CAPEC --> CWE Mappings Added |
CAPEC-98 Phishing |
--> |
CWE-451 |
User Interface (UI) Misrepresentation of Critical Information |
CAPEC-138 Reflection Injection |
--> |
CWE-470 |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |
CAPEC-143 Detect Unpublicized Web Pages |
--> |
CWE-425 |
Direct Request ('Forced Browsing') |
CAPEC-144 Detect Unpublicized Web Services |
--> |
CWE-425 |
Direct Request ('Forced Browsing') |
CAPEC-149 Explore for Predictable Temporary File Names |
--> |
CWE-377 |
Insecure Temporary File |
CAPEC-154 Resource Location Spoofing |
--> |
CWE-451 |
User Interface (UI) Misrepresentation of Critical Information |
CAPEC-161 Infrastructure Manipulation |
--> |
CWE-923 |
Improper Restriction of Communication Channel to Intended Endpoints |
CAPEC-163 Spear Phishing |
--> |
CWE-451 |
User Interface (UI) Misrepresentation of Critical Information |
CAPEC-164 Mobile Phishing |
--> |
CWE-451 |
User Interface (UI) Misrepresentation of Critical Information |
CAPEC-173 Action Spoofing |
--> |
CWE-451 |
User Interface (UI) Misrepresentation of Critical Information |
CAPEC-178 Cross-Site Flashing |
--> |
CWE-601 |
URL Redirection to Untrusted Site ('Open Redirect') |
CAPEC-188 Reverse Engineering |
--> |
CWE-1278 |
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
CAPEC-216 Communication Channel Manipulation |
--> |
CWE-306 |
Missing Authentication for Critical Function |
CAPEC-227 Sustained Client Engagement |
--> |
CWE-400 |
Uncontrolled Resource Consumption |
CAPEC-331 ICMP IP Total Length Field Probe |
--> |
CWE-204 |
Observable Response Discrepancy |
CAPEC-332 ICMP IP 'ID' Field Error Message Probe |
--> |
CWE-204 |
Observable Response Discrepancy |
CAPEC-442 Infected Software |
--> |
CWE-506 |
Embedded Malicious Code |
CAPEC-448 Embed Virus into DLL |
--> |
CWE-506 |
Embedded Malicious Code |
CAPEC-456 Infected Memory |
--> |
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
--> |
CWE-1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
--> |
CWE-1274 |
Improper Access Control for Volatile Memory Containing Boot Code |
--> |
CWE-1312 |
Missing Protection for Mirrored Regions in On-Chip Fabric Firewall |
--> |
CWE-1316 |
Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges |
CAPEC-457 USB Memory Attacks |
--> |
CWE-1299 |
Missing Protection Mechanism for Alternate Hardware Interface |
CAPEC-458 Flash Memory Attacks |
--> |
CWE-1282 |
Assumed-Immutable Data is Stored in Writable Memory |
CAPEC-481 Contradictory Destinations in Traffic Routing Schemes |
--> |
CWE-923 |
Improper Restriction of Communication Channel to Intended Endpoints |
CAPEC-498 Probe iOS Screenshots |
--> |
CWE-359 |
Exposure of Private Personal Information to an Unauthorized Actor |
CAPEC-500 WebView Injection |
--> |
CWE-749 |
Exposed Dangerous Method or Function |
--> |
CWE-940 |
Improper Verification of Source of a Communication Channel |
CAPEC-538 Open-Source Library Manipulation |
--> |
CWE-494 |
Download of Code Without Integrity Check |
--> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |
CAPEC-541 Application Fingerprinting |
--> |
CWE-204 |
Observable Response Discrepancy |
--> |
CWE-205 |
Observable Behavioral Discrepancy |
--> |
CWE-208 |
Observable Timing Discrepancy |
CAPEC-579 Replace Winlogon Helper DLL |
--> |
CWE-15 |
External Control of System or Configuration Setting |
CAPEC-580 System Footprinting |
--> |
CWE-204 |
Observable Response Discrepancy |
--> |
CWE-205 |
Observable Behavioral Discrepancy |
--> |
CWE-208 |
Observable Timing Discrepancy |
CAPEC-587 Cross Frame Scripting (XFS) |
--> |
CWE-1021 |
Improper Restriction of Rendered UI Layers or Frames |
CAPEC-625 Mobile Device Fault Injection |
--> |
CWE-1247 |
Improper Protection Against Voltage and Clock Glitches |
--> |
CWE-1248 |
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications |
--> |
CWE-1256 |
Improper Restriction of Software Interfaces to Hardware Features |
--> |
CWE-1319 |
Improper Protection against Electromagnetic Fault Injection (EM-FI) |
--> |
CWE-1332 |
Improper Handling of Faults that Lead to Instruction Skips |
--> |
CWE-1334 |
Unauthorized Error Injection Can Degrade Hardware Redundancy |
--> |
CWE-1338 |
Improper Protections Against Hardware Overheating |
--> |
CWE-1351 |
Improper Handling of Hardware Behavior in Exceptionally Cold Environments |
CAPEC-632 Homograph Attack via Homoglyphs |
--> |
CWE-1007 |
Insufficient Visual Distinction of Homoglyphs Presented to User |
CAPEC-636 Hiding Malicious Data or Code within Files |
--> |
CWE-506 |
Embedded Malicious Code |
CAPEC-640 Inclusion of Code in Existing Process |
--> |
CWE-114 |
Process Control |
--> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |
CAPEC-675 Retrieve Data from Decommissioned Devices |
--> |
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
CAPEC-695 Repo Jacking |
--> |
CWE-494 |
Download of Code Without Integrity Check |
--> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |
CAPEC-699 Eavesdropping on a Monitor |
--> |
CWE-1300 |
Improper Protection of Physical Side Channels |
CAPEC-701 Browser in the Middle (BiTM) |
--> |
CWE-294 |
Authentication Bypass by Capture-replay |
--> |
CWE-345 |
Insufficient Verification of Data Authenticity |
CAPEC-702 Exploiting Incorrect Chaining or Granularity of Hardware Debug Components |
--> |
CWE-1296 |
Incorrect Chaining or Granularity of Debug Components |
CAPEC --> CAPEC Mappings Added |
CAPEC-156 Engage in Deceptive Interactions |
|
Has Member --> |
CAPEC-690 |
Metadata Spoofing |
CAPEC-216 Communication Channel Manipulation |
|
CanPrecede --> |
CAPEC-94 |
Adversary in the Middle (AiTM) |
CAPEC-403 Social Engineering |
|
Has Member --> |
CAPEC-690 |
Metadata Spoofing |
CAPEC-437 Supply Chain |
|
Has Member --> |
CAPEC-176 |
Configuration/Environment Manipulation |
CAPEC-548 Contaminate Resource |
|
CanPrecede --> |
CAPEC-607 |
Obstruction |
CAPEC-587 Cross Frame Scripting (XFS) |
|
Has Child --> |
CAPEC-103 |
Clickjacking |
CAPEC-685 Development and Production |
|
Has Member --> |
CAPEC-690 |
Metadata Spoofing |
CAPEC-688 Sustainment |
|
Has Member --> |
CAPEC-690 |
Metadata Spoofing |
CAPEC-699 Eavesdropping on a Monitor |
|
Has Child --> |
CAPEC-651 |
Eavesdropping |
CAPEC-700 Network Boundary Bridging |
|
CanFollow --> |
CAPEC-70 |
Try Common or Default Usernames and Passwords |
|
Has Child --> |
CAPEC-161 |
Infrastructure Manipulation |
|
CanFollow --> |
CAPEC-560 |
Use of Known Domain Credentials |
CAPEC-701 Browser in the Middle (BiTM) |
|
Has Child --> |
CAPEC-94 |
Adversary in the Middle (AiTM) |
|
CanFollow --> |
CAPEC-98 |
Phishing |
|
CanPrecede --> |
CAPEC-148 |
Content Spoofing |
|
CanPrecede --> |
CAPEC-151 |
Identity Spoofing |
CAPEC-702 Exploiting Incorrect Chaining or Granularity of Hardware Debug Components |
|
Has Child --> |
CAPEC-180 |
Exploiting Incorrectly Configured Access Control Security Levels |
CAPEC-703 Industrial Control System (ICS) Patterns |
|
Has Member --> |
CAPEC-1 |
Accessing Functionality Not Properly Constrained by ACLs |
|
Has Member --> |
CAPEC-57 |
Utilizing REST's Trust in the System Resource to Obtain Sensitive Data |
|
Has Member --> |
CAPEC-65 |
Sniff Application Code |
|
Has Member --> |
CAPEC-70 |
Try Common or Default Usernames and Passwords |
|
Has Member --> |
CAPEC-94 |
Adversary in the Middle (AiTM) |
|
Has Member --> |
CAPEC-98 |
Phishing |
|
Has Member --> |
CAPEC-125 |
Flooding |
|
Has Member --> |
CAPEC-130 |
Excessive Allocation |
|
Has Member --> |
CAPEC-131 |
Resource Leak Exposure |
|
Has Member --> |
CAPEC-141 |
Cache Poisoning |
|
Has Member --> |
CAPEC-148 |
Content Spoofing |
|
Has Member --> |
CAPEC-158 |
Sniffing Network Traffic |
|
Has Member --> |
CAPEC-163 |
Spear Phishing |
|
Has Member --> |
CAPEC-165 |
File Manipulation |
|
Has Member --> |
CAPEC-169 |
Footprinting |
|
Has Member --> |
CAPEC-177 |
Create files with the same name as files protected with a higher classification |
|
Has Member --> |
CAPEC-180 |
Exploiting Incorrectly Configured Access Control Security Levels |
|
Has Member --> |
CAPEC-184 |
Software Integrity Attack |
|
Has Member --> |
CAPEC-191 |
Read Sensitive Constants Within an Executable |
|
Has Member --> |
CAPEC-227 |
Sustained Client Engagement |
|
Has Member --> |
CAPEC-268 |
Audit Log Manipulation |
|
Has Member --> |
CAPEC-292 |
Host Discovery |
|
Has Member --> |
CAPEC-309 |
Network Topology Mapping |
|
Has Member --> |
CAPEC-312 |
Active OS Fingerprinting |
|
Has Member --> |
CAPEC-313 |
Passive OS Fingerprinting |
|
Has Member --> |
CAPEC-438 |
Modification During Manufacture |
|
Has Member --> |
CAPEC-439 |
Manipulation During Distribution |
|
Has Member --> |
CAPEC-441 |
Malicious Logic Insertion |
|
Has Member --> |
CAPEC-457 |
USB Memory Attacks |
|
Has Member --> |
CAPEC-473 |
Signature Spoof |
|
Has Member --> |
CAPEC-504 |
Task Impersonation |
|
Has Member --> |
CAPEC-540 |
Overread Buffers |
|
Has Member --> |
CAPEC-547 |
Physical Destruction of Device or Component |
|
Has Member --> |
CAPEC-552 |
Install Rootkit |
|
Has Member --> |
CAPEC-555 |
Remote Services with Stolen Credentials |
|
Has Member --> |
CAPEC-560 |
Use of Known Domain Credentials |
|
Has Member --> |
CAPEC-573 |
Process Footprinting |
|
Has Member --> |
CAPEC-580 |
System Footprinting |
|
Has Member --> |
CAPEC-603 |
Blockage |
|
Has Member --> |
CAPEC-607 |
Obstruction |
|
Has Member --> |
CAPEC-635 |
Alternative Execution Due to Deceptive Filenames |
|
Has Member --> |
CAPEC-648 |
Collect Data from Screen Capture |
|
Has Member --> |
CAPEC-649 |
Adding a Space to a File Extension |
|
Has Member --> |
CAPEC-690 |
Metadata Spoofing |
|
Has Member --> |
CAPEC-691 |
Spoof Open-Source Software Metadata |
|
Has Member --> |
CAPEC-692 |
Spoof Version Control System Commit Metadata |