| CAPEC --> CWE Mappings Added |
| CAPEC-98 Phishing |
| --> |
CWE-451 |
User Interface (UI) Misrepresentation of Critical Information |
| CAPEC-138 Reflection Injection |
| --> |
CWE-470 |
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |
| CAPEC-143 Detect Unpublicized Web Pages |
| --> |
CWE-425 |
Direct Request ('Forced Browsing') |
| CAPEC-144 Detect Unpublicized Web Services |
| --> |
CWE-425 |
Direct Request ('Forced Browsing') |
| CAPEC-149 Explore for Predictable Temporary File Names |
| --> |
CWE-377 |
Insecure Temporary File |
| CAPEC-154 Resource Location Spoofing |
| --> |
CWE-451 |
User Interface (UI) Misrepresentation of Critical Information |
| CAPEC-161 Infrastructure Manipulation |
| --> |
CWE-923 |
Improper Restriction of Communication Channel to Intended Endpoints |
| CAPEC-163 Spear Phishing |
| --> |
CWE-451 |
User Interface (UI) Misrepresentation of Critical Information |
| CAPEC-164 Mobile Phishing |
| --> |
CWE-451 |
User Interface (UI) Misrepresentation of Critical Information |
| CAPEC-173 Action Spoofing |
| --> |
CWE-451 |
User Interface (UI) Misrepresentation of Critical Information |
| CAPEC-178 Cross-Site Flashing |
| --> |
CWE-601 |
URL Redirection to Untrusted Site ('Open Redirect') |
| CAPEC-188 Reverse Engineering |
| --> |
CWE-1278 |
Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques |
| CAPEC-216 Communication Channel Manipulation |
| --> |
CWE-306 |
Missing Authentication for Critical Function |
| CAPEC-227 Sustained Client Engagement |
| --> |
CWE-400 |
Uncontrolled Resource Consumption |
| CAPEC-331 ICMP IP Total Length Field Probe |
| --> |
CWE-204 |
Observable Response Discrepancy |
| CAPEC-332 ICMP IP 'ID' Field Error Message Probe |
| --> |
CWE-204 |
Observable Response Discrepancy |
| CAPEC-442 Infected Software |
| --> |
CWE-506 |
Embedded Malicious Code |
| CAPEC-448 Embed Virus into DLL |
| --> |
CWE-506 |
Embedded Malicious Code |
| CAPEC-456 Infected Memory |
| --> |
CWE-1257 |
Improper Access Control Applied to Mirrored or Aliased Memory Regions |
| --> |
CWE-1260 |
Improper Handling of Overlap Between Protected Memory Ranges |
| --> |
CWE-1274 |
Improper Access Control for Volatile Memory Containing Boot Code |
| --> |
CWE-1312 |
Missing Protection for Mirrored Regions in On-Chip Fabric Firewall |
| --> |
CWE-1316 |
Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges |
| CAPEC-457 USB Memory Attacks |
| --> |
CWE-1299 |
Missing Protection Mechanism for Alternate Hardware Interface |
| CAPEC-458 Flash Memory Attacks |
| --> |
CWE-1282 |
Assumed-Immutable Data is Stored in Writable Memory |
| CAPEC-481 Contradictory Destinations in Traffic Routing Schemes |
| --> |
CWE-923 |
Improper Restriction of Communication Channel to Intended Endpoints |
| CAPEC-498 Probe iOS Screenshots |
| --> |
CWE-359 |
Exposure of Private Personal Information to an Unauthorized Actor |
| CAPEC-500 WebView Injection |
| --> |
CWE-749 |
Exposed Dangerous Method or Function |
| --> |
CWE-940 |
Improper Verification of Source of a Communication Channel |
| CAPEC-538 Open-Source Library Manipulation |
| --> |
CWE-494 |
Download of Code Without Integrity Check |
| --> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |
| CAPEC-541 Application Fingerprinting |
| --> |
CWE-204 |
Observable Response Discrepancy |
| --> |
CWE-205 |
Observable Behavioral Discrepancy |
| --> |
CWE-208 |
Observable Timing Discrepancy |
| CAPEC-579 Replace Winlogon Helper DLL |
| --> |
CWE-15 |
External Control of System or Configuration Setting |
| CAPEC-580 System Footprinting |
| --> |
CWE-204 |
Observable Response Discrepancy |
| --> |
CWE-205 |
Observable Behavioral Discrepancy |
| --> |
CWE-208 |
Observable Timing Discrepancy |
| CAPEC-587 Cross Frame Scripting (XFS) |
| --> |
CWE-1021 |
Improper Restriction of Rendered UI Layers or Frames |
| CAPEC-625 Mobile Device Fault Injection |
| --> |
CWE-1247 |
Improper Protection Against Voltage and Clock Glitches |
| --> |
CWE-1248 |
Semiconductor Defects in Hardware Logic with Security-Sensitive Implications |
| --> |
CWE-1256 |
Improper Restriction of Software Interfaces to Hardware Features |
| --> |
CWE-1319 |
Improper Protection against Electromagnetic Fault Injection (EM-FI) |
| --> |
CWE-1332 |
Improper Handling of Faults that Lead to Instruction Skips |
| --> |
CWE-1334 |
Unauthorized Error Injection Can Degrade Hardware Redundancy |
| --> |
CWE-1338 |
Improper Protections Against Hardware Overheating |
| --> |
CWE-1351 |
Improper Handling of Hardware Behavior in Exceptionally Cold Environments |
| CAPEC-632 Homograph Attack via Homoglyphs |
| --> |
CWE-1007 |
Insufficient Visual Distinction of Homoglyphs Presented to User |
| CAPEC-636 Hiding Malicious Data or Code within Files |
| --> |
CWE-506 |
Embedded Malicious Code |
| CAPEC-640 Inclusion of Code in Existing Process |
| --> |
CWE-114 |
Process Control |
| --> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |
| CAPEC-675 Retrieve Data from Decommissioned Devices |
| --> |
CWE-1266 |
Improper Scrubbing of Sensitive Data from Decommissioned Device |
| CAPEC-695 Repo Jacking |
| --> |
CWE-494 |
Download of Code Without Integrity Check |
| --> |
CWE-829 |
Inclusion of Functionality from Untrusted Control Sphere |
| CAPEC-699 Eavesdropping on a Monitor |
| --> |
CWE-1300 |
Improper Protection of Physical Side Channels |
| CAPEC-701 Browser in the Middle (BiTM) |
| --> |
CWE-294 |
Authentication Bypass by Capture-replay |
| --> |
CWE-345 |
Insufficient Verification of Data Authenticity |
| CAPEC-702 Exploiting Incorrect Chaining or Granularity of Hardware Debug Components |
| --> |
CWE-1296 |
Incorrect Chaining or Granularity of Debug Components |