Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-162:Manipulating Hidden Fields
Attack Pattern ID:162
Version:v3.9
Attack Pattern Name:Manipulating Hidden Fields
Abstraction:Detailed
Status:Draft
Likelihood of Attack:
Typical Severity:High
DetailsContent HistoryRelated WeaknessesReports
▼Submissions
Submission DateSubmitterOrganization
2014-06-23CAPEC Content TeamThe MITRE Corporation

Submission Date: 2014-06-23

Submitter: CAPEC Content Team

Organization: The MITRE Corporation

▼Modifications
Modification DateModifierOrganizationComment
2015-12-07CAPEC Content TeamThe MITRE CorporationUpdated Related_Attack_Patterns
2017-01-09CAPEC Content TeamThe MITRE CorporationUpdated Related_Attack_Patterns
2017-08-04CAPEC Content TeamThe MITRE CorporationUpdated Attack_Prerequisites, Description Summary, Resources_Required
2022-02-22CAPEC Content TeamThe MITRE CorporationUpdated Execution_Flow

Modification Date: 2015-12-07

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Related_Attack_Patterns

Modification Date: 2017-01-09

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Related_Attack_Patterns

Modification Date: 2017-08-04

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Attack_Prerequisites, Description Summary, Resources_Required

Modification Date: 2022-02-22

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Execution_Flow
▼Previous Name Entries
Change DatePrevious Entry Name
2015-12-07Manipulating hidden fields to change the normal flow of transactions (eShoplifting)

Change Date: 2015-12-07

Previous Entry Name: Manipulating hidden fields to change the normal flow of transactions (eShoplifting)