CAPEC Patterns referencing CWE-284
Below is a list of CAPEC attack patterns associated with this CWE-284. Click on each CAPEC to learn more. The right column shows the related weaknesses (including this one).
CAPEC | Related Weaknesses | ||||||
---|---|---|---|---|---|---|---|
Embedding Scripts within Scripts |
|
||||||
Malicious Logic Insertion |
|
||||||
Modification of Windows Service Configuration |
|
||||||
Malicious Root Certificate |
|
||||||
Intent Spoof |
|
||||||
WebView Exposure |
|
||||||
Data Injected During Configuration |
|
||||||
Incomplete Data Deletion in a Multi-Tenant Environment |
|
||||||
Install New Service |
|
||||||
Modify Existing Service |
|
||||||
Install Rootkit |
|
||||||
Replace File Extension Handlers |
|
||||||
Replace Trusted Executable |
|
||||||
Modify Shared File |
|
||||||
Add Malicious File to Shared Webroot |
|
||||||
Run Software at Logon |
|
||||||
Disable Security Software |
|