CAPEC Patterns referencing CWE-284
Below is a list of CAPEC attack patterns associated with this CWE-284. Click on each CAPEC to learn more. The right column shows the related weaknesses (including this one).
| CAPEC | Related Weaknesses | ||||||
|---|---|---|---|---|---|---|---|
| Embedding Scripts within Scripts |
|
||||||
| Malicious Logic Insertion |
|
||||||
| Modification of Windows Service Configuration |
|
||||||
| Malicious Root Certificate |
|
||||||
| Intent Spoof |
|
||||||
| WebView Exposure |
|
||||||
| Data Injected During Configuration |
|
||||||
| Incomplete Data Deletion in a Multi-Tenant Environment |
|
||||||
| Install New Service |
|
||||||
| Modify Existing Service |
|
||||||
| Install Rootkit |
|
||||||
| Replace File Extension Handlers |
|
||||||
| Replace Trusted Executable |
|
||||||
| Modify Shared File |
|
||||||
| Add Malicious File to Shared Webroot |
|
||||||
| Run Software at Logon |
|
||||||
| Disable Security Software |
|