CAPEC --> CWE Mappings Added |
CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs |
--> |
CWE-1191 |
On-Chip Debug and Test Interface With Improper Access Control |
CAPEC-105 HTTP Request Splitting |
--> |
CWE-113 |
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') |
CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels |
--> |
CWE-1191 |
On-Chip Debug and Test Interface With Improper Access Control |
CAPEC-273 HTTP Response Smuggling |
--> |
CWE-444 |
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
CAPEC-624 Hardware Fault Injection |
--> |
CWE-1338 |
Improper Protections Against Hardware Overheating |
--> |
CWE-1351 |
Improper Handling of Hardware Behavior in Exceptionally Cold Environments |
CAPEC-682 Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities |
--> |
CWE-1277 |
Firmware Not Updateable |
--> |
CWE-1310 |
Missing Ability to Patch ROM Code |
CAPEC-691 Spoof Open-Source Software Metadata |
--> |
CWE-494 |
Download of Code Without Integrity Check |
CAPEC-692 Spoof Version Control System Commit Metadata |
--> |
CWE-494 |
Download of Code Without Integrity Check |
CAPEC-693 StarJacking |
--> |
CWE-494 |
Download of Code Without Integrity Check |
CAPEC-694 System Location Discovery |
--> |
CWE-497 |
Exposure of Sensitive System Information to an Unauthorized Control Sphere |
CAPEC-696 Load Value Injection |
--> |
CWE-1342 |
Information Exposure through Microarchitectural State after Transient Execution |
CAPEC-697 DHCP Spoofing |
--> |
CWE-923 |
Improper Restriction of Communication Channel to Intended Endpoints |
CAPEC-698 Install Malicious Extension |
--> |
CWE-507 |
Trojan Horse |
--> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |