Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-38:Leveraging/Manipulating Configuration File Search Paths
Attack Pattern ID:38
Version:v3.9
Attack Pattern Name:Leveraging/Manipulating Configuration File Search Paths
Abstraction:Detailed
Status:Draft
Likelihood of Attack:High
Typical Severity:Very High
DetailsContent HistoryRelated WeaknessesReports
▼Submissions
Submission DateSubmitterOrganization
2014-06-23CAPEC Content TeamThe MITRE Corporation

Submission Date: 2014-06-23

Submitter: CAPEC Content Team

Organization: The MITRE Corporation

▼Modifications
Modification DateModifierOrganizationComment
2018-07-31CAPEC Content TeamThe MITRE CorporationUpdated Description, Description Summary, Examples-Instances, Related_Weaknesses
2019-04-04CAPEC Content TeamThe MITRE CorporationUpdated Related_Weaknesses
2020-07-30CAPEC Content TeamThe MITRE CorporationUpdated Taxonomy_Mappings
2022-09-29CAPEC Content TeamThe MITRE CorporationUpdated Example_Instances, Taxonomy_Mappings

Modification Date: 2018-07-31

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Description, Description Summary, Examples-Instances, Related_Weaknesses

Modification Date: 2019-04-04

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Related_Weaknesses

Modification Date: 2020-07-30

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Taxonomy_Mappings

Modification Date: 2022-09-29

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Example_Instances, Taxonomy_Mappings
▼Previous Name Entries
Change DatePrevious Entry Name