New to CAPEC? Start Here
Home > CAPEC List > Reports > Differences between 3.1 and 3.2 Content  

Differences between 3.1 and 3.2 Content

Summary

Total (3.2) (not including Deprecated) 575
Total (3.1) (not including Deprecated) 577
Attack Patterns
New Patterns Added 2
Existing Patterns Modified with Enhanced Material 125
Patterns Deprecated 4
Categories
Existing Categories Modified with Enhanced Material 7
CAPEC -> CWE Mappings
CAPEC -> CWE Mappings Added 3
CAPEC -> CWE Mappings Removed 12
CAPEC -> CAPEC Mappings
CAPEC -> CAPEC Mappings Added 39
CAPEC -> CAPEC Mappings Removed 19

Summary of Entry Types

Type 3.1 3.2
Views 9 9
Categories 49 49
Attack Patterns 519 517
Deprecated 72 76

Attack Pattern Changes

New Patterns Added
CAPEC-480 Escaping Virtualization
CAPEC-497 File Discovery

Existing Patterns Modified with Enhanced Material
CAPEC-6 Argument Injection
CAPEC-13 Subverting Environment Variable Values
CAPEC-15 Command Delimiters
CAPEC-22 Exploiting Trust in Client
CAPEC-27 Leveraging Race Conditions via Symbolic Links
CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-54 Query System for Information
CAPEC-57 Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
CAPEC-75 Manipulating Writeable Configuration Files
CAPEC-90 Reflection Attack in Authentication Protocol
CAPEC-94 Man in the Middle Attack
CAPEC-96 Block Access to Libraries
CAPEC-111 JSON Hijacking (aka JavaScript Hijacking)
CAPEC-117 Interception
CAPEC-134 Email Injection
CAPEC-135 Format String Injection
CAPEC-138 Reflection Injection
CAPEC-141 Cache Poisoning
CAPEC-143 Detect Unpublicized Web Pages
CAPEC-144 Detect Unpublicized Web Services
CAPEC-149 Explore for Predictable Temporary File Names
CAPEC-155 Screen Temporary Files for Sensitive Information
CAPEC-157 Sniffing Attacks
CAPEC-166 Force the System to Reset Values
CAPEC-174 Flash Parameter Injection
CAPEC-181 Flash File Overlay
CAPEC-185 Malicious Software Download
CAPEC-187 Malicious Automated Software Update
CAPEC-203 Manipulate Registry Information
CAPEC-222 iFrame Overlay
CAPEC-230 XML Nested Payloads
CAPEC-231 XML Oversized Payloads
CAPEC-237 Escaping a Sandbox by Calling Signed Code in Another Language
CAPEC-268 Audit Log Manipulation
CAPEC-274 HTTP Verb Tampering
CAPEC-285 ICMP Echo Request Ping
CAPEC-292 Host Discovery
CAPEC-294 ICMP Address Mask Request
CAPEC-295 Timestamp Request
CAPEC-296 ICMP Information Request
CAPEC-297 TCP ACK Ping
CAPEC-298 UDP Ping
CAPEC-299 TCP SYN Ping
CAPEC-300 Port Scanning
CAPEC-384 Application API Message Manipulation via Man-in-the-Middle
CAPEC-385 Transaction or Event Tampering via Application API Manipulation
CAPEC-386 Application API Navigation Remapping
CAPEC-387 Navigation Remapping To Propagate Malicious Content
CAPEC-388 Application API Button Hijacking
CAPEC-389 Content Spoofing Via Application API Manipulation
CAPEC-391 Bypassing Physical Locks
CAPEC-392 Lock Bumping
CAPEC-393 Lock Picking
CAPEC-394 Using a Snap Gun Lock to Force a Lock
CAPEC-397 Cloning Magnetic Strip Cards
CAPEC-398 Magnetic Strip Card Brute Force Attacks
CAPEC-399 Cloning RFID Cards or Chips
CAPEC-400 RFID Chip Deactivation or Destruction
CAPEC-406 Dumpster Diving
CAPEC-412 Pretexting via Customer Service
CAPEC-413 Pretexting via Tech Support
CAPEC-414 Pretexting via Delivery Person
CAPEC-415 Pretexting via Phone
CAPEC-442 Infected Software
CAPEC-443 Malicious Logic Inserted Into Product Software by Authorized Developer
CAPEC-445 Malicious Logic Insertion into Product Software via Configuration Management Manipulation
CAPEC-446 Malicious Logic Insertion into Product Software via Inclusion of 3rd Party Component Dependency
CAPEC-447 Design Alteration
CAPEC-448 Embed Virus into DLL
CAPEC-452 Infected Hardware
CAPEC-456 Infected Memory
CAPEC-465 Transparent Proxy Abuse
CAPEC-466 Leveraging Active Man in the Middle Attacks to Bypass Same Origin Policy
CAPEC-481 Contradictory Destinations in Traffic Routing Schemes
CAPEC-490 Amplification
CAPEC-492 Regular Expression Exponential Blowup
CAPEC-493 SOAP Array Blowup
CAPEC-499 Intent Intercept
CAPEC-501 Activity Hijack
CAPEC-504 Task Impersonation
CAPEC-505 Scheme Squatting
CAPEC-506 Tapjacking
CAPEC-511 Infiltration of Software Development Environment
CAPEC-516 Hardware Component Substitution During Baselining
CAPEC-517 Documentation Alteration to Circumvent Dial-down
CAPEC-518 Documentation Alteration to Produce Under-performing Systems
CAPEC-519 Documentation Alteration to Cause Errors in System Design
CAPEC-520 Counterfeit Hardware Component Inserted During Product Assembly
CAPEC-528 XML Flood
CAPEC-532 Altered Installed BIOS
CAPEC-537 Infiltration of Hardware Development Environment
CAPEC-538 Open Source Libraries Altered
CAPEC-539 ASIC With Malicious Functionality
CAPEC-545 Pull Data from System Resources
CAPEC-547 Physical Destruction of Device or Component
CAPEC-569 Collect Data as Provided by Users
CAPEC-572 Artificially Inflate File Sizes
CAPEC-573 Process Footprinting
CAPEC-574 Services Footprinting
CAPEC-575 Account Footprinting
CAPEC-576 Group Permission Footprinting
CAPEC-577 Owner Footprinting
CAPEC-578 Disable Security Software
CAPEC-582 Route Disabling
CAPEC-583 Disabling Network Hardware
CAPEC-584 BGP Route Disabling
CAPEC-585 DNS Domain Seizure
CAPEC-591 Reflected XSS
CAPEC-592 Stored XSS
CAPEC-601 Jamming
CAPEC-603 Blockage
CAPEC-609 Cellular Traffic Intercept
CAPEC-610 Cellular Data Injection
CAPEC-613 WiFi SSID Tracking
CAPEC-614 Rooting SIM Cards
CAPEC-615 Evil Twin Wi-Fi Attack
CAPEC-617 Cellular Rogue Base Station
CAPEC-625 Mobile Device Fault Injection
CAPEC-626 Smudge Attack
CAPEC-629 Unauthorized Use of Device Resources
CAPEC-637 Collect Data from Clipboard
CAPEC-646 Peripheral Footprinting
CAPEC-647 Collect Data from Registries
CAPEC-648 Collect Data from Screen Capture

Patterns Deprecated
CAPEC-396 DEPRECATED: Bypassing Card or Badge-Based Systems
CAPEC-484 DEPRECATED: XML Client-Side Attack
CAPEC-82 DEPRECATED: Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Service (XDoS))
CAPEC-99 DEPRECATED: XML Parser Attack

Category Changes

New Categories Added

Existing Categories Modified with Enhanced Material
CAPEC-225 Subvert Access Control
CAPEC-403 Social Engineering
CAPEC-437 Supply Chain
CAPEC-512 Communications
CAPEC-513 Software
CAPEC-514 Physical Security
CAPEC-515 Hardware

Categories Deprecated

View Changes

Views Added

Existing Views Modified with Enhanced Material

Views Deprecated

Mapping Changes

CAPEC --> CWE Mappings Added
CAPEC-117 Interception
  --> CWE-319 Cleartext Transmission of Sensitive Information
CAPEC-480 Escaping Virtualization
  --> CWE-693 Protection Mechanism Failure
CAPEC-497 File Discovery
  --> CWE-200 Information Exposure

CAPEC --> CWE Mappings Removed
CAPEC-82 Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Service (XDoS))
  --> CWE-400 Uncontrolled Resource Consumption
  --> CWE-674 Uncontrolled Recursion
  --> CWE-770 Allocation of Resources Without Limits or Throttling
CAPEC-99 XML Parser Attack
  --> CWE-19 Data Processing Errors
  --> CWE-20 Improper Input Validation
  --> CWE-112 Missing XML Validation
  --> CWE-674 Uncontrolled Recursion
  --> CWE-770 Allocation of Resources Without Limits or Throttling
CAPEC-117 Interception
  --> CWE-300 Channel Accessible by Non-Endpoint ('Man-in-the-Middle')
CAPEC-484 XML Client-Side Attack
  --> CWE-20 Improper Input Validation
  --> CWE-91 XML Injection (aka Blind XPath Injection)
  --> CWE-112 Missing XML Validation

CAPEC --> CAPEC Mappings Added
CAPEC-27 Leveraging Race Conditions via Symbolic Links
Has Child   --> CAPEC-29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-57 Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
Has Child   --> CAPEC-157 Sniffing Attacks
CAPEC-149 Explore for Predictable Temporary File Names
Has Child   --> CAPEC-497 File Discovery
CAPEC-225 Subvert Access Control
Has Member   --> CAPEC-94 Man in the Middle Attack
CAPEC-237 Escaping a Sandbox by Calling Signed Code in Another Language
Has Child   --> CAPEC-480 Escaping Virtualization
CAPEC-386 Application API Navigation Remapping
Has Child   --> CAPEC-94 Man in the Middle Attack
CAPEC-397 Cloning Magnetic Strip Cards
Has Child   --> CAPEC-395 Bypassing Electronic Locks and Access Controls
CAPEC-398 Magnetic Strip Card Brute Force Attacks
Has Child   --> CAPEC-395 Bypassing Electronic Locks and Access Controls
CAPEC-399 Cloning RFID Cards or Chips
Has Child   --> CAPEC-395 Bypassing Electronic Locks and Access Controls
CAPEC-400 RFID Chip Deactivation or Destruction
Has Child   --> CAPEC-395 Bypassing Electronic Locks and Access Controls
CAPEC-403 Social Engineering
Has Member   --> CAPEC-137 Parameter Injection
Has Member   --> CAPEC-173 Action Spoofing
Has Member   --> CAPEC-184 Software Integrity Attack
Has Member   --> CAPEC-607 Obstruction
CAPEC-437 Supply Chain
Has Member   --> CAPEC-176 Configuration/Environment Manipulation
Has Member   --> CAPEC-440 Hardware Integrity Attack
Has Member   --> CAPEC-441 Malicious Logic Insertion
CAPEC-480 Escaping Virtualization
Has Child   --> CAPEC-115 Authentication Bypass
CAPEC-497 File Discovery
Has Child   --> CAPEC-169 Footprinting
CAPEC-512 Communications
Has Member   --> CAPEC-94 Man in the Middle Attack
Has Member   --> CAPEC-125 Flooding
Has Member   --> CAPEC-130 Excessive Allocation
Has Member   --> CAPEC-240 Resource Injection
Has Member   --> CAPEC-624 Fault Injection
CAPEC-513 Software
Has Member   --> CAPEC-94 Man in the Middle Attack
Has Member   --> CAPEC-117 Interception
Has Member   --> CAPEC-161 Infrastructure Manipulation
Has Member   --> CAPEC-272 Protocol Manipulation
Has Member   --> CAPEC-410 Information Elicitation
Has Member   --> CAPEC-438 Modification During Manufacture
Has Member   --> CAPEC-594 Traffic Injection
Has Member   --> CAPEC-607 Obstruction
CAPEC-514 Physical Security
Has Member   --> CAPEC-116 Excavation
Has Member   --> CAPEC-188 Reverse Engineering
Has Member   --> CAPEC-440 Hardware Integrity Attack
CAPEC-515 Hardware
Has Member   --> CAPEC-438 Modification During Manufacture
Has Member   --> CAPEC-607 Obstruction
CAPEC-572 Artificially Inflate File Sizes
Has Child   --> CAPEC-165 File Manipulation
CAPEC-626 Smudge Attack
Has Child   --> CAPEC-395 Bypassing Electronic Locks and Access Controls

CAPEC --> CAPEC Mappings Removed
CAPEC-27 Leveraging Race Conditions via Symbolic Links
Has Child   --> CAPEC-26 Leveraging Race Conditions
CAPEC-57 Utilizing REST's Trust in the System Resource to Register Man in the Middle
Has Child   --> CAPEC-94 Man in the Middle Attack
CAPEC-94 Man in the Middle Attack
Has Child   --> CAPEC-22 Exploiting Trust in Client
CAPEC-99 XML Parser Attack
Has Child   --> CAPEC-82 DEPRECATED: Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Service (XDoS))
CAPEC-149 Explore for Predictable Temporary File Names
Has Child   --> CAPEC-169 Footprinting
CAPEC-237 Escaping a Sandbox by Calling Signed Code in Another Language
Has Child   --> CAPEC-115 Authentication Bypass
CAPEC-386 Application API Navigation Remapping
Has Child   --> CAPEC-385 Transaction or Event Tampering via Application API Manipulation
CAPEC-396 Bypassing Card or Badge-Based Systems
Has Child   --> CAPEC-395 Bypassing Electronic Locks and Access Controls
CAPEC-397 Cloning Magnetic Strip Cards
Has Child   --> CAPEC-396 DEPRECATED: Bypassing Card or Badge-Based Systems
CAPEC-398 Magnetic Strip Card Brute Force Attacks
Has Child   --> CAPEC-396 DEPRECATED: Bypassing Card or Badge-Based Systems
CAPEC-399 Cloning RFID Cards or Chips
Has Child   --> CAPEC-396 DEPRECATED: Bypassing Card or Badge-Based Systems
CAPEC-400 RFID Chip Deactivation or Destruction
Has Child   --> CAPEC-396 DEPRECATED: Bypassing Card or Badge-Based Systems
CAPEC-484 XML Client-Side Attack
Has Child   --> CAPEC-82 DEPRECATED: Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Service (XDoS))
CAPEC-513 Software
Has Member   --> CAPEC-384 Application API Message Manipulation via Man-in-the-Middle
Has Member   --> CAPEC-466 Leveraging Active Man in the Middle Attacks to Bypass Same Origin Policy
CAPEC-514 Physical Security
Has Member   --> CAPEC-391 Bypassing Physical Locks
Has Member   --> CAPEC-392 Lock Bumping
CAPEC-572 Artificially Inflate File Sizes
Has Child   --> CAPEC-148 Content Spoofing
CAPEC-626 Smudge Attack
Has Child   --> CAPEC-167 White Box Reverse Engineering
More information is available — Please select a different filter.
Page Last Updated or Reviewed: September 30, 2019