CAPEC --> CAPEC Mappings Added |
CAPEC-27 Leveraging Race Conditions via Symbolic Links |
|
Has Child --> |
CAPEC-29 |
Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
CAPEC-57 Utilizing REST's Trust in the System Resource to Obtain Sensitive Data |
|
Has Child --> |
CAPEC-157 |
Sniffing Attacks |
CAPEC-149 Explore for Predictable Temporary File Names |
|
Has Child --> |
CAPEC-497 |
File Discovery |
CAPEC-225 Subvert Access Control |
|
Has Member --> |
CAPEC-94 |
Man in the Middle Attack |
CAPEC-237 Escaping a Sandbox by Calling Signed Code in Another Language |
|
Has Child --> |
CAPEC-480 |
Escaping Virtualization |
CAPEC-386 Application API Navigation Remapping |
|
Has Child --> |
CAPEC-94 |
Man in the Middle Attack |
CAPEC-397 Cloning Magnetic Strip Cards |
|
Has Child --> |
CAPEC-395 |
Bypassing Electronic Locks and Access Controls |
CAPEC-398 Magnetic Strip Card Brute Force Attacks |
|
Has Child --> |
CAPEC-395 |
Bypassing Electronic Locks and Access Controls |
CAPEC-399 Cloning RFID Cards or Chips |
|
Has Child --> |
CAPEC-395 |
Bypassing Electronic Locks and Access Controls |
CAPEC-400 RFID Chip Deactivation or Destruction |
|
Has Child --> |
CAPEC-395 |
Bypassing Electronic Locks and Access Controls |
CAPEC-403 Social Engineering |
|
Has Member --> |
CAPEC-137 |
Parameter Injection |
|
Has Member --> |
CAPEC-173 |
Action Spoofing |
|
Has Member --> |
CAPEC-184 |
Software Integrity Attack |
|
Has Member --> |
CAPEC-607 |
Obstruction |
CAPEC-437 Supply Chain |
|
Has Member --> |
CAPEC-176 |
Configuration/Environment Manipulation |
|
Has Member --> |
CAPEC-440 |
Hardware Integrity Attack |
|
Has Member --> |
CAPEC-441 |
Malicious Logic Insertion |
CAPEC-480 Escaping Virtualization |
|
Has Child --> |
CAPEC-115 |
Authentication Bypass |
CAPEC-497 File Discovery |
|
Has Child --> |
CAPEC-169 |
Footprinting |
CAPEC-512 Communications |
|
Has Member --> |
CAPEC-94 |
Man in the Middle Attack |
|
Has Member --> |
CAPEC-125 |
Flooding |
|
Has Member --> |
CAPEC-130 |
Excessive Allocation |
|
Has Member --> |
CAPEC-240 |
Resource Injection |
|
Has Member --> |
CAPEC-624 |
Fault Injection |
CAPEC-513 Software |
|
Has Member --> |
CAPEC-94 |
Man in the Middle Attack |
|
Has Member --> |
CAPEC-117 |
Interception |
|
Has Member --> |
CAPEC-161 |
Infrastructure Manipulation |
|
Has Member --> |
CAPEC-272 |
Protocol Manipulation |
|
Has Member --> |
CAPEC-410 |
Information Elicitation |
|
Has Member --> |
CAPEC-438 |
Modification During Manufacture |
|
Has Member --> |
CAPEC-594 |
Traffic Injection |
|
Has Member --> |
CAPEC-607 |
Obstruction |
CAPEC-514 Physical Security |
|
Has Member --> |
CAPEC-116 |
Excavation |
|
Has Member --> |
CAPEC-188 |
Reverse Engineering |
|
Has Member --> |
CAPEC-440 |
Hardware Integrity Attack |
CAPEC-515 Hardware |
|
Has Member --> |
CAPEC-438 |
Modification During Manufacture |
|
Has Member --> |
CAPEC-607 |
Obstruction |
CAPEC-572 Artificially Inflate File Sizes |
|
Has Child --> |
CAPEC-165 |
File Manipulation |
CAPEC-626 Smudge Attack |
|
Has Child --> |
CAPEC-395 |
Bypassing Electronic Locks and Access Controls |
CAPEC --> CAPEC Mappings Removed |
CAPEC-27 Leveraging Race Conditions via Symbolic Links |
|
Has Child --> |
CAPEC-26 |
Leveraging Race Conditions |
CAPEC-57 Utilizing REST's Trust in the System Resource to Register Man in the Middle |
|
Has Child --> |
CAPEC-94 |
Man in the Middle Attack |
CAPEC-94 Man in the Middle Attack |
|
Has Child --> |
CAPEC-22 |
Exploiting Trust in Client |
CAPEC-99 XML Parser Attack |
|
Has Child --> |
CAPEC-82 |
DEPRECATED: Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Service (XDoS)) |
CAPEC-149 Explore for Predictable Temporary File Names |
|
Has Child --> |
CAPEC-169 |
Footprinting |
CAPEC-237 Escaping a Sandbox by Calling Signed Code in Another Language |
|
Has Child --> |
CAPEC-115 |
Authentication Bypass |
CAPEC-386 Application API Navigation Remapping |
|
Has Child --> |
CAPEC-385 |
Transaction or Event Tampering via Application API Manipulation |
CAPEC-396 Bypassing Card or Badge-Based Systems |
|
Has Child --> |
CAPEC-395 |
Bypassing Electronic Locks and Access Controls |
CAPEC-397 Cloning Magnetic Strip Cards |
|
Has Child --> |
CAPEC-396 |
DEPRECATED: Bypassing Card or Badge-Based Systems |
CAPEC-398 Magnetic Strip Card Brute Force Attacks |
|
Has Child --> |
CAPEC-396 |
DEPRECATED: Bypassing Card or Badge-Based Systems |
CAPEC-399 Cloning RFID Cards or Chips |
|
Has Child --> |
CAPEC-396 |
DEPRECATED: Bypassing Card or Badge-Based Systems |
CAPEC-400 RFID Chip Deactivation or Destruction |
|
Has Child --> |
CAPEC-396 |
DEPRECATED: Bypassing Card or Badge-Based Systems |
CAPEC-484 XML Client-Side Attack |
|
Has Child --> |
CAPEC-82 |
DEPRECATED: Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Service (XDoS)) |
CAPEC-513 Software |
|
Has Member --> |
CAPEC-384 |
Application API Message Manipulation via Man-in-the-Middle |
|
Has Member --> |
CAPEC-466 |
Leveraging Active Man in the Middle Attacks to Bypass Same Origin Policy |
CAPEC-514 Physical Security |
|
Has Member --> |
CAPEC-391 |
Bypassing Physical Locks |
|
Has Member --> |
CAPEC-392 |
Lock Bumping |
CAPEC-572 Artificially Inflate File Sizes |
|
Has Child --> |
CAPEC-148 |
Content Spoofing |
CAPEC-626 Smudge Attack |
|
Has Child --> |
CAPEC-167 |
White Box Reverse Engineering |