txt2stix 1.1.8__py3-none-any.whl → 1.1.10__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- txt2stix/includes/extractions/ai/config.yaml +20 -0
- txt2stix/includes/extractions/lookup/config.yaml +33 -15
- txt2stix/includes/lookups/_generate_lookups.py +39 -30
- txt2stix/includes/lookups/{disarm_id_v1_5.txt → disarm_id_v1_6.txt} +95 -32
- txt2stix/includes/lookups/{disarm_name_v1_5.txt → disarm_name_v1_6.txt} +380 -317
- txt2stix/includes/lookups/{mitre_atlas_id_v4_5_2.txt → mitre_atlas_id_v4_9_0.txt} +41 -1
- txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt +157 -0
- txt2stix/includes/lookups/{mitre_attack_enterprise_aliases_v16_0.txt → mitre_attack_enterprise_aliases_v18_0.txt} +679 -531
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt +4293 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt +4295 -0
- txt2stix/includes/lookups/{mitre_attack_ics_aliases_v16_0.txt → mitre_attack_ics_aliases_v18_0.txt} +7 -3
- txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt +410 -0
- txt2stix/includes/lookups/{mitre_attack_ics_name_v16_0.txt → mitre_attack_ics_name_v18_0.txt} +172 -53
- txt2stix/includes/lookups/{mitre_attack_mobile_aliases_v16_0.txt → mitre_attack_mobile_aliases_v18_0.txt} +33 -0
- txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt +643 -0
- txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt +645 -0
- txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +522 -522
- txt2stix/includes/lookups/{mitre_cwe_id_v4_15.txt → mitre_cwe_id_v4_18.txt} +5 -0
- txt2stix/includes/lookups/{mitre_cwe_name_v4_15.txt → mitre_cwe_name_v4_18.txt} +889 -884
- txt2stix/includes/lookups/sector_aliases_v1_0.txt +751 -0
- txt2stix/includes/tests/test_cases.yaml +8 -0
- txt2stix/retriever.py +6 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/METADATA +2 -10
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/RECORD +27 -26
- txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +0 -117
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +0 -1656
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +0 -1765
- txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +0 -254
- txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +0 -277
- txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +0 -296
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/WHEEL +0 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/entry_points.txt +0 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/licenses/LICENSE +0 -0
|
@@ -1,560 +1,560 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
|
|
5
|
-
|
|
6
|
-
|
|
7
|
-
|
|
8
|
-
Cross Zone Scripting
|
|
9
|
-
HTTP Request Splitting
|
|
10
|
-
Cross Site Tracing
|
|
11
|
-
Command Line Execution through SQL Injection
|
|
12
|
-
Object Relational Mapping Injection
|
|
13
|
-
Cause Web Server Misclassification
|
|
14
|
-
SQL Injection through SOAP Parameter Tampering
|
|
15
|
-
JSON Hijacking (aka JavaScript Hijacking)
|
|
16
|
-
Brute Force
|
|
17
|
-
Interface Manipulation
|
|
18
|
-
Authentication Abuse
|
|
19
|
-
Authentication Bypass
|
|
20
|
-
Excavation
|
|
21
|
-
Interception
|
|
22
|
-
Choosing Message Identifier
|
|
23
|
-
Double Encoding
|
|
24
|
-
Exploit Non-Production Interfaces
|
|
25
|
-
Privilege Abuse
|
|
26
|
-
Buffer Manipulation
|
|
27
|
-
Shared Resource Manipulation
|
|
28
|
-
Flooding
|
|
29
|
-
Path Traversal
|
|
30
|
-
Directory Indexing
|
|
31
|
-
Integer Attacks
|
|
32
|
-
Pointer Manipulation
|
|
33
|
-
Subverting Environment Variable Values
|
|
34
|
-
Excessive Allocation
|
|
1
|
+
Forceful Browsing
|
|
2
|
+
Bypassing Physical Locks
|
|
3
|
+
Using Alternative IP Address Encodings
|
|
4
|
+
Malicious Software Download
|
|
5
|
+
Session Credential Falsification through Manipulation
|
|
6
|
+
Removing/short-circuiting 'Purse' logic: removing/mutating 'cash' decrements
|
|
7
|
+
Cross Frame Scripting (XFS)
|
|
35
8
|
Resource Leak Exposure
|
|
36
|
-
|
|
37
|
-
|
|
38
|
-
|
|
39
|
-
|
|
40
|
-
|
|
41
|
-
|
|
42
|
-
|
|
43
|
-
|
|
44
|
-
|
|
45
|
-
|
|
46
|
-
|
|
47
|
-
|
|
48
|
-
|
|
49
|
-
|
|
50
|
-
Checksum Spoofing
|
|
51
|
-
XML Schema Poisoning
|
|
52
|
-
XML Ping of the Death
|
|
53
|
-
Content Spoofing
|
|
54
|
-
Explore for Predictable Temporary File Names
|
|
55
|
-
Command Delimiters
|
|
56
|
-
Collect Data from Common Resource Locations
|
|
57
|
-
Identity Spoofing
|
|
58
|
-
Input Data Manipulation
|
|
59
|
-
Resource Location Spoofing
|
|
60
|
-
Screen Temporary Files for Sensitive Information
|
|
61
|
-
Sniffing Attacks
|
|
62
|
-
Sniffing Network Traffic
|
|
63
|
-
Redirect Access to Libraries
|
|
64
|
-
Dictionary-based Password Attack
|
|
65
|
-
Exploit Script-Based APIs
|
|
66
|
-
Infrastructure Manipulation
|
|
67
|
-
Manipulating Hidden Fields
|
|
68
|
-
Spear Phishing
|
|
69
|
-
Mobile Phishing
|
|
70
|
-
File Manipulation
|
|
71
|
-
Force the System to Reset Values
|
|
72
|
-
White Box Reverse Engineering
|
|
73
|
-
Windows ::DATA Alternate Data Stream
|
|
74
|
-
Footprinting
|
|
75
|
-
Using Malicious Files
|
|
9
|
+
Malicious Software Implanted
|
|
10
|
+
Credential Stuffing
|
|
11
|
+
Use of Captured Hashes (Pass The Hash)
|
|
12
|
+
Use of Captured Tickets (Pass The Ticket)
|
|
13
|
+
Target Influence via Instant Rapport
|
|
14
|
+
Remote Services with Stolen Credentials
|
|
15
|
+
UDP Scan
|
|
16
|
+
Using Escaped Slashes in Alternate Encoding
|
|
17
|
+
Manipulating Writeable Configuration Files
|
|
18
|
+
Cross Site Request Forgery
|
|
19
|
+
Disabling Network Hardware
|
|
20
|
+
Transaction or Event Tampering via Application API Manipulation
|
|
21
|
+
Web Server Logs Tampering
|
|
22
|
+
Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities
|
|
76
23
|
Web Application Fingerprinting
|
|
77
|
-
|
|
78
|
-
|
|
79
|
-
Code Inclusion
|
|
80
|
-
Configuration/Environment Manipulation
|
|
81
|
-
Create files with the same name as files protected with a higher classification
|
|
82
|
-
Cross-Site Flashing
|
|
83
|
-
Calling Micro-Services Directly
|
|
84
|
-
XSS Targeting Non-Script Elements
|
|
85
|
-
Exploiting Incorrectly Configured Access Control Security Levels
|
|
86
|
-
Flash File Overlay
|
|
87
|
-
Flash Injection
|
|
88
|
-
IMAP/SMTP Command Injection
|
|
89
|
-
Software Integrity Attack
|
|
90
|
-
Malicious Software Download
|
|
91
|
-
Malicious Software Update
|
|
92
|
-
Malicious Automated Software Update via Redirection
|
|
93
|
-
Reverse Engineering
|
|
94
|
-
Black Box Reverse Engineering
|
|
95
|
-
Embedding Scripts within Scripts
|
|
96
|
-
Reverse Engineer an Executable to Expose Assumed Hidden Functionality
|
|
97
|
-
Read Sensitive Constants Within an Executable
|
|
98
|
-
Protocol Analysis
|
|
99
|
-
PHP Remote File Inclusion
|
|
100
|
-
Fake the Source of Data
|
|
101
|
-
Principal Spoof
|
|
102
|
-
Session Credential Falsification through Forging
|
|
103
|
-
Exponential Data Expansion
|
|
24
|
+
Counterfeit Websites
|
|
25
|
+
Windows ::DATA Alternate Data Stream
|
|
104
26
|
XSS Targeting Error Pages
|
|
105
|
-
|
|
106
|
-
|
|
107
|
-
|
|
108
|
-
|
|
109
|
-
|
|
27
|
+
Metadata Spoofing
|
|
28
|
+
Smudge Attack
|
|
29
|
+
ICMP Error Message Quoting Probe
|
|
30
|
+
Android Activity Hijack
|
|
31
|
+
WiFi SSID Tracking
|
|
32
|
+
TCP (ISN) Sequence Predictability Probe
|
|
33
|
+
Resource Injection
|
|
34
|
+
Modification During Manufacture
|
|
35
|
+
Creating a Rogue Certification Authority Certificate
|
|
36
|
+
Malicious Logic Insertion
|
|
37
|
+
HTTP Verb Tampering
|
|
38
|
+
Modify Existing Service
|
|
39
|
+
Collect Data from Screen Capture
|
|
40
|
+
Software Development Tools Maliciously Altered
|
|
41
|
+
Force the System to Reset Values
|
|
110
42
|
Create Malicious Client
|
|
111
|
-
|
|
112
|
-
|
|
113
|
-
|
|
114
|
-
|
|
115
|
-
|
|
116
|
-
|
|
117
|
-
|
|
118
|
-
|
|
119
|
-
|
|
120
|
-
|
|
43
|
+
Replace Binaries
|
|
44
|
+
WSDL Scanning
|
|
45
|
+
TCP Xmas Scan
|
|
46
|
+
TCP Flood
|
|
47
|
+
Cellular Jamming
|
|
48
|
+
Calling Micro-Services Directly
|
|
49
|
+
Data Interchange Protocol Manipulation
|
|
50
|
+
Influence Perception of Reciprocation
|
|
51
|
+
Cloning Magnetic Strip Cards
|
|
52
|
+
Pull Data from System Resources
|
|
53
|
+
Task Impersonation
|
|
54
|
+
Absolute Path Traversal
|
|
55
|
+
Exploitation of Improperly Controlled Registers
|
|
56
|
+
Probe iOS Screenshots
|
|
57
|
+
Web Services API Signature Forgery Leveraging Hash Function Extension Weakness
|
|
121
58
|
Exploiting Incorrectly Configured SSL/TLS
|
|
122
|
-
|
|
123
|
-
|
|
124
|
-
Exploiting Trust in Client
|
|
125
|
-
Client-Server Protocol Manipulation
|
|
126
|
-
Data Serialization External Entities Blowup
|
|
127
|
-
iFrame Overlay
|
|
128
|
-
Fingerprinting
|
|
129
|
-
Session Credential Falsification through Manipulation
|
|
130
|
-
Sustained Client Engagement
|
|
131
|
-
DTD Injection
|
|
132
|
-
Serialized Data Parameter Blowup
|
|
133
|
-
File Content Injection
|
|
134
|
-
Serialized Data with Nested Payloads
|
|
135
|
-
Oversized Serialized Data Payloads
|
|
136
|
-
Privilege Escalation
|
|
137
|
-
Hijacking a privileged process
|
|
59
|
+
StarJacking
|
|
60
|
+
Hijacking a Privileged Thread of Execution
|
|
138
61
|
Escaping a Sandbox by Calling Code in Another Language
|
|
139
|
-
|
|
140
|
-
|
|
141
|
-
|
|
142
|
-
|
|
143
|
-
|
|
144
|
-
|
|
145
|
-
|
|
146
|
-
Command Injection
|
|
147
|
-
Forced Deadlock
|
|
148
|
-
XML Injection
|
|
149
|
-
Local Code Inclusion
|
|
150
|
-
PHP Local File Inclusion
|
|
151
|
-
Remote Code Inclusion
|
|
152
|
-
SOAP Array Overflow
|
|
153
|
-
Leveraging Race Conditions
|
|
154
|
-
Fuzzing for garnering other adjacent user/sensitive data
|
|
155
|
-
Force Use of Corrupted Files
|
|
156
|
-
Leverage Alternate Encoding
|
|
157
|
-
Audit Log Manipulation
|
|
158
|
-
Leveraging Race Conditions via Symbolic Links
|
|
159
|
-
Modification of Registry Run Keys
|
|
160
|
-
Schema Poisoning
|
|
62
|
+
TCP Congestion Control Flag (ECN) Probe
|
|
63
|
+
Log Injection-Tampering-Forging
|
|
64
|
+
Analysis of Packet Timing and Sizes
|
|
65
|
+
Integer Attacks
|
|
66
|
+
Exploiting Trust in Client
|
|
67
|
+
Flash File Overlay
|
|
68
|
+
Malicious Code Implanted During Chip Programming
|
|
161
69
|
Protocol Manipulation
|
|
162
|
-
|
|
163
|
-
|
|
164
|
-
|
|
165
|
-
|
|
166
|
-
|
|
167
|
-
|
|
168
|
-
|
|
169
|
-
Fuzzing
|
|
170
|
-
ICMP Echo Request Ping
|
|
171
|
-
TCP SYN Scan
|
|
172
|
-
Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
|
|
173
|
-
Enumerate Mail Exchange (MX) Records
|
|
174
|
-
DNS Zone Transfers
|
|
175
|
-
Host Discovery
|
|
176
|
-
Traceroute Route Enumeration
|
|
177
|
-
ICMP Address Mask Request
|
|
70
|
+
Read Sensitive Constants Within an Executable
|
|
71
|
+
Identity Spoofing
|
|
72
|
+
Reflection Attack in Authentication Protocol
|
|
73
|
+
System Footprinting
|
|
74
|
+
Exploitation of Trusted Identifiers
|
|
75
|
+
Oversized Serialized Data Payloads
|
|
76
|
+
Reverse Engineering
|
|
178
77
|
Timestamp Request
|
|
179
|
-
|
|
180
|
-
|
|
181
|
-
|
|
182
|
-
TCP SYN Ping
|
|
183
|
-
Using Leading 'Ghost' Character Sequences to Bypass Input Filters
|
|
184
|
-
Hijacking a Privileged Thread of Execution
|
|
185
|
-
Port Scanning
|
|
186
|
-
TCP Connect Scan
|
|
187
|
-
TCP FIN Scan
|
|
188
|
-
TCP Xmas Scan
|
|
189
|
-
TCP Null Scan
|
|
190
|
-
TCP ACK Scan
|
|
191
|
-
TCP Window Scan
|
|
192
|
-
TCP RPC Scan
|
|
193
|
-
UDP Scan
|
|
194
|
-
Network Topology Mapping
|
|
195
|
-
Accessing/Intercepting/Modifying HTTP Cookies
|
|
196
|
-
Scanning for Vulnerable Software
|
|
197
|
-
Active OS Fingerprinting
|
|
198
|
-
Passive OS Fingerprinting
|
|
199
|
-
IP ID Sequencing Probe
|
|
200
|
-
IP 'ID' Echoed Byte-Order Probe
|
|
201
|
-
IP (DF) 'Don't Fragment Bit' Echoing Probe
|
|
78
|
+
Install Malicious Extension
|
|
79
|
+
Use of Known Operating System Credentials
|
|
80
|
+
Local Code Inclusion
|
|
202
81
|
XSS Through HTTP Query Strings
|
|
203
|
-
|
|
204
|
-
|
|
82
|
+
Eavesdropping on a Monitor
|
|
83
|
+
System Location Discovery
|
|
84
|
+
Browser Fingerprinting
|
|
85
|
+
Infrastructure Manipulation
|
|
86
|
+
Flash Injection
|
|
87
|
+
Harvesting Information via API Event Monitoring
|
|
88
|
+
Transparent Proxy Abuse
|
|
89
|
+
Subvert Code-signing Facilities
|
|
205
90
|
TCP (ISN) Greatest Common Divisor Probe
|
|
206
|
-
|
|
207
|
-
|
|
208
|
-
TCP Congestion Control Flag (ECN) Probe
|
|
209
|
-
TCP Initial Window Size Probe
|
|
210
|
-
TCP Options Probe
|
|
91
|
+
Local Execution of Code
|
|
92
|
+
Pretexting via Customer Service
|
|
211
93
|
TCP 'RST' Flag Checksum Probe
|
|
212
|
-
ICMP
|
|
213
|
-
|
|
214
|
-
|
|
215
|
-
ICMP IP Total Length Field Probe
|
|
216
|
-
ICMP IP 'ID' Field Error Message Probe
|
|
217
|
-
HTTP Response Splitting
|
|
218
|
-
Leverage Executable Code in Non-Executable Files
|
|
219
|
-
Using Unpublished Interfaces or Functionality
|
|
220
|
-
Retrieve Embedded Sensitive Data
|
|
94
|
+
ICMP Flood
|
|
95
|
+
Counterfeit GPS Signals
|
|
96
|
+
Authentication Abuse
|
|
221
97
|
Leveraging/Manipulating Configuration File Search Paths
|
|
222
|
-
|
|
223
|
-
|
|
224
|
-
Transaction or Event Tampering via Application API Manipulation
|
|
225
|
-
Application API Navigation Remapping
|
|
226
|
-
Navigation Remapping To Propagate Malicious Content
|
|
227
|
-
Application API Button Hijacking
|
|
228
|
-
Content Spoofing Via Application API Manipulation
|
|
229
|
-
Manipulating Opaque Client-based Data Tokens
|
|
230
|
-
Bypassing Physical Security
|
|
231
|
-
Bypassing Physical Locks
|
|
232
|
-
Lock Bumping
|
|
233
|
-
Lock Picking
|
|
234
|
-
Using a Snap Gun Lock to Force a Lock
|
|
235
|
-
Bypassing Electronic Locks and Access Controls
|
|
236
|
-
Cloning Magnetic Strip Cards
|
|
237
|
-
Magnetic Strip Card Brute Force Attacks
|
|
238
|
-
Cloning RFID Cards or Chips
|
|
239
|
-
Using Alternative IP Address Encodings
|
|
240
|
-
Manipulating Writeable Terminal Devices
|
|
241
|
-
RFID Chip Deactivation or Destruction
|
|
242
|
-
Physically Hacking Hardware
|
|
243
|
-
Bypassing ATA Password Security
|
|
244
|
-
Dumpster Diving
|
|
245
|
-
Pretexting
|
|
98
|
+
Using UTF-8 Encoding to Bypass Validation Logic
|
|
99
|
+
Command Injection
|
|
246
100
|
Using Meta-characters in E-mail Headers to Inject Malicious Payloads
|
|
247
|
-
|
|
248
|
-
|
|
249
|
-
|
|
250
|
-
|
|
251
|
-
|
|
252
|
-
|
|
253
|
-
|
|
254
|
-
|
|
255
|
-
|
|
256
|
-
Influence Perception of Scarcity
|
|
257
|
-
Influence Perception of Authority
|
|
258
|
-
Influence Perception of Commitment and Consistency
|
|
259
|
-
Influence Perception of Liking
|
|
260
|
-
Influence Perception of Consensus or Social Proof
|
|
261
|
-
Target Influence via Framing
|
|
101
|
+
RFID Chip Deactivation or Destruction
|
|
102
|
+
Protocol Analysis
|
|
103
|
+
Hardware Component Substitution During Baselining
|
|
104
|
+
Sniff Application Code
|
|
105
|
+
IP ID Sequencing Probe
|
|
106
|
+
Artificially Inflate File Sizes
|
|
107
|
+
File Discovery
|
|
108
|
+
Manipulating Writeable Terminal Devices
|
|
109
|
+
Content Spoofing Via Application API Manipulation
|
|
262
110
|
Influence via Incentives
|
|
263
|
-
|
|
264
|
-
|
|
265
|
-
|
|
266
|
-
|
|
267
|
-
|
|
268
|
-
|
|
269
|
-
Target Influence via Instant Rapport
|
|
270
|
-
Modification During Manufacture
|
|
271
|
-
Manipulation During Distribution
|
|
272
|
-
Overflow Binary Resource File
|
|
273
|
-
Hardware Integrity Attack
|
|
274
|
-
Malicious Logic Insertion
|
|
275
|
-
Infected Software
|
|
276
|
-
Malicious Logic Inserted Into Product by Authorized Developer
|
|
277
|
-
Development Alteration
|
|
278
|
-
Malicious Logic Insertion into Product Software via Configuration Management Manipulation
|
|
111
|
+
Browser in the Middle (BiTM)
|
|
112
|
+
Utilizing REST's Trust in the System Resource to Obtain Sensitive Data
|
|
113
|
+
Expanding Control over the Operating System from the Database
|
|
114
|
+
Forced Integer Overflow
|
|
115
|
+
Forced Deadlock
|
|
116
|
+
Manipulating Web Input to File System Calls
|
|
279
117
|
Malicious Logic Insertion into Product via Inclusion of Third-Party Component
|
|
280
|
-
|
|
118
|
+
TCP Window Scan
|
|
119
|
+
Adversary in the Middle (AiTM)
|
|
120
|
+
XSS Through HTTP Headers
|
|
121
|
+
WebView Injection
|
|
122
|
+
Cellular Broadcast Message Request
|
|
123
|
+
Carry-Off GPS Attack
|
|
124
|
+
Exploitation of Improperly Configured or Implemented Memory Protections
|
|
125
|
+
MIME Conversion
|
|
126
|
+
Documentation Alteration to Cause Errors in System Design
|
|
127
|
+
Removing Important Client Functionality
|
|
128
|
+
Signing Malicious Code
|
|
129
|
+
Malicious Software Update
|
|
130
|
+
DNS Domain Seizure
|
|
131
|
+
Compromising Emanations Attack
|
|
132
|
+
Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
|
|
133
|
+
Owner Footprinting
|
|
134
|
+
Email Injection
|
|
135
|
+
TCP ACK Scan
|
|
136
|
+
Lock Bumping
|
|
137
|
+
Overread Buffers
|
|
138
|
+
Session Credential Falsification through Forging
|
|
281
139
|
Embed Virus into DLL
|
|
282
|
-
|
|
283
|
-
|
|
284
|
-
Infected Memory
|
|
285
|
-
USB Memory Attacks
|
|
286
|
-
Flash Memory Attacks
|
|
287
|
-
Creating a Rogue Certification Authority Certificate
|
|
288
|
-
Overflow Variables and Tags
|
|
289
|
-
HTTP Parameter Pollution (HPP)
|
|
290
|
-
Web Services API Signature Forgery Leveraging Hash Function Extension Weakness
|
|
291
|
-
Cross-Domain Search Timing
|
|
292
|
-
Padding Oracle Crypto Attack
|
|
293
|
-
Evercookie
|
|
294
|
-
Transparent Proxy Abuse
|
|
295
|
-
Leveraging Active Adversary in the Middle Attacks to Bypass Same Origin Policy
|
|
296
|
-
Cross Site Identification
|
|
297
|
-
Generic Cross-Browser Cross-Domain Theft
|
|
298
|
-
HTTP DoS
|
|
299
|
-
Buffer Overflow via Parameter Expansion
|
|
300
|
-
Expanding Control over the Operating System from the Database
|
|
301
|
-
Search Order Hijacking
|
|
302
|
-
Browser Fingerprinting
|
|
303
|
-
Signature Spoof
|
|
304
|
-
Signature Spoofing by Key Theft
|
|
305
|
-
Signature Spoofing by Improper Validation
|
|
306
|
-
Signature Spoofing by Misrepresentation
|
|
307
|
-
Signature Spoofing by Mixing Signed and Unsigned Content
|
|
308
|
-
Modification of Windows Service Configuration
|
|
309
|
-
Malicious Root Certificate
|
|
310
|
-
Passing Local Filenames to Functions That Expect a URL
|
|
311
|
-
Escaping Virtualization
|
|
312
|
-
Contradictory Destinations in Traffic Routing Schemes
|
|
313
|
-
TCP Flood
|
|
314
|
-
Signature Spoofing by Key Recreation
|
|
315
|
-
UDP Flood
|
|
316
|
-
ICMP Flood
|
|
317
|
-
HTTP Flood
|
|
318
|
-
SSL Flood
|
|
319
|
-
Password Brute Forcing
|
|
320
|
-
Amplification
|
|
321
|
-
Quadratic Data Expansion
|
|
322
|
-
Regular Expression Exponential Blowup
|
|
323
|
-
SOAP Array Blowup
|
|
324
|
-
TCP Fragmentation
|
|
140
|
+
Schema Poisoning
|
|
141
|
+
ICMP Error Message Echoing Integrity Probe
|
|
325
142
|
UDP Fragmentation
|
|
326
|
-
|
|
327
|
-
|
|
328
|
-
|
|
143
|
+
SQL Injection
|
|
144
|
+
Malicious Logic Inserted Into Product by Authorized Developer
|
|
145
|
+
Exploitation of Thunderbolt Protection Flaws
|
|
146
|
+
Navigation Remapping To Propagate Malicious Content
|
|
147
|
+
Weakening of Cellular Encryption
|
|
148
|
+
TCP FIN Scan
|
|
149
|
+
Contradictory Destinations in Traffic Routing Schemes
|
|
150
|
+
ICMP Information Request
|
|
151
|
+
Physical Destruction of Device or Component
|
|
152
|
+
Buffer Manipulation
|
|
153
|
+
Targeted Malware
|
|
154
|
+
Mobile Device Fault Injection
|
|
329
155
|
Android Intent Intercept
|
|
330
|
-
|
|
331
|
-
|
|
332
|
-
|
|
333
|
-
|
|
334
|
-
|
|
335
|
-
|
|
336
|
-
|
|
337
|
-
|
|
338
|
-
|
|
339
|
-
|
|
340
|
-
|
|
341
|
-
|
|
342
|
-
|
|
156
|
+
Influence Perception of Scarcity
|
|
157
|
+
Pretexting via Phone
|
|
158
|
+
Query System for Information
|
|
159
|
+
TCP ACK Ping
|
|
160
|
+
Buffer Overflow via Environment Variables
|
|
161
|
+
Escaping Virtualization
|
|
162
|
+
TCP (ISN) Counter Rate Probe
|
|
163
|
+
LDAP Injection
|
|
164
|
+
SOAP Array Overflow
|
|
165
|
+
Black Box Reverse Engineering
|
|
166
|
+
String Format Overflow in syslog()
|
|
167
|
+
Cross-Site Flashing
|
|
168
|
+
Infected Hardware
|
|
169
|
+
Server Side Include (SSI) Injection
|
|
170
|
+
Inducing Account Lockout
|
|
171
|
+
ICMP Address Mask Request
|
|
172
|
+
Code Inclusion
|
|
173
|
+
PHP Remote File Inclusion
|
|
174
|
+
Altered Installed BIOS
|
|
175
|
+
Collect Data as Provided by Users
|
|
176
|
+
File Content Injection
|
|
177
|
+
Terrestrial Jamming
|
|
178
|
+
XSS Using Invalid Characters
|
|
179
|
+
Malicious Hardware Component Replacement
|
|
180
|
+
Adversary in the Browser (AiTB)
|
|
181
|
+
Retrieve Embedded Sensitive Data
|
|
343
182
|
SaaS User Request Forgery
|
|
344
|
-
|
|
345
|
-
|
|
346
|
-
Documentation Alteration to Circumvent Dial-down
|
|
347
|
-
Documentation Alteration to Produce Under-performing Systems
|
|
348
|
-
Documentation Alteration to Cause Errors in System Design
|
|
349
|
-
Embedding NULL Bytes
|
|
350
|
-
Counterfeit Hardware Component Inserted During Product Assembly
|
|
183
|
+
Obstruction
|
|
184
|
+
Influence Perception of Liking
|
|
351
185
|
Hardware Design Specifications Are Altered
|
|
352
|
-
|
|
353
|
-
|
|
354
|
-
|
|
355
|
-
|
|
356
|
-
|
|
357
|
-
|
|
358
|
-
|
|
359
|
-
|
|
360
|
-
|
|
361
|
-
|
|
362
|
-
|
|
363
|
-
|
|
364
|
-
|
|
365
|
-
|
|
366
|
-
|
|
367
|
-
|
|
368
|
-
|
|
369
|
-
|
|
370
|
-
|
|
371
|
-
|
|
372
|
-
|
|
373
|
-
|
|
374
|
-
|
|
375
|
-
|
|
376
|
-
Physical Destruction of Device or Component
|
|
186
|
+
Generic Cross-Browser Cross-Domain Theft
|
|
187
|
+
Command Delimiters
|
|
188
|
+
Software Integrity Attack
|
|
189
|
+
Cross-Domain Search Timing
|
|
190
|
+
Manipulation During Distribution
|
|
191
|
+
DNS Blocking
|
|
192
|
+
Remote Code Inclusion
|
|
193
|
+
Requirements for ASIC Functionality Maliciously Altered
|
|
194
|
+
Signature Spoofing by Key Recreation
|
|
195
|
+
JSON Hijacking (aka JavaScript Hijacking)
|
|
196
|
+
Removal of filters: Input filters, output filters, data masking
|
|
197
|
+
IP Address Blocking
|
|
198
|
+
Information Elicitation
|
|
199
|
+
DTD Injection
|
|
200
|
+
Buffer Overflow via Symbolic Links
|
|
201
|
+
Pharming
|
|
202
|
+
Pretexting via Tech Support
|
|
203
|
+
Manipulating User-Controlled Variables
|
|
204
|
+
Object Injection
|
|
205
|
+
Bypassing Electronic Locks and Access Controls
|
|
206
|
+
Documentation Alteration to Produce Under-performing Systems
|
|
207
|
+
Infiltration of Software Development Environment
|
|
208
|
+
Collect Data from Clipboard
|
|
209
|
+
Mobile Phishing
|
|
377
210
|
Contaminate Resource
|
|
378
|
-
|
|
379
|
-
|
|
380
|
-
|
|
381
|
-
|
|
382
|
-
|
|
383
|
-
|
|
384
|
-
|
|
385
|
-
|
|
386
|
-
|
|
387
|
-
|
|
388
|
-
|
|
389
|
-
|
|
390
|
-
|
|
391
|
-
|
|
392
|
-
|
|
393
|
-
|
|
394
|
-
|
|
395
|
-
|
|
396
|
-
|
|
397
|
-
|
|
398
|
-
|
|
399
|
-
Process Footprinting
|
|
211
|
+
Reflected XSS
|
|
212
|
+
Active OS Fingerprinting
|
|
213
|
+
Pointer Manipulation
|
|
214
|
+
Influence via Modes of Thinking
|
|
215
|
+
Directory Indexing
|
|
216
|
+
Padding Oracle Crypto Attack
|
|
217
|
+
Embedding Scripts within Scripts
|
|
218
|
+
Session Hijacking
|
|
219
|
+
Manipulating State
|
|
220
|
+
Create files with the same name as files protected with a higher classification
|
|
221
|
+
Magnetic Strip Card Brute Force Attacks
|
|
222
|
+
Peripheral Footprinting
|
|
223
|
+
XQuery Injection
|
|
224
|
+
Infected Software
|
|
225
|
+
Using Unicode Encoding to Bypass Validation Logic
|
|
226
|
+
XSS Using Doubled Characters
|
|
227
|
+
Flooding
|
|
228
|
+
Alteration of a Software Update
|
|
229
|
+
Traffic Injection
|
|
230
|
+
Session Sidejacking
|
|
231
|
+
Bypassing ATA Password Security
|
|
400
232
|
Services Footprinting
|
|
233
|
+
TCP RPC Scan
|
|
234
|
+
Target Influence via The Human Buffer Overflow
|
|
401
235
|
Account Footprinting
|
|
402
|
-
|
|
403
|
-
|
|
404
|
-
|
|
405
|
-
|
|
236
|
+
Sustained Client Engagement
|
|
237
|
+
Spoof Open-Source Software Metadata
|
|
238
|
+
Malware-Directed Internal Reconnaissance
|
|
239
|
+
Cross-Site Scripting (XSS)
|
|
240
|
+
HTTP Parameter Pollution (HPP)
|
|
241
|
+
Input Data Manipulation
|
|
242
|
+
Signature Spoofing by Misrepresentation
|
|
243
|
+
Cause Web Server Misclassification
|
|
406
244
|
Restful Privilege Elevation
|
|
407
|
-
|
|
408
|
-
|
|
245
|
+
Bypassing of Intermediate Forms in Multiple-Form Sets
|
|
246
|
+
Jamming
|
|
247
|
+
TCP Fragmentation
|
|
248
|
+
Use of Known Kerberos Credentials
|
|
249
|
+
Dumpster Diving
|
|
250
|
+
Fingerprinting
|
|
251
|
+
Overflow Buffers
|
|
252
|
+
Install Rootkit
|
|
253
|
+
Tapjacking
|
|
409
254
|
Route Disabling
|
|
410
|
-
|
|
411
|
-
|
|
412
|
-
|
|
413
|
-
|
|
414
|
-
|
|
415
|
-
|
|
416
|
-
|
|
255
|
+
Leveraging Active Adversary in the Middle Attacks to Bypass Same Origin Policy
|
|
256
|
+
Collect Data from Common Resource Locations
|
|
257
|
+
Orbital Jamming
|
|
258
|
+
Brute Force
|
|
259
|
+
Blue Boxing
|
|
260
|
+
SQL Injection through SOAP Parameter Tampering
|
|
261
|
+
Symlink Attack
|
|
262
|
+
Embedding NULL Bytes
|
|
263
|
+
Pretexting via Delivery Person
|
|
417
264
|
Session Credential Falsification through Prediction
|
|
418
|
-
|
|
419
|
-
|
|
265
|
+
Fuzzing
|
|
266
|
+
Code Injection
|
|
267
|
+
Hiding Malicious Data or Code within Files
|
|
268
|
+
Infiltration of Hardware Development Environment
|
|
269
|
+
Hardware Integrity Attack
|
|
270
|
+
Screen Temporary Files for Sensitive Information
|
|
420
271
|
Stored XSS
|
|
421
|
-
|
|
422
|
-
|
|
423
|
-
|
|
424
|
-
|
|
425
|
-
|
|
426
|
-
|
|
427
|
-
|
|
428
|
-
|
|
429
|
-
|
|
430
|
-
|
|
431
|
-
|
|
432
|
-
|
|
433
|
-
|
|
434
|
-
|
|
435
|
-
|
|
436
|
-
|
|
437
|
-
|
|
438
|
-
|
|
439
|
-
|
|
440
|
-
Cellular Data Injection
|
|
441
|
-
BitSquatting
|
|
442
|
-
WiFi MAC Address Tracking
|
|
443
|
-
WiFi SSID Tracking
|
|
444
|
-
Rooting SIM Cards
|
|
445
|
-
Evil Twin Wi-Fi Attack
|
|
446
|
-
Establish Rogue Location
|
|
447
|
-
Cellular Rogue Base Station
|
|
448
|
-
Cellular Broadcast Message Request
|
|
449
|
-
Signal Strength Tracking
|
|
450
|
-
Cross Site Request Forgery
|
|
451
|
-
Drop Encryption Level
|
|
452
|
-
Analysis of Packet Timing and Sizes
|
|
272
|
+
Add Malicious File to Shared Webroot
|
|
273
|
+
Root/Jailbreak Detection Evasion via Debugging
|
|
274
|
+
Block Access to Libraries
|
|
275
|
+
UDP Ping
|
|
276
|
+
Malicious Automated Software Update via Redirection
|
|
277
|
+
Malicious Manual Software Update
|
|
278
|
+
Passing Local Filenames to Functions That Expect a URL
|
|
279
|
+
Communication Channel Manipulation
|
|
280
|
+
Fake the Source of Data
|
|
281
|
+
Encryption Brute Forcing
|
|
282
|
+
Principal Spoof
|
|
283
|
+
Reverse Engineer an Executable to Expose Assumed Hidden Functionality
|
|
284
|
+
Footprinting
|
|
285
|
+
Use of Known Domain Credentials
|
|
286
|
+
DNS Zone Transfers
|
|
287
|
+
XSS Targeting Non-Script Elements
|
|
288
|
+
Sniffing Network Traffic
|
|
289
|
+
Command Line Execution through SQL Injection
|
|
290
|
+
Target Influence via Framing
|
|
453
291
|
Electromagnetic Side-Channel Attack
|
|
454
|
-
|
|
292
|
+
Serialized Data with Nested Payloads
|
|
293
|
+
Pretexting
|
|
294
|
+
Scanning for Vulnerable Software
|
|
295
|
+
Bypassing Physical Security
|
|
296
|
+
Inclusion of Code in Existing Process
|
|
297
|
+
Flash Parameter Injection
|
|
298
|
+
Try Common or Default Usernames and Passwords
|
|
299
|
+
Key Negotiation of Bluetooth Attack (KNOB)
|
|
300
|
+
Password Brute Forcing
|
|
301
|
+
SOAP Manipulation
|
|
302
|
+
Overflow Variables and Tags
|
|
303
|
+
Documentation Alteration to Circumvent Dial-down
|
|
304
|
+
Authentication Bypass
|
|
305
|
+
Quadratic Data Expansion
|
|
306
|
+
Block Logging to Central Repository
|
|
307
|
+
Blind SQL Injection
|
|
308
|
+
Excavation
|
|
309
|
+
Kerberoasting
|
|
310
|
+
Signature Spoofing by Improper Validation
|
|
311
|
+
Signature Spoofing by Mixing Signed and Unsigned Content
|
|
312
|
+
Accessing Functionality Not Properly Constrained by ACLs
|
|
313
|
+
Altered Component Firmware
|
|
314
|
+
Modification of Windows Service Configuration
|
|
315
|
+
Traceroute Route Enumeration
|
|
316
|
+
AJAX Footprinting
|
|
317
|
+
XML Ping of the Death
|
|
318
|
+
Poison Web Service Registry
|
|
319
|
+
Eavesdropping
|
|
320
|
+
Alternative Execution Due to Deceptive Filenames
|
|
455
321
|
Hardware Fault Injection
|
|
456
|
-
|
|
457
|
-
|
|
458
|
-
|
|
459
|
-
|
|
460
|
-
|
|
322
|
+
TCP Null Scan
|
|
323
|
+
Flash Memory Attacks
|
|
324
|
+
Replace Winlogon Helper DLL
|
|
325
|
+
Counterfeit Organizations
|
|
326
|
+
Lock Picking
|
|
327
|
+
Probe System Files
|
|
328
|
+
Leverage Executable Code in Non-Executable Files
|
|
329
|
+
Using Malicious Files
|
|
330
|
+
Manipulating Opaque Client-based Data Tokens
|
|
331
|
+
XML Routing Detour Attacks
|
|
332
|
+
Malicious Automated Software Update via Spoofing
|
|
333
|
+
Application API Button Hijacking
|
|
334
|
+
ICMP Echo Request Ping
|
|
335
|
+
Client-Server Protocol Manipulation
|
|
336
|
+
Port Scanning
|
|
337
|
+
Modify Shared File
|
|
338
|
+
Identify Shared Files/Directories on System
|
|
339
|
+
NoSQL Injection
|
|
340
|
+
Checksum Spoofing
|
|
341
|
+
Cryptanalysis of Cellular Encryption
|
|
342
|
+
Application API Navigation Remapping
|
|
343
|
+
Influence via Psychological Principles
|
|
344
|
+
Hijacking a privileged process
|
|
345
|
+
Phishing
|
|
346
|
+
Try All Common Switches
|
|
347
|
+
Reusing Session IDs (aka Session Replay)
|
|
348
|
+
TCP Timestamp Probe
|
|
349
|
+
Leverage Alternate Encoding
|
|
350
|
+
Detect Unpublicized Web Pages
|
|
351
|
+
Counterfeit Hardware Component Inserted During Product Assembly
|
|
352
|
+
SoundSquatting
|
|
353
|
+
Disable Security Software
|
|
354
|
+
Malicious Root Certificate
|
|
355
|
+
Rainbow Table Password Cracking
|
|
356
|
+
Inter-component Protocol Manipulation
|
|
357
|
+
Shoulder Surfing
|
|
358
|
+
Manipulating Hidden Fields
|
|
359
|
+
USB Memory Attacks
|
|
360
|
+
BitSquatting
|
|
361
|
+
Developer Signing Maliciously Altered Software
|
|
362
|
+
Malicious Hardware Update
|
|
363
|
+
DNS Rebinding
|
|
364
|
+
Probe Audio and Video Peripherals
|
|
365
|
+
Retrieve Data from Decommissioned Devices
|
|
366
|
+
Exploiting Incorrect Chaining or Granularity of Hardware Debug Components
|
|
367
|
+
Signature Spoofing by Key Theft
|
|
368
|
+
Dictionary-based Password Attack
|
|
369
|
+
XML Injection
|
|
370
|
+
HTTP DoS
|
|
371
|
+
Exploiting Incorrectly Configured Access Control Security Levels
|
|
372
|
+
Postfix, Null Terminate, and Backslash
|
|
373
|
+
Search Order Hijacking
|
|
374
|
+
Collect Data from Registries
|
|
375
|
+
XML Flood
|
|
376
|
+
Password Recovery Exploitation
|
|
377
|
+
HTTP Response Smuggling
|
|
378
|
+
Using a Snap Gun Lock to Force a Lock
|
|
379
|
+
Install New Service
|
|
380
|
+
Influence Perception
|
|
381
|
+
Detect Unpublicized Web Services
|
|
382
|
+
DOM-Based XSS
|
|
383
|
+
Provide Counterfeit Component
|
|
384
|
+
XSS Using MIME Type Mismatch
|
|
385
|
+
Exploit Non-Production Interfaces
|
|
386
|
+
Relative Path Traversal
|
|
387
|
+
Intent Spoof
|
|
388
|
+
Audit Log Manipulation
|
|
389
|
+
Fuzzing for application mapping
|
|
390
|
+
Process Footprinting
|
|
391
|
+
Cellular Data Injection
|
|
392
|
+
Run Software at Logon
|
|
393
|
+
Buffer Overflow in Local Command-Line Utilities
|
|
461
394
|
TypoSquatting
|
|
462
|
-
|
|
463
|
-
|
|
395
|
+
Web Services Protocol Manipulation
|
|
396
|
+
XSS Using Alternate Syntax
|
|
397
|
+
HTTP Request Splitting
|
|
398
|
+
iFrame Overlay
|
|
399
|
+
Rooting SIM Cards
|
|
400
|
+
Argument Injection
|
|
401
|
+
Upload a Web Shell to a Web Server
|
|
402
|
+
HTTP Response Splitting
|
|
403
|
+
Wi-Fi Jamming
|
|
404
|
+
UDP Flood
|
|
405
|
+
Target Influence via Eye Cues
|
|
406
|
+
Evil Twin Wi-Fi Attack
|
|
407
|
+
Force Use of Corrupted Files
|
|
408
|
+
Content Spoofing
|
|
409
|
+
TCP SYN Ping
|
|
410
|
+
Interception
|
|
411
|
+
Sniffing Attacks
|
|
412
|
+
Explore for Predictable Temporary File Names
|
|
413
|
+
Data Injected During Configuration
|
|
464
414
|
Token Impersonation
|
|
465
|
-
Probe Audio and Video Peripherals
|
|
466
|
-
Alternative Execution Due to Deceptive Filenames
|
|
467
|
-
Hiding Malicious Data or Code within Files
|
|
468
|
-
Collect Data from Clipboard
|
|
469
|
-
Altered Component Firmware
|
|
470
|
-
Probe System Files
|
|
471
|
-
Using Slashes and URL Encoding Combined to Bypass Validation Logic
|
|
472
|
-
Inclusion of Code in Existing Process
|
|
473
415
|
DLL Side-Loading
|
|
474
|
-
|
|
475
|
-
|
|
476
|
-
|
|
477
|
-
|
|
478
|
-
|
|
479
|
-
|
|
480
|
-
|
|
481
|
-
|
|
482
|
-
|
|
483
|
-
|
|
484
|
-
|
|
485
|
-
|
|
486
|
-
|
|
487
|
-
|
|
416
|
+
ASIC With Malicious Functionality
|
|
417
|
+
OS Command Injection
|
|
418
|
+
SOAP Array Blowup
|
|
419
|
+
Privilege Escalation
|
|
420
|
+
TCP Options Probe
|
|
421
|
+
WebView Exposure
|
|
422
|
+
Session Fixation
|
|
423
|
+
Target Influence via Interview and Interrogation
|
|
424
|
+
Lifting Sensitive Data Embedded in Cache
|
|
425
|
+
BlueSmacking
|
|
426
|
+
Client-side Injection-induced Buffer Overflow
|
|
427
|
+
TCP Initial Window Size Probe
|
|
428
|
+
Homograph Attack via Homoglyphs
|
|
429
|
+
Cross Site Identification
|
|
430
|
+
Leveraging Race Conditions
|
|
431
|
+
Functionality Misuse
|
|
432
|
+
XSS Targeting URI Placeholders
|
|
433
|
+
Cellular Traffic Intercept
|
|
434
|
+
Modification of Registry Run Keys
|
|
435
|
+
Network Boundary Bridging
|
|
436
|
+
Security Software Footprinting
|
|
437
|
+
DHCP Spoofing
|
|
438
|
+
Cloning RFID Cards or Chips
|
|
439
|
+
Open-Source Library Manipulation
|
|
440
|
+
Target Programs with Elevated Privileges
|
|
441
|
+
Format String Injection
|
|
488
442
|
Avoid Security Tool Identification by Adding Data
|
|
443
|
+
Replace File Extension Handlers
|
|
444
|
+
TCP Sequence Number Probe
|
|
445
|
+
Malicious Gray Market Hardware
|
|
446
|
+
Accessing/Intercepting/Modifying HTTP Cookies
|
|
447
|
+
Parameter Injection
|
|
448
|
+
Fuzzing for garnering other adjacent user/sensitive data
|
|
449
|
+
Resource Location Spoofing
|
|
450
|
+
Design Alteration
|
|
451
|
+
System Build Data Maliciously Altered
|
|
452
|
+
IP (DF) 'Don't Fragment Bit' Echoing Probe
|
|
453
|
+
Using Unpublished Interfaces or Functionality
|
|
454
|
+
Redirect Access to Libraries
|
|
455
|
+
White Box Reverse Engineering
|
|
456
|
+
Overflow Binary Resource File
|
|
457
|
+
HTTP Flood
|
|
458
|
+
WiFi MAC Address Tracking
|
|
459
|
+
PHP Local File Inclusion
|
|
460
|
+
Filter Failure through Buffer Overflow
|
|
461
|
+
Shared Resource Manipulation
|
|
462
|
+
Host Discovery
|
|
463
|
+
HTTP Request Smuggling
|
|
464
|
+
URL Encoding
|
|
465
|
+
Influence Perception of Consensus or Social Proof
|
|
466
|
+
Signal Strength Tracking
|
|
467
|
+
Replace Trusted Executable
|
|
468
|
+
Signature Spoof
|
|
469
|
+
ICMP IP Total Length Field Probe
|
|
470
|
+
Serialized Data External Linking
|
|
471
|
+
Choosing Message Identifier
|
|
472
|
+
Serialized Data Parameter Blowup
|
|
473
|
+
Using Leading 'Ghost' Character Sequences to Bypass Input Filters
|
|
474
|
+
Infected Memory
|
|
475
|
+
Regular Expression Exponential Blowup
|
|
476
|
+
Physical Theft
|
|
477
|
+
TCP RST Injection
|
|
478
|
+
ICMP IP 'ID' Field Error Message Probe
|
|
479
|
+
Excessive Allocation
|
|
480
|
+
Cache Poisoning
|
|
481
|
+
Manipulate Registry Information
|
|
482
|
+
Reflection Injection
|
|
483
|
+
Repo Jacking
|
|
484
|
+
Buffer Overflow via Parameter Expansion
|
|
485
|
+
Buffer Overflow in an API Call
|
|
486
|
+
Drop Encryption Level
|
|
487
|
+
Amplification
|
|
488
|
+
Enumerate Mail Exchange (MX) Records
|
|
489
|
+
Spoof Version Control System Commit Metadata
|
|
490
|
+
Connection Reset
|
|
491
|
+
Spoofing of UDDI/ebXML Messages
|
|
492
|
+
Application Fingerprinting
|
|
493
|
+
Exploiting Multiple Input Interpretation Layers
|
|
494
|
+
Exploitation of Improperly Controlled Hardware Security Identifiers
|
|
495
|
+
Establish Rogue Location
|
|
496
|
+
Application API Message Manipulation via Man-in-the-Middle
|
|
497
|
+
Server Motherboard Compromise
|
|
498
|
+
XSS Targeting HTML Attributes
|
|
499
|
+
BGP Route Disabling
|
|
500
|
+
Using Slashes in Alternate Encoding
|
|
501
|
+
XML Schema Poisoning
|
|
502
|
+
Cross Zone Scripting
|
|
489
503
|
Voice Phishing
|
|
490
|
-
|
|
491
|
-
|
|
492
|
-
|
|
493
|
-
|
|
494
|
-
|
|
504
|
+
Blockage
|
|
505
|
+
Functionality Bypass
|
|
506
|
+
Clickjacking
|
|
507
|
+
Incomplete Data Deletion in a Multi-Tenant Environment
|
|
508
|
+
Evercookie
|
|
509
|
+
DNS Spoofing
|
|
510
|
+
Data Serialization External Entities Blowup
|
|
511
|
+
DNS Cache Poisoning
|
|
512
|
+
Manipulate Human Behavior
|
|
513
|
+
Scheme Squatting
|
|
514
|
+
Influence Perception of Commitment and Consistency
|
|
515
|
+
TCP SYN Scan
|
|
516
|
+
Development Alteration
|
|
495
517
|
Exploitation of Transient Instruction Execution
|
|
518
|
+
Influence Perception of Authority
|
|
519
|
+
TCP Connect Scan
|
|
520
|
+
Object Relational Mapping Injection
|
|
521
|
+
Cryptanalysis
|
|
522
|
+
Cross Site Tracing
|
|
523
|
+
User-Controlled Filename
|
|
524
|
+
Rogue Integration Procedures
|
|
525
|
+
Adding a Space to a File Extension
|
|
526
|
+
Subverting Environment Variable Values
|
|
496
527
|
Server Side Request Forgery
|
|
497
|
-
|
|
498
|
-
|
|
528
|
+
Windows Admin Shares with Stolen Credentials
|
|
529
|
+
IMAP/SMTP Command Injection
|
|
530
|
+
SSL Flood
|
|
531
|
+
IP 'ID' Echoed Byte-Order Probe
|
|
532
|
+
Exponential Data Expansion
|
|
533
|
+
Passive OS Fingerprinting
|
|
534
|
+
Interface Manipulation
|
|
535
|
+
XPath Injection
|
|
536
|
+
Password Spraying
|
|
537
|
+
Credential Prompt Impersonation
|
|
538
|
+
Malicious Logic Insertion into Product Software via Configuration Management Manipulation
|
|
539
|
+
File Manipulation
|
|
540
|
+
Exploit Script-Based APIs
|
|
541
|
+
Group Permission Footprinting
|
|
542
|
+
Configuration/Environment Manipulation
|
|
543
|
+
Root/Jailbreak Detection Evasion via Hooking
|
|
544
|
+
Load Value Injection
|
|
545
|
+
Capture Credentials via Keylogger
|
|
546
|
+
Path Traversal
|
|
547
|
+
Double Encoding
|
|
548
|
+
ICMP Fragmentation
|
|
549
|
+
Action Spoofing
|
|
499
550
|
Bluetooth Impersonation AttackS (BIAS)
|
|
500
|
-
Key Negotiation of Bluetooth Attack (KNOB)
|
|
501
|
-
Alteration of a Software Update
|
|
502
|
-
String Format Overflow in syslog()
|
|
503
|
-
Software Development Tools Maliciously Altered
|
|
504
|
-
Requirements for ASIC Functionality Maliciously Altered
|
|
505
|
-
Malicious Code Implanted During Chip Programming
|
|
506
|
-
Developer Signing Maliciously Altered Software
|
|
507
551
|
Design for FPGA Maliciously Altered
|
|
508
|
-
|
|
509
|
-
|
|
510
|
-
|
|
511
|
-
|
|
512
|
-
|
|
513
|
-
|
|
514
|
-
|
|
515
|
-
|
|
516
|
-
|
|
517
|
-
Target Programs with Elevated Privileges
|
|
518
|
-
Metadata Spoofing
|
|
519
|
-
Spoof Open-Source Software Metadata
|
|
520
|
-
Spoof Version Control System Commit Metadata
|
|
521
|
-
StarJacking
|
|
522
|
-
System Location Discovery
|
|
523
|
-
Repo Jacking
|
|
524
|
-
Load Value Injection
|
|
525
|
-
DHCP Spoofing
|
|
526
|
-
Install Malicious Extension
|
|
527
|
-
Eavesdropping on a Monitor
|
|
528
|
-
Blind SQL Injection
|
|
529
|
-
Try Common or Default Usernames and Passwords
|
|
530
|
-
Network Boundary Bridging
|
|
531
|
-
Browser in the Middle (BiTM)
|
|
532
|
-
Exploiting Incorrect Chaining or Granularity of Hardware Debug Components
|
|
533
|
-
Using Unicode Encoding to Bypass Validation Logic
|
|
534
|
-
URL Encoding
|
|
535
|
-
User-Controlled Filename
|
|
536
|
-
Manipulating State
|
|
537
|
-
Manipulating Writeable Configuration Files
|
|
538
|
-
Manipulating Web Input to File System Calls
|
|
539
|
-
Manipulating User-Controlled Variables
|
|
540
|
-
Using Escaped Slashes in Alternate Encoding
|
|
541
|
-
Using Slashes in Alternate Encoding
|
|
542
|
-
Buffer Overflow in an API Call
|
|
543
|
-
Using UTF-8 Encoding to Bypass Validation Logic
|
|
544
|
-
Web Server Logs Tampering
|
|
545
|
-
XPath Injection
|
|
546
|
-
XQuery Injection
|
|
547
|
-
AJAX Footprinting
|
|
548
|
-
XSS Through HTTP Headers
|
|
549
|
-
Forceful Browsing
|
|
550
|
-
OS Command Injection
|
|
551
|
-
Pharming
|
|
552
|
-
Buffer Overflow in Local Command-Line Utilities
|
|
553
|
-
Reflection Attack in Authentication Protocol
|
|
554
|
-
Forced Integer Overflow
|
|
555
|
-
Log Injection-Tampering-Forging
|
|
556
|
-
Adversary in the Middle (AiTM)
|
|
557
|
-
WSDL Scanning
|
|
558
|
-
Block Access to Libraries
|
|
559
|
-
Cryptanalysis
|
|
560
|
-
Phishing
|
|
552
|
+
Network Topology Mapping
|
|
553
|
+
Privilege Abuse
|
|
554
|
+
Hardware Component Substitution
|
|
555
|
+
Leveraging Race Conditions via Symbolic Links
|
|
556
|
+
Physically Hacking Hardware
|
|
557
|
+
Using Slashes and URL Encoding Combined to Bypass Validation Logic
|
|
558
|
+
Spear Phishing
|
|
559
|
+
Cellular Rogue Base Station
|
|
560
|
+
The MITRE Corporation
|