |
DLL Search Order Hijacking |
CAPEC-498 |
Probe iOS Screenshots |
CAPEC-511 |
Infiltration of Software Development Environment |
CAPEC-516 |
Hardware Component Substitution During Baselining |
CAPEC-517 |
Documentation Alteration to Circumvent Dial-down |
CAPEC-518 |
Documentation Alteration to Produce Under-performing Systems |
CAPEC-519 |
Documentation Alteration to Cause Errors in System Design |
CAPEC-520 |
Counterfeit Hardware Component Inserted During Product Assembly |
CAPEC-521 |
Hardware Design Specifications Are Altered |
CAPEC-522 |
Malicious Hardware Component Replacement |
CAPEC-523 |
Malicious Software Implanted |
CAPEC-524 |
Rogue Integration Procedures |
CAPEC-530 |
Provide Counterfeit Component |
CAPEC-531 |
Hardware Component Substitution |
CAPEC-532 |
Altered Installed BIOS |
CAPEC-533 |
Malicious Manual Software Update |
CAPEC-534 |
Malicious Hardware Update |
CAPEC-535 |
Malicious Gray Market Hardware |
CAPEC-536 |
Data Injected During Configuration |
CAPEC-537 |
Infiltration of Hardware Development Environment |
CAPEC-538 |
Open Source Libraries Altered |
CAPEC-539 |
ASIC With Malicious Functionality |
CAPEC-542 |
Targeted Malware |
CAPEC-545 |
Pull Data from System Resources |
CAPEC-546 |
Probe Application Memory |
CAPEC-547 |
Physical Destruction of Device or Component |
CAPEC --> CWE
Mappings Added
|
CAPEC-204 Lifting Sensitive Data Embedded in Cache |
--> |
CWE-524 |
Information Exposure Through Caching |
CAPEC-606 Weakening of Cellular Encryption |
--> |
CWE-757 |
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') |
CAPEC-608 Cryptanalysis of Cellular Encryption |
--> |
CWE-327 |
Use of a Broken or Risky Cryptographic Algorithm |
CAPEC-612 WiFi MAC Address Tracking |
--> |
CWE-201 |
Information Exposure Through Sent Data |
CAPEC-613 WiFi SSID Tracking |
--> |
CWE-201 |
Information Exposure Through Sent Data |
CAPEC-614 Rooting SIM CardS |
--> |
CWE-327 |
Use of a Broken or Risky Cryptographic Algorithm |
CAPEC-618 Cellular Broadcast Message Request |
--> |
CWE-201 |
Information Exposure Through Sent Data |
CAPEC-619 Signal Strength Tracking |
--> |
CWE-201 |
Information Exposure Through Sent Data |
CAPEC-620 Drop Encryption Level |
--> |
CWE-757 |
Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') |
CAPEC-621 Analysis of Packet Timing and Sizes |
--> |
CWE-201 |
Information Exposure Through Sent Data |
CAPEC-622 Electromagnetic Side-Channel Attack |
--> |
CWE-201 |
Information Exposure Through Sent Data |
CAPEC-623 Compromising Emanations Attack |
--> |
CWE-201 |
Information Exposure Through Sent Data |
CAPEC --> CWE
Mappings Removed
|
CAPEC-167 Lifting Sensitive Data from the Client |
--> |
CWE-311 |
Missing Encryption of Sensitive Data |
--> |
CWE-642 |
External Control of Critical State Data |
CAPEC-188 Reverse Engineering |
--> |
CWE-259 |
Use of Hard-coded Password |
--> |
CWE-798 |
Use of Hard-coded Credentials |
CAPEC-189 Software Reverse Engineering |
--> |
CWE-259 |
Use of Hard-coded Password |
--> |
CWE-798 |
Use of Hard-coded Credentials |
CAPEC-192 Protocol Reverse Engineering |
--> |
CWE-259 |
Use of Hard-coded Password |
--> |
CWE-798 |
Use of Hard-coded Credentials |