Nature | Type | ID | Name |
---|---|---|---|
ChildOf | M | 165 | File Manipulation |
CanPrecede | D | 592 | Stored XSS |
To achieve a redirection and use of less trusted source, an attacker can simply edit data that the host uses to build the filename
Deploying a malicious "look-a-like" site (such as a site masquerading as a bank or online auction site) that the user enters their authentication data into.
Exploiting a client side vulnerability to inject malicious scripts into the browser's executable process.
Scope | Likelihood | Impact | Note |
---|---|---|---|
ConfidentialityAccess ControlAuthorization | N/A | Gain Privileges | N/A |
ConfidentialityIntegrityAvailability | N/A | Execute Unauthorized Commands | Run Arbitrary Code |
Availability | N/A | Alter Execution Logic | N/A |
Confidentiality | N/A | Read Data | N/A |
ID | Name |
---|---|
CWE-116 | Improper Encoding or Escaping of Output |
CWE-184 | Incomplete List of Disallowed Inputs |
CWE-20 | Improper Input Validation |
CWE-348 | Use of Less Trusted Source |
CWE-350 | Reliance on Reverse DNS Resolution for a Security-Critical Action |
CWE-697 | Incorrect Comparison |
CWE-86 | Improper Neutralization of Invalid Characters in Identifiers in Web Pages |
CWE-96 | Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') |
Taxonomy Name | Entry ID | Entry Name |
---|