CAPEC --> CWE Mappings Added |
CAPEC-2 Inducing Account Lockout |
--> |
CWE-645 |
Overly Restrictive Account Lockout Mechanism |
CAPEC-4 Using Alternative IP Address Encodings |
--> |
CWE-173 |
Improper Handling of Alternate Encoding |
CAPEC-5 Blue Boxing |
--> |
CWE-285 |
Improper Authorization |
CAPEC-6 Argument Injection |
--> |
CWE-74 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
CAPEC-11 Cause Web Server Misclassification |
--> |
CWE-430 |
Deployment of Wrong Handler |
CAPEC-23 File Content Injection |
--> |
CWE-20 |
Improper Input Validation |
CAPEC-38 Leveraging/Manipulating Configuration File Search Paths |
--> |
CWE-427 |
Uncontrolled Search Path Element |
CAPEC-40 Manipulating Writeable Terminal Devices |
--> |
CWE-77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
CAPEC-55 Rainbow Table Password Cracking |
--> |
CWE-916 |
Use of Password Hash With Insufficient Computational Effort |
CAPEC-117 Interception |
--> |
CWE-300 |
Channel Accessible by Non-Endpoint ('Man-in-the-Middle') |
CAPEC-121 Exploit Test APIs |
--> |
CWE-489 |
Leftover Debug Code |
CAPEC-122 Privilege Abuse |
--> |
CWE-269 |
Improper Privilege Management |
CAPEC-123 Buffer Manipulation |
--> |
CWE-119 |
Improper Restriction of Operations within the Bounds of a Memory Buffer |
CAPEC-129 Pointer Manipulation |
--> |
CWE-822 |
Untrusted Pointer Dereference |
--> |
CWE-823 |
Use of Out-of-range Pointer Offset |
CAPEC-133 Try All Common Switches |
--> |
CWE-912 |
Hidden Functionality |
CAPEC-134 Email Injection |
--> |
CWE-150 |
Improper Neutralization of Escape, Meta, or Control Sequences |
CAPEC-137 Parameter Injection |
--> |
CWE-88 |
Argument Injection or Modification |
CAPEC-140 Bypassing of Intermediate Forms in Multiple-Form Sets |
--> |
CWE-372 |
Incomplete Internal State Distinction |
CAPEC-145 Checksum Spoofing |
--> |
CWE-354 |
Improper Validation of Integrity Check Value |
CAPEC-150 Collect Data from Common Resource Locations |
--> |
CWE-552 |
Files or Directories Accessible to External Parties |
CAPEC-153 Input Data Manipulation |
--> |
CWE-20 |
Improper Input Validation |
CAPEC-155 Screen Temporary Files for Sensitive Information |
--> |
CWE-377 |
Insecure Temporary File |
CAPEC-159 Redirect Access to Libraries |
--> |
CWE-706 |
Use of Incorrectly-Resolved Name or Reference |
CAPEC-160 Exploit Script-Based APIs |
--> |
CWE-346 |
Origin Validation Error |
CAPEC-166 Force the System to Reset Values |
--> |
CWE-306 |
Missing Authentication for Critical Function |
CAPEC-170 Web Application Fingerprinting |
--> |
CWE-497 |
Exposure of System Data to an Unauthorized Control Sphere |
CAPEC-174 Flash Parameter Injection |
--> |
CWE-88 |
Argument Injection or Modification |
CAPEC-176 Configuration/Environment Manipulation |
--> |
CWE-15 |
External Control of System or Configuration Setting |
CAPEC-181 Flash File Overlay |
--> |
CWE-1021 |
Improper Restriction of Rendered UI Layers or Frames |
CAPEC-183 IMAP/SMTP Command Injection |
--> |
CWE-77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
CAPEC-190 Reverse Engineer an Executable to Expose Assumed Hidden Functionality |
--> |
CWE-912 |
Hidden Functionality |
CAPEC-222 iFrame Overlay |
--> |
CWE-1021 |
Improper Restriction of Rendered UI Layers or Frames |
CAPEC-226 Session Credential Falsification through Manipulation |
--> |
CWE-472 |
External Control of Assumed-Immutable Web Parameter |
--> |
CWE-565 |
Reliance on Cookies without Validation and Integrity Checking |
CAPEC-228 DTD Injection |
--> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |
CAPEC-233 Privilege Escalation |
--> |
CWE-269 |
Improper Privilege Management |
CAPEC-242 Code Injection |
--> |
CWE-94 |
Improper Control of Generation of Code ('Code Injection') |
CAPEC-244 XSS Targeting URI Placeholders |
--> |
CWE-83 |
Improper Neutralization of Script in Attributes in a Web Page |
CAPEC-251 Local Code Inclusion |
--> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |
CAPEC-252 PHP Local File Inclusion |
--> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |
CAPEC-256 SOAP Array Overflow |
--> |
CWE-805 |
Buffer Access with Incorrect Length Value |
CAPEC-261 Fuzzing for garnering other adjacent user/sensitive data |
--> |
CWE-20 |
Improper Input Validation |
CAPEC-263 Force Use of Corrupted Files |
--> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |
CAPEC-268 Audit Log Manipulation |
--> |
CWE-117 |
Improper Output Neutralization for Logs |
CAPEC-270 Modification of Registry Run Keys |
--> |
CWE-15 |
External Control of System or Configuration Setting |
CAPEC-277 Data Interchange Protocol Manipulation |
--> |
CWE-707 |
Improper Enforcement of Message or Data Structure |
CAPEC-278 Web Services Protocol Manipulation |
--> |
CWE-707 |
Improper Enforcement of Message or Data Structure |
CAPEC-279 SOAP Manipulation |
--> |
CWE-707 |
Improper Enforcement of Message or Data Structure |
CAPEC-389 Content Spoofing Via Application API Manipulation |
--> |
CWE-353 |
Missing Support for Integrity Check |
CAPEC-402 Bypassing ATA Password Security |
--> |
CWE-285 |
Improper Authorization |
CAPEC-474 Signature Spoofing by Key Theft |
--> |
CWE-522 |
Insufficiently Protected Credentials |
CAPEC-475 Signature Spoofing by Improper Validation |
--> |
CWE-327 |
Use of a Broken or Risky Cryptographic Algorithm |
CAPEC-476 Signature Spoofing by Misrepresentation |
--> |
CWE-290 |
Authentication Bypass by Spoofing |
CAPEC-478 Modification of Windows Service Configuration |
--> |
CWE-284 |
Improper Access Control |
CAPEC-482 TCP Flood |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-484 XML Client-Side Attack |
--> |
CWE-91 |
XML Injection (aka Blind XPath Injection) |
CAPEC-486 UDP Flood |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-487 ICMP Flood |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-488 HTTP Flood |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-489 SSL Flood |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-490 Amplification |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-491 XML Quadratic Expansion |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-492 Regular Expression Exponential Blowup |
--> |
CWE-400 |
Uncontrolled Resource Consumption ('Resource Exhaustion') |
CAPEC-493 SOAP Array Blowup |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-494 TCP Fragmentation |
--> |
CWE-404 |
Improper Resource Shutdown or Release |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-495 UDP Fragmentation |
--> |
CWE-404 |
Improper Resource Shutdown or Release |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-496 ICMP Fragmentation |
--> |
CWE-404 |
Improper Resource Shutdown or Release |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-502 Intent Spoof |
--> |
CWE-284 |
Improper Access Control |
CAPEC-503 WebView Exposure |
--> |
CWE-284 |
Improper Access Control |
CAPEC-504 Task Impersonation |
--> |
CWE-1021 |
Improper Restriction of Rendered UI Layers or Frames |
CAPEC-509 Kerberoasting |
--> |
CWE-552 |
Files or Directories Accessible to External Parties |
CAPEC-528 XML Flood |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-533 Malicious Manual Software Update |
--> |
CWE-494 |
Download of Code Without Integrity Check |
CAPEC-537 Infiltration of Hardware Development Environment |
--> |
CWE-125 |
Out-of-bounds Read |
CAPEC-549 Local Execution of Code |
--> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |
CAPEC-550 Install New Service |
--> |
CWE-284 |
Improper Access Control |
CAPEC-551 Modify Existing Service |
--> |
CWE-284 |
Improper Access Control |
--> |
CWE-522 |
Insufficiently Protected Credentials |
CAPEC-552 Install Rootkit |
--> |
CWE-284 |
Improper Access Control |
CAPEC-554 Functionality Bypass |
--> |
CWE-424 |
Improper Protection of Alternate Path |
CAPEC-556 Replace File Extension Handlers |
--> |
CWE-284 |
Improper Access Control |
CAPEC-558 Replace Trusted Executable |
--> |
CWE-284 |
Improper Access Control |
CAPEC-560 Use of Known Domain Credentials |
--> |
CWE-522 |
Insufficiently Protected Credentials |
CAPEC-561 Windows Admin Shares with Stolen Credentials |
--> |
CWE-522 |
Insufficiently Protected Credentials |
CAPEC-562 Modify Shared File |
--> |
CWE-284 |
Improper Access Control |
CAPEC-563 Add Malicious File to Shared Webroot |
--> |
CWE-284 |
Improper Access Control |
CAPEC-564 Run Software at Logon |
--> |
CWE-284 |
Improper Access Control |
CAPEC-578 Disable Security Software |
--> |
CWE-284 |
Improper Access Control |
CAPEC-588 DOM-Based XSS |
--> |
CWE-83 |
Improper Neutralization of Script in Attributes in a Web Page |
CAPEC-589 DNS Blocking |
--> |
CWE-300 |
Channel Accessible by Non-Endpoint ('Man-in-the-Middle') |
CAPEC-590 IP Address Blocking |
--> |
CWE-300 |
Channel Accessible by Non-Endpoint ('Man-in-the-Middle') |
CAPEC-594 Traffic Injection |
--> |
CWE-940 |
Improper Verification of Source of a Communication Channel |
CAPEC-595 Connection Reset |
--> |
CWE-940 |
Improper Verification of Source of a Communication Channel |
CAPEC-596 TCP RST Injection |
--> |
CWE-940 |
Improper Verification of Source of a Communication Channel |
CAPEC-609 Cellular Traffic Intercept |
--> |
CWE-311 |
Missing Encryption of Sensitive Data |
CAPEC-612 WiFi MAC Address Tracking |
--> |
CWE-300 |
Channel Accessible by Non-Endpoint ('Man-in-the-Middle') |
CAPEC-613 WiFi SSID Tracking |
--> |
CWE-300 |
Channel Accessible by Non-Endpoint ('Man-in-the-Middle') |
CAPEC-615 Evil Twin Wi-Fi Attack |
--> |
CWE-300 |
Channel Accessible by Non-Endpoint ('Man-in-the-Middle') |
CAPEC-649 Adding a Space to a File Extension |
--> |
CWE-46 |
Path Equivalence: 'filename ' (Trailing Space) |
CAPEC-650 Upload a Web Shell to a Web Server |
--> |
CWE-287 |
Improper Authentication |
CAPEC --> CWE Mappings Removed |
CAPEC-2 Inducing Account Lockout |
--> |
CWE-400 |
Uncontrolled Resource Consumption ('Resource Exhaustion') |
CAPEC-4 Using Alternative IP Address Encodings |
--> |
CWE-41 |
Improper Resolution of Path Equivalence |
--> |
CWE-180 |
Incorrect Behavior Order: Validate Before Canonicalize |
--> |
CWE-345 |
Insufficient Verification of Data Authenticity |
--> |
CWE-697 |
Incorrect Comparison |
--> |
CWE-707 |
Improper Enforcement of Message or Data Structure |
CAPEC-5 Blue Boxing |
--> |
CWE-264 |
Permissions, Privileges, and Access Controls |
CAPEC-6 Argument Injection |
--> |
CWE-77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
CAPEC-11 Cause Web Server Misclassification |
--> |
CWE-77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
CAPEC-23 File Content Injection |
--> |
CWE-22 |
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
--> |
CWE-23 |
Relative Path Traversal |
--> |
CWE-77 |
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
--> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
--> |
CWE-715 |
OWASP Top Ten 2007 Category A4 - Insecure Direct Object Reference |
CAPEC-40 Manipulating Writeable Terminal Devices |
--> |
CWE-74 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
--> |
CWE-306 |
Missing Authentication for Critical Function |
CAPEC-54 Query System for Information |
--> |
CWE-248 |
Uncaught Exception |
--> |
CWE-717 |
OWASP Top Ten 2007 Category A6 - Information Leakage and Improper Error Handling |
CAPEC-117 Interception |
--> |
CWE-200 |
Information Exposure |
CAPEC-121 Exploit Test APIs |
--> |
CWE-770 |
Allocation of Resources Without Limits or Throttling |
CAPEC-122 Privilege Abuse |
--> |
CWE-434 |
Unrestricted Upload of File with Dangerous Type |
--> |
CWE-602 |
Client-Side Enforcement of Server-Side Security |
CAPEC-124 Shared Data Manipulation |
--> |
CWE-682 |
Incorrect Calculation |
CAPEC-133 Try All Common Switches |
--> |
CWE-88 |
Argument Injection or Modification |
--> |
CWE-559 |
Often Misused: Arguments and Parameters |
--> |
CWE-656 |
Reliance on Security Through Obscurity |
CAPEC-155 Screen Temporary Files for Sensitive Information |
--> |
CWE-311 |
Missing Encryption of Sensitive Data |
CAPEC-159 Redirect Access to Libraries |
--> |
CWE-426 |
Untrusted Search Path |
--> |
CWE-427 |
Uncontrolled Search Path Element |
--> |
CWE-428 |
Unquoted Search Path or Element |
CAPEC-174 Flash Parameter Injection |
--> |
CWE-184 |
Incomplete Blacklist |
--> |
CWE-185 |
Incorrect Regular Expression |
--> |
CWE-697 |
Incorrect Comparison |
CAPEC-190 Reverse Engineer an Executable to Expose Assumed Hidden Functionality or Content |
--> |
CWE-259 |
Use of Hard-coded Password |
--> |
CWE-798 |
Use of Hard-coded Credentials |
CAPEC-191 Read Sensitive Strings Within an Executable |
--> |
CWE-259 |
Use of Hard-coded Password |
CAPEC-196 Session Credential Falsification through Forging |
--> |
CWE-361 |
7PK - Time and State |
CAPEC-228 DTD Injection |
--> |
CWE-100 |
DEPRECATED: Technology-Specific Input Validation Problems |
CAPEC-242 Code Injection |
--> |
CWE-74 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
CAPEC-244 XSS Targeting URI Placeholders |
--> |
CWE-84 |
Improper Neutralization of Encoded URI Schemes in a Web Page |
CAPEC-271 Schema Poisoning |
--> |
CWE-472 |
External Control of Assumed-Immutable Web Parameter |
CAPEC-279 SOAP Manipulation |
--> |
CWE-674 |
Uncontrolled Recursion |
CAPEC-389 Content Spoofing Via Application API Manipulation |
--> |
CWE-311 |
Missing Encryption of Sensitive Data |
--> |
CWE-345 |
Insufficient Verification of Data Authenticity |
--> |
CWE-346 |
Origin Validation Error |
--> |
CWE-602 |
Client-Side Enforcement of Server-Side Security |
CAPEC-474 Signature Spoofing by Key Theft |
--> |
CWE-216 |
Containment Errors (Container Errors) |
--> |
CWE-284 |
Improper Access Control |
--> |
CWE-693 |
Protection Mechanism Failure |
CAPEC-475 Signature Spoofing by Improper Validation |
--> |
CWE-693 |
Protection Mechanism Failure |
CAPEC-478 Modification of Windows Service Configuration |
--> |
CWE-285 |
Improper Authorization |
CAPEC-484 XML Client-Side Attack |
--> |
CWE-19 |
Data Processing Errors |
CAPEC-578 Disable Security Software |
--> |
CWE-285 |
Improper Authorization |
CAPEC-591 Reflected XSS |
--> |
CWE-20 |
Improper Input Validation |
CAPEC-592 Stored XSS |
--> |
CWE-20 |
Improper Input Validation |
CAPEC-640 Inclusion of Code in Existing Process |
--> |
CWE-706 |
Use of Incorrectly-Resolved Name or Reference |
CAPEC-649 Adding a Space to a File Extension |
--> |
CWE-64 |
Windows Shortcut Following (.LNK) |