CAPEC Related Weakness
Probe Application Memory
CWE-284Improper Access Control
Intent Spoof
CWE-284Improper Access Control
Install Rootkit
CWE-284Improper Access Control
Modify Shared File
CWE-284Improper Access Control
Replace Trusted Executable
CWE-284Improper Access Control
Install New Service
CWE-284Improper Access Control
Embedding Scripts within Scripts
CWE-284Improper Access Control
Malicious Logic Insertion
CWE-284Improper Access Control
Modify Existing Service
CWE-284Improper Access Control
CWE-522Insufficiently Protected Credentials
Modification of Windows Service Configuration
CWE-284Improper Access Control
Data Injected During Configuration
CWE-284Improper Access Control
Run Software at Logon
CWE-284Improper Access Control
Disable Security Software
CWE-284Improper Access Control
Add Malicious File to Shared Webroot
CWE-284Improper Access Control
Malicious Root Certificate
CWE-284Improper Access Control
WebView Exposure
CWE-284Improper Access Control
Replace File Extension Handlers
CWE-284Improper Access Control
Back to Top