CAPEC --> CWE Mappings Added |
CAPEC-34 HTTP Response Splitting |
--> |
CWE-138 |
Improper Neutralization of Special Elements |
--> |
CWE-436 |
Interpretation Conflict |
CAPEC-105 HTTP Request Splitting |
--> |
CWE-74 |
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
--> |
CWE-138 |
Improper Neutralization of Special Elements |
--> |
CWE-436 |
Interpretation Conflict |
CAPEC-121 Exploit Non-Production Interfaces |
--> |
CWE-1259 |
Improper Restriction of Security Token Assignment |
--> |
CWE-1267 |
Policy Uses Obsolete Encoding |
--> |
CWE-1270 |
Generation of Incorrect Security Tokens |
--> |
CWE-1294 |
Insecure Security Identifier Mechanism |
--> |
CWE-1296 |
Incorrect Chaining or Granularity of Debug Components |
--> |
CWE-1302 |
Missing Security Identifier |
CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels |
--> |
CWE-1268 |
Policy Privileges are not Assigned Consistently Between Control and Data Agents |
CAPEC-197 Exponential Data Expansion |
--> |
CWE-776 |
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') |
CAPEC-676 NoSQL Injection |
--> |
CWE-943 |
Improper Neutralization of Special Elements in Data Query Logic |
--> |
CWE-1286 |
Improper Validation of Syntactic Correctness of Input |
CAPEC-679 Exploitation of Improperly Configured or Implemented Memory Protections |
--> |
CWE-1222 |
Insufficient Granularity of Address Regions Protected by Register Locks |
--> |
CWE-1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
--> |
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
--> |
CWE-1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
--> |
CWE-1274 |
Insufficient Protections on the Volatile Memory Containing Boot Code |
--> |
CWE-1282 |
Assumed-Immutable Data is Stored in Writable Memory |
--> |
CWE-1312 |
Missing Protection for Mirrored Regions in On-Chip Fabric Firewall |
--> |
CWE-1316 |
Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges |
--> |
CWE-1326 |
Missing Immutable Root of Trust in Hardware |
CAPEC-680 Exploitation of Improperly Controlled Registers |
--> |
CWE-1224 |
Improper Restriction of Write-Once Bit Fields |
--> |
CWE-1231 |
Improper Implementation of Lock Protection Registers |
--> |
CWE-1233 |
Improper Hardware Lock Protection for Security Sensitive Controls |
--> |
CWE-1262 |
Register Interface Allows Software Access to Sensitive Data or Security Settings |
--> |
CWE-1283 |
Mutable Attestation or Measurement Reporting Data |
CAPEC-681 Exploitation of Improperly Controlled Hardware Security Identifiers |
--> |
CWE-1259 |
Improper Restriction of Security Token Assignment |
--> |
CWE-1267 |
Policy Uses Obsolete Encoding |
--> |
CWE-1270 |
Generation of Incorrect Security Tokens |
--> |
CWE-1294 |
Insecure Security Identifier Mechanism |
--> |
CWE-1302 |
Missing Security Identifier |
CAPEC --> CWE Mappings Removed |
CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs |
--> |
CWE-1191 |
Exposed Chip Debug and Test Interface With Insufficient or Missing Authorization |
--> |
CWE-1224 |
Improper Restriction of Write-Once Bit Fields |
--> |
CWE-1244 |
Improper Access to Sensitive Information Using Debug and Test Interfaces |
--> |
CWE-1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
--> |
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
--> |
CWE-1262 |
Register Interface Allows Software Access to Sensitive Data or Security Settings |
--> |
CWE-1268 |
Policy Privileges are not Assigned Consistently Between Control and Data Agents |
--> |
CWE-1282 |
Assumed-Immutable Data is Stored in Writable Memory |
--> |
CWE-1283 |
Mutable Attestation or Measurement Reporting Data |
--> |
CWE-1299 |
Missing Protection Mechanism for Alternate Hardware Interface |
--> |
CWE-1302 |
Missing Security Identifier |
--> |
CWE-1312 |
Missing Protection for Mirrored Regions in On-Chip Fabric Firewall |
--> |
CWE-1313 |
Hardware Allows Activation of Test or Debug Logic at Runtime |
--> |
CWE-1326 |
Missing Immutable Root of Trust in Hardware |
CAPEC-33 HTTP Request Smuggling |
--> |
CWE-707 |
Improper Neutralization |
CAPEC-34 HTTP Response Splitting |
--> |
CWE-697 |
Incorrect Comparison |
--> |
CWE-707 |
Improper Neutralization |
CAPEC-105 HTTP Request Splitting |
--> |
CWE-444 |
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') |
CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels |
--> |
CWE-1191 |
Exposed Chip Debug and Test Interface With Insufficient or Missing Authorization |
--> |
CWE-1222 |
Insufficient Granularity of Address Regions Protected by Register Locks |
--> |
CWE-1224 |
Improper Restriction of Write-Once Bit Fields |
--> |
CWE-1231 |
Improper Implementation of Lock Protection Registers |
--> |
CWE-1233 |
Improper Hardware Lock Protection for Security Sensitive Controls |
--> |
CWE-1234 |
Hardware Internal or Debug Modes Allow Override of Locks |
--> |
CWE-1244 |
Improper Access to Sensitive Information Using Debug and Test Interfaces |
--> |
CWE-1252 |
CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations |
--> |
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
--> |
CWE-1259 |
Improper Restriction of Security Token Assignment |
--> |
CWE-1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
--> |
CWE-1262 |
Register Interface Allows Software Access to Sensitive Data or Security Settings |
--> |
CWE-1267 |
Policy Uses Obsolete Encoding |
--> |
CWE-1270 |
Generation of Incorrect Security Tokens |
--> |
CWE-1274 |
Insufficient Protections on the Volatile Memory Containing Boot Code |
--> |
CWE-1282 |
Assumed-Immutable Data is Stored in Writable Memory |
--> |
CWE-1294 |
Insecure Security Identifier Mechanism |
--> |
CWE-1296 |
Incorrect Chaining or Granularity of Debug Components |
--> |
CWE-1299 |
Missing Protection Mechanism for Alternate Hardware Interface |
--> |
CWE-1313 |
Hardware Allows Activation of Test or Debug Logic at Runtime |
--> |
CWE-1316 |
Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges |
--> |
CWE-1326 |
Missing Immutable Root of Trust in Hardware |
CAPEC-197 XML Entity Expansion |
--> |
CWE-400 |
Uncontrolled Resource Consumption |
CAPEC-236 Catching exception throw/signal from privileged block |
--> |
CWE-270 |
Privilege Context Switching Error |
CAPEC --> CAPEC Mappings Added |
CAPEC-33 HTTP Request Smuggling |
|
CanPrecede --> |
CAPEC-63 |
Cross-Site Scripting (XSS) |
|
CanPrecede --> |
CAPEC-115 |
Authentication Bypass |
|
CanPrecede --> |
CAPEC-141 |
Cache Poisoning |
|
CanPrecede --> |
CAPEC-148 |
Content Spoofing |
|
CanPrecede --> |
CAPEC-154 |
Resource Location Spoofing |
|
PeerOf --> |
CAPEC-273 |
HTTP Response Smuggling |
|
CanPrecede --> |
CAPEC-593 |
Session Hijacking |
CAPEC-34 HTTP Response Splitting |
|
CanPrecede --> |
CAPEC-63 |
Cross-Site Scripting (XSS) |
|
PeerOf --> |
CAPEC-105 |
HTTP Request Splitting |
|
CanPrecede --> |
CAPEC-115 |
Authentication Bypass |
|
CanPrecede --> |
CAPEC-141 |
Cache Poisoning |
|
CanPrecede --> |
CAPEC-148 |
Content Spoofing |
|
CanPrecede --> |
CAPEC-154 |
Resource Location Spoofing |
|
CanPrecede --> |
CAPEC-593 |
Session Hijacking |
CAPEC-67 String Format Overflow in syslog() |
|
Has Child --> |
CAPEC-135 |
Format String Injection |
CAPEC-105 HTTP Request Splitting |
|
CanPrecede --> |
CAPEC-63 |
Cross-Site Scripting (XSS) |
|
CanPrecede --> |
CAPEC-115 |
Authentication Bypass |
|
CanPrecede --> |
CAPEC-141 |
Cache Poisoning |
|
CanPrecede --> |
CAPEC-148 |
Content Spoofing |
|
CanPrecede --> |
CAPEC-154 |
Resource Location Spoofing |
|
CanPrecede --> |
CAPEC-593 |
Session Hijacking |
CAPEC-186 Malicious Software Update |
|
CanFollow --> |
CAPEC-98 |
Phishing |
CAPEC-234 Hijacking a privileged process |
|
CanFollow --> |
CAPEC-100 |
Overflow Buffers |
|
CanFollow --> |
CAPEC-175 |
Code Inclusion |
|
CanFollow --> |
CAPEC-242 |
Code Injection |
CAPEC-270 Modification of Registry Run Keys |
|
CanPrecede --> |
CAPEC-529 |
Malware-Directed Internal Reconnaissance |
|
CanFollow --> |
CAPEC-555 |
Remote Services with Stolen Credentials |
|
CanPrecede --> |
CAPEC-568 |
Capture Credentials via Keylogger |
|
CanPrecede --> |
CAPEC-646 |
Peripheral Footprinting |
CAPEC-271 Schema Poisoning |
|
CanFollow --> |
CAPEC-94 |
Adversary in the Middle (AiTM) |
CAPEC-273 HTTP Response Smuggling |
|
CanPrecede --> |
CAPEC-63 |
Cross-Site Scripting (XSS) |
|
CanPrecede --> |
CAPEC-115 |
Authentication Bypass |
|
CanPrecede --> |
CAPEC-141 |
Cache Poisoning |
|
CanPrecede --> |
CAPEC-148 |
Content Spoofing |
|
CanPrecede --> |
CAPEC-154 |
Resource Location Spoofing |
|
CanPrecede --> |
CAPEC-593 |
Session Hijacking |
CAPEC-460 HTTP Parameter Pollution (HPP) |
|
CanPrecede --> |
CAPEC-676 |
NoSQL Injection |
CAPEC-676 NoSQL Injection |
|
Has Child --> |
CAPEC-248 |
Command Injection |
CAPEC-677 Server Functionality Compromise |
|
Has Child --> |
CAPEC-534 |
Malicious Hardware Update |
CAPEC-678 System Build Data Maliciously Altered |
|
Has Child --> |
CAPEC-444 |
Development Alteration |
CAPEC-679 Exploitation of Improperly Configured or Implemented Memory Protections |
|
Has Child --> |
CAPEC-1 |
Accessing Functionality Not Properly Constrained by ACLs |
|
Has Child --> |
CAPEC-180 |
Exploiting Incorrectly Configured Access Control Security Levels |
CAPEC-680 Exploitation of Improperly Controlled Registers |
|
Has Child --> |
CAPEC-1 |
Accessing Functionality Not Properly Constrained by ACLs |
|
Has Child --> |
CAPEC-180 |
Exploiting Incorrectly Configured Access Control Security Levels |
CAPEC-681 Exploitation of Improperly Controlled Hardware Security Identifiers |
|
Has Child --> |
CAPEC-1 |
Accessing Functionality Not Properly Constrained by ACLs |
|
Has Child --> |
CAPEC-180 |
Exploiting Incorrectly Configured Access Control Security Levels |