Scope | Impact | Likelihood |
---|---|---|
Access Control | Gain Privileges or Assume Identity Note: A user can access restricted functionality and/or sensitive information that may include administrative functionality and user accounts. |
References | Description |
---|---|
CVE-2002-1981 | Roles have access to dangerous procedures (Accessible entities). |
CVE-2002-1671 | Untrusted object/method gets access to clipboard (Accessible entities). |
CVE-2004-2204 | Gain privileges using functions/tags that should be restricted (Accessible entities). |
CVE-2000-0315 | Traceroute program allows unprivileged users to modify source address of packet (Accessible entities). |
CVE-2004-0380 | Bypass domain restrictions using a particular file that references unsafe URI schemes (Accessible entities). |
CVE-2002-1154 | Script does not restrict access to an update command, leading to resultant disk consumption and filled error logs (Accessible entities). |
CVE-2002-1145 | "public" database user can use stored procedure to modify data controlled by the database owner (Unsafe privileged actions). |
CVE-2000-0506 | User with capability can prevent setuid program from dropping privileges (Unsafe privileged actions). |
CVE-2002-2042 | Allows attachment to and modification of privileged processes (Unsafe privileged actions). |
CVE-2000-1212 | User with privilege can edit raw underlying object using unprotected method (Unsafe privileged actions). |
CVE-2005-1742 | Inappropriate actions allowed by a particular role(Unsafe privileged actions). |
CVE-2001-1480 | Untrusted entity allowed to access the system clipboard (Unsafe privileged actions). |
CVE-2001-1551 | Extra Linux capability allows bypass of system-specified restriction (Unsafe privileged actions). |
CVE-2001-1166 | User with debugging rights can read entire process (Unsafe privileged actions). |
CVE-2005-1816 | Non-root admins can add themselves or others to the root admin group (Unsafe privileged actions). |
CVE-2005-2173 | Users can change certain properties of objects to perform otherwise unauthorized actions (Unsafe privileged actions). |
CVE-2005-2027 | Certain debugging commands not restricted to just the administrator, allowing registry modification and infoleak (Unsafe privileged actions). |
CAPEC-ID | Attack Pattern Name |
---|---|
CAPEC-58 | Restful Privilege Elevation An adversary identifies a Rest HTTP (Get, Put, Delete) style permission method allowing them to perform various malicious actions upon server data due to lack of access control mechanisms implemented within the application service accepting HTTP messages. |
CAPEC-634 | Probe Audio and Video Peripherals The adversary exploits the target system's audio and video functionalities through malware or scheduled tasks. The goal is to capture sensitive information about the target for financial, personal, political, or other gains which is accomplished by collecting communication data between two parties via the use of peripheral devices (e.g. microphones and webcams) or applications with audio and video capabilities (e.g. Skype) on a system. |
CAPEC-637 | Collect Data from Clipboard The adversary exploits an application that allows for the copying of sensitive data or information by collecting information copied to the clipboard. Data copied to the clipboard can be accessed by other applications, such as malware built to exfiltrate or log clipboard contents on a periodic basis. In this way, the adversary aims to garner information to which they are unauthorized. |
CAPEC-643 | Identify Shared Files/Directories on System An adversary discovers connections between systems by exploiting the target system's standard practice of revealing them in searchable, common areas. Through the identification of shared folders/drives between systems, the adversary may further their goals of locating and collecting sensitive information/files, or map potential routes for lateral movement within the network. |
CAPEC-648 | Collect Data from Screen Capture An adversary gathers sensitive information by exploiting the system's screen capture functionality. Through screenshots, the adversary aims to see what happens on the screen over the course of an operation. The adversary can leverage information gathered in order to carry out further attacks. |
Note: there are 2 separate sub-categories here:
Name | Organization | Date | Date release | Version |
---|---|---|---|---|
PLOVER | Draft 3 |
Name | Organization | Date | Comment |
---|---|---|---|
Eric Dalci | Cigital | updated Time_of_Introduction | |
CWE Content Team | MITRE | updated Description, Maintenance_Notes, Relationships, Taxonomy_Mappings | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Potential_Mitigations | |
CWE Content Team | MITRE | updated Common_Consequences | |
CWE Content Team | MITRE | updated Common_Consequences, Demonstrative_Examples, Relationships | |
CWE Content Team | MITRE | updated Potential_Mitigations, References | |
CWE Content Team | MITRE | updated Applicable_Platforms, Modes_of_Introduction, References, Relationships | |
CWE Content Team | MITRE | updated Related_Attack_Patterns | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
CWE Content Team | MITRE | updated Relationships | |
CWE Content Team | MITRE | updated Demonstrative_Examples | |
CWE Content Team | MITRE | updated Maintenance_Notes | |
CWE Content Team | MITRE | updated References | |
CWE Content Team | MITRE | updated References, Relationships | |
CWE Content Team | MITRE | updated Mapping_Notes |