| CAPEC --> CWE Mappings Added |
| CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs |
| --> |
CWE-1282 |
Assumed-Immutable Data is Stored in Writable Memory |
| --> |
CWE-1297 |
Unprotected Confidential Information on Device is Accessible by OSAT Vendors |
| --> |
CWE-1299 |
Missing Protection Mechanism for Alternate Hardware Interface |
| --> |
CWE-1302 |
Missing Security Identifier |
| CAPEC-20 Encryption Brute Forcing |
| --> |
CWE-1204 |
Generation of Weak Initialization Vector (IV) |
| CAPEC-26 Leveraging Race Conditions |
| --> |
CWE-1254 |
Incorrect Comparison Logic Granularity |
| --> |
CWE-1298 |
Hardware Logic Contains Race Conditions |
| CAPEC-37 Retrieve Embedded Sensitive Data |
| --> |
CWE-1301 |
Insufficient or Incomplete Data Removal within Hardware Component |
| CAPEC-74 Manipulating State |
| --> |
CWE-1253 |
Incorrect Selection of Fuse Values |
| CAPEC-97 Cryptanalysis |
| --> |
CWE-1204 |
Generation of Weak Initialization Vector (IV) |
| CAPEC-121 Exploit Non-Production Interfaces |
| --> |
CWE-1295 |
Debug Messages Revealing Unnecessary Information |
| CAPEC-166 Force the System to Reset Values |
| --> |
CWE-1221 |
Incorrect Register Defaults or Module Parameters |
| CAPEC-176 Configuration/Environment Manipulation |
| --> |
CWE-1304 |
Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation |
| --> |
CWE-1328 |
Security Version Number Mutable to Older Versions |
| CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels |
| --> |
CWE-1267 |
Policy Uses Obsolete Encoding |
| --> |
CWE-1270 |
Generation of Incorrect Security Tokens |
| --> |
CWE-1282 |
Assumed-Immutable Data is Stored in Writable Memory |
| --> |
CWE-1294 |
Insecure Security Identifier Mechanism |
| --> |
CWE-1296 |
Incorrect Chaining or Granularity of Debug Components |
| --> |
CWE-1297 |
Unprotected Confidential Information on Device is Accessible by OSAT Vendors |
| --> |
CWE-1299 |
Missing Protection Mechanism for Alternate Hardware Interface |
| CAPEC-189 Black Box Reverse Engineering |
| --> |
CWE-1255 |
Comparison Logic is Vulnerable to Power Side-Channel Attacks |
| --> |
CWE-1300 |
Improper Protection Against Physical Side Channels |
| CAPEC-212 Functionality Misuse |
| --> |
CWE-1246 |
Improper Write Handling in Limited-write Non-Volatile Memories |
| CAPEC-492 Regular Expression Exponential Blowup |
| --> |
CWE-1333 |
Inefficient Regular Expression Complexity |
| CAPEC-554 Functionality Bypass |
| --> |
CWE-1299 |
Missing Protection Mechanism for Alternate Hardware Interface |
| CAPEC-629 Unauthorized Use of Device Resources |
| --> |
CWE-1290 |
Incorrect Decoding of Security Identifiers |
| --> |
CWE-1292 |
Incorrect Conversion of Security Identifiers |
| CAPEC-633 Token Impersonation |
| --> |
CWE-1270 |
Generation of Incorrect Security Tokens |
| CAPEC-662 Adversary in the Browser (AiTB) |
| --> |
CWE-300 |
Channel Accessible by Non-Endpoint |
| --> |
CWE-494 |
Download of Code Without Integrity Check |
| CAPEC-663 Exploitation of Transient Instruction Execution |
| --> |
CWE-1037 |
Processor Optimization Removal or Modification of Security-critical Code |
| --> |
CWE-1264 |
Hardware Logic with Insecure De-Synchronization between Control and Data Channels |
| --> |
CWE-1303 |
Non-Transparent Sharing of Microarchitectural Resources |
| CAPEC-664 Server Side Request Forgery |
| --> |
CWE-20 |
Improper Input Validation |
| --> |
CWE-918 |
Server-Side Request Forgery (SSRF) |
| CAPEC-665 Exploitation of Thunderbolt Protection Flaws |
| --> |
CWE-288 |
Authentication Bypass Using an Alternate Path or Channel |
| --> |
CWE-345 |
Insufficient Verification of Data Authenticity |
| --> |
CWE-353 |
Missing Support for Integrity Check |
| --> |
CWE-862 |
Missing Authorization |
| --> |
CWE-1188 |
Insecure Default Initialization of Resource |
| CAPEC-666 BlueSmacking |
| --> |
CWE-404 |
Improper Resource Shutdown or Release |
| CAPEC-667 Bluetooth Impersonation AttackS (BIAS) |
| --> |
CWE-290 |
Authentication Bypass by Spoofing |
| CAPEC-668 Key Negotiation of Bluetooth Attack (KNOB) |
| --> |
CWE-285 |
Improper Authorization |
| --> |
CWE-425 |
Direct Request ('Forced Browsing') |
| --> |
CWE-693 |
Protection Mechanism Failure |
| CAPEC --> CWE Mappings Removed |
| CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs |
| --> |
CWE-721 |
OWASP Top Ten 2007 Category A10 - Failure to Restrict URL Access |
| CAPEC-3 Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-6 Argument Injection |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-7 Blind SQL Injection |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-14 Client-side Injection-induced Buffer Overflow |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-15 Command Delimiters |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-17 Using Malicious Files |
| --> |
CWE-264 |
Permissions, Privileges, and Access Controls |
| --> |
CWE-275 |
Permission Issues |
| CAPEC-20 Encryption Brute Forcing |
| --> |
CWE-719 |
OWASP Top Ten 2007 Category A8 - Insecure Cryptographic Storage |
| CAPEC-28 Fuzzing |
| --> |
CWE-388 |
7PK - Errors |
| CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies |
| --> |
CWE-724 |
OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management |
| CAPEC-34 HTTP Response Splitting |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-35 Leverage Executable Code in Non-Executable Files |
| --> |
CWE-264 |
Permissions, Privileges, and Access Controls |
| --> |
CWE-275 |
Permission Issues |
| --> |
CWE-714 |
OWASP Top Ten 2007 Category A3 - Malicious File Execution |
| CAPEC-41 Using Meta-characters in E-mail Headers to Inject Malicious Payloads |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-43 Exploiting Multiple Input Interpretation Layers |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-44 Overflow Binary Resource File |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-50 Password Recovery Exploitation |
| --> |
CWE-718 |
OWASP Top Ten 2007 Category A7 - Broken Authentication and Session Management |
| CAPEC-52 Embedding NULL Bytes |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-53 Postfix, Null Terminate, and Backslash |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-55 Rainbow Table Password Cracking |
| --> |
CWE-719 |
OWASP Top Ten 2007 Category A8 - Insecure Cryptographic Storage |
| CAPEC-57 Utilizing REST's Trust in the System Resource to Obtain Sensitive Data |
| --> |
CWE-724 |
OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management |
| CAPEC-58 Restful Privilege Elevation |
| --> |
CWE-264 |
Permissions, Privileges, and Access Controls |
| CAPEC-59 Session Credential Falsification through Prediction |
| --> |
CWE-719 |
OWASP Top Ten 2007 Category A8 - Insecure Cryptographic Storage |
| CAPEC-61 Session Fixation |
| --> |
CWE-361 |
7PK - Time and State |
| CAPEC-62 Cross Site Request Forgery |
| --> |
CWE-716 |
OWASP Top Ten 2007 Category A5 - Cross Site Request Forgery (CSRF) |
| CAPEC-64 Using Slashes and URL Encoding Combined to Bypass Validation Logic |
| --> |
CWE-21 |
DEPRECATED: Pathname Traversal and Equivalence Errors |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-65 Sniff Application Code |
| --> |
CWE-719 |
OWASP Top Ten 2007 Category A8 - Insecure Cryptographic Storage |
| CAPEC-69 Target Programs with Elevated Privileges |
| --> |
CWE-264 |
Permissions, Privileges, and Access Controls |
| CAPEC-71 Using Unicode Encoding to Bypass Validation Logic |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-72 URL Encoding |
| --> |
CWE-21 |
DEPRECATED: Pathname Traversal and Equivalence Errors |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-74 Manipulating State |
| --> |
CWE-371 |
State Issues |
| CAPEC-75 Manipulating Writeable Configuration Files |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-76 Manipulating Web Input to File System Calls |
| --> |
CWE-264 |
Permissions, Privileges, and Access Controls |
| --> |
CWE-715 |
OWASP Top Ten 2007 Category A4 - Insecure Direct Object Reference |
| CAPEC-78 Using Escaped Slashes in Alternate Encoding |
| --> |
CWE-21 |
DEPRECATED: Pathname Traversal and Equivalence Errors |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-79 Using Slashes in Alternate Encoding |
| --> |
CWE-21 |
DEPRECATED: Pathname Traversal and Equivalence Errors |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-80 Using UTF-8 Encoding to Bypass Validation Logic |
| --> |
CWE-21 |
DEPRECATED: Pathname Traversal and Equivalence Errors |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-81 Web Logs Tampering |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-83 XPath Injection |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-84 XQuery Injection |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-85 AJAX Footprinting |
| --> |
CWE-712 |
OWASP Top Ten 2007 Category A1 - Cross Site Scripting (XSS) |
| CAPEC-88 OS Command Injection |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-90 Reflection Attack in Authentication Protocol |
| --> |
CWE-718 |
OWASP Top Ten 2007 Category A7 - Broken Authentication and Session Management |
| CAPEC-93 Log Injection-Tampering-Forging |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-94 Man in the Middle Attack |
| --> |
CWE-724 |
OWASP Top Ten 2004 Category A3 - Broken Authentication and Session Management |
| CAPEC-96 Block Access to Libraries |
| --> |
CWE-227 |
7PK - API Abuse |
| CAPEC-100 Overflow Buffers |
| --> |
CWE-19 |
Data Processing Errors |
| CAPEC-101 Server Side Include (SSI) Injection |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-109 Object Relational Mapping Injection |
| --> |
CWE-100 |
DEPRECATED: Technology-Specific Input Validation Problems |
| CAPEC-113 Interface Manipulation |
| --> |
CWE-227 |
7PK - API Abuse |
| CAPEC-120 Double Encoding |
| --> |
CWE-21 |
DEPRECATED: Pathname Traversal and Equivalence Errors |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-127 Directory Indexing |
| --> |
CWE-721 |
OWASP Top Ten 2007 Category A10 - Failure to Restrict URL Access |
| CAPEC-135 Format String Injection |
| --> |
CWE-133 |
String Errors |
| CAPEC-193 PHP Remote File Inclusion |
| --> |
CWE-714 |
OWASP Top Ten 2007 Category A3 - Malicious File Execution |
| CAPEC-215 Fuzzing for application mapping |
| --> |
CWE-388 |
7PK - Errors |
| CAPEC-230 XML Nested Payloads |
| --> |
CWE-19 |
Data Processing Errors |
| CAPEC-231 Oversized Serialized Data Payloads |
| --> |
CWE-19 |
Data Processing Errors |
| CAPEC-250 XML Injection |
| --> |
CWE-713 |
OWASP Top Ten 2007 Category A2 - Injection Flaws |
| CAPEC-267 Leverage Alternate Encoding |
| --> |
CWE-21 |
DEPRECATED: Pathname Traversal and Equivalence Errors |
| --> |
CWE-171 |
DEPRECATED: Cleansing, Canonicalization, and Comparison Errors |
| CAPEC-485 Signature Spoofing by Key Recreation |
| --> |
CWE-310 |
Cryptographic Issues |
| CAPEC --> CAPEC Mappings Added |
| CAPEC-20 Encryption Brute Forcing |
|
CanPrecede --> |
CAPEC-668 |
Key Negotiation of Bluetooth Attack (KNOB) |
| CAPEC-94 Adversary in the Middle (AiTM) |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
|
CanPrecede --> |
CAPEC-668 |
Key Negotiation of Bluetooth Attack (KNOB) |
| CAPEC-101 Server Side Include (SSI) Injection |
|
CanPrecede --> |
CAPEC-600 |
Credential Stuffing |
| CAPEC-110 SQL Injection through SOAP Parameter Tampering |
|
CanPrecede --> |
CAPEC-108 |
Command Line Execution through SQL Injection |
| CAPEC-122 Privilege Abuse |
|
CanPrecede --> |
CAPEC-664 |
Server Side Request Forgery |
| CAPEC-126 Path Traversal |
|
CanPrecede --> |
CAPEC-664 |
Server Side Request Forgery |
| CAPEC-159 Redirect Access to Libraries |
|
CanPrecede --> |
CAPEC-185 |
Malicious Software Download |
| CAPEC-161 Infrastructure Manipulation |
|
CanPrecede --> |
CAPEC-664 |
Server Side Request Forgery |
| CAPEC-185 Malicious Software Download |
|
CanPrecede --> |
CAPEC-662 |
Adversary in the Browser (AiTB) |
| CAPEC-194 Fake the Source of Data |
|
CanPrecede --> |
CAPEC-667 |
Bluetooth Impersonation AttackS (BIAS) |
| CAPEC-204 Lifting Sensitive Data Embedded in Cache |
|
CanPrecede --> |
CAPEC-560 |
Use of Known Domain Credentials |
| CAPEC-206 Signing Malicious Code |
|
Has Child --> |
CAPEC-444 |
Development Alteration |
| CAPEC-253 Remote Code Inclusion |
|
CanPrecede --> |
CAPEC-664 |
Server Side Request Forgery |
| CAPEC-309 Network Topology Mapping |
|
CanPrecede --> |
CAPEC-664 |
Server Side Request Forgery |
| CAPEC-437 Supply Chain |
|
Has Member --> |
CAPEC-116 |
Excavation |
|
Has Member --> |
CAPEC-184 |
Software Integrity Attack |
| CAPEC-542 Targeted Malware |
|
CanPrecede --> |
CAPEC-662 |
Adversary in the Browser (AiTB) |
| CAPEC-643 Identify Shared Files/Directories on System |
|
CanPrecede --> |
CAPEC-165 |
File Manipulation |
|
CanPrecede --> |
CAPEC-545 |
Pull Data from System Resources |
|
CanPrecede --> |
CAPEC-561 |
Windows Admin Shares with Stolen Credentials |
| CAPEC-662 Adversary in the Browser (AiTB) |
|
Has Child --> |
CAPEC-94 |
Adversary in the Middle (AiTM) |
| CAPEC-663 Exploitation of Transient Instruction Execution |
|
Has Child --> |
CAPEC-74 |
Manipulating State |
|
PeerOf --> |
CAPEC-124 |
Shared Resource Manipulation |
|
CanPrecede --> |
CAPEC-141 |
Cache Poisoning |
|
PeerOf --> |
CAPEC-180 |
Exploiting Incorrectly Configured Access Control Security Levels |
|
Has Child --> |
CAPEC-184 |
Software Integrity Attack |
|
PeerOf --> |
CAPEC-212 |
Functionality Misuse |
| CAPEC-664 Server Side Request Forgery |
|
Has Child --> |
CAPEC-115 |
Authentication Bypass |
| CAPEC-665 Exploitation of Thunderbolt Protection Flaws |
|
PeerOf --> |
CAPEC-148 |
Content Spoofing |
|
PeerOf --> |
CAPEC-151 |
Identity Spoofing |
|
Has Child --> |
CAPEC-276 |
Inter-component Protocol Manipulation |
|
CanFollow --> |
CAPEC-390 |
Bypassing Physical Security |
|
PeerOf --> |
CAPEC-458 |
Flash Memory Attacks |
| CAPEC-666 BlueSmacking |
|
Has Child --> |
CAPEC-125 |
Flooding |
| CAPEC-667 Bluetooth Impersonation AttackS (BIAS) |
|
Has Child --> |
CAPEC-616 |
Establish Rogue Location |
| CAPEC-668 Key Negotiation of Bluetooth Attack (KNOB) |
|
Has Child --> |
CAPEC-115 |
Authentication Bypass |
|
CanPrecede --> |
CAPEC-148 |
Content Spoofing |
| CAPEC-669 Alteration of a Software Update |
|
Has Child --> |
CAPEC-184 |
Software Integrity Attack |
|
CanPrecede --> |
CAPEC-673 |
Developer Signing Maliciously Altered Software |
| CAPEC-670 Software Development Tools Maliciously Altered |
|
Has Child --> |
CAPEC-444 |
Development Alteration |
|
CanPrecede --> |
CAPEC-669 |
Alteration of a Software Update |
| CAPEC-671 Requirements for ASIC Functionality Maliciously Altered |
|
Has Child --> |
CAPEC-447 |
Design Alteration |
| CAPEC-672 Malicious Code Implanted During Chip Programming |
|
Has Child --> |
CAPEC-444 |
Development Alteration |
| CAPEC-673 Developer Signing Maliciously Altered Software |
|
Has Child --> |
CAPEC-444 |
Development Alteration |
| CAPEC-674 Design for FPGA Maliciously Altered |
|
Has Child --> |
CAPEC-447 |
Design Alteration |
| CAPEC-675 Retrieve Data from Decommissioned Devices |
|
CanPrecede --> |
CAPEC-37 |
Retrieve Embedded Sensitive Data |
|
Has Child --> |
CAPEC-116 |
Excavation |