Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CAPEC-76:Manipulating Web Input to File System Calls
Attack Pattern ID:76
Version:v3.9
Attack Pattern Name:Manipulating Web Input to File System Calls
Abstraction:Detailed
Status:Draft
Likelihood of Attack:High
Typical Severity:Very High
DetailsContent HistoryRelated WeaknessesReports
▼Submissions
Submission DateSubmitterOrganization
2014-06-23CAPEC Content TeamThe MITRE Corporation

Submission Date: 2014-06-23

Submitter: CAPEC Content Team

Organization: The MITRE Corporation

▼Modifications
Modification DateModifierOrganizationComment
2017-01-09CAPEC Content TeamThe MITRE CorporationUpdated Examples-Instances, Related_Attack_Patterns
2020-07-30CAPEC Content TeamThe MITRE CorporationUpdated Execution_Flow
2021-06-24CAPEC Content TeamThe MITRE CorporationUpdated Related_Weaknesses
2021-10-21CAPEC Content TeamThe MITRE CorporationUpdated Execution_Flow
2022-09-29CAPEC Content TeamThe MITRE CorporationUpdated Example_Instances

Modification Date: 2017-01-09

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Examples-Instances, Related_Attack_Patterns

Modification Date: 2020-07-30

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Execution_Flow

Modification Date: 2021-06-24

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Related_Weaknesses

Modification Date: 2021-10-21

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Execution_Flow

Modification Date: 2022-09-29

Modifier: CAPEC Content Team

Organization: The MITRE Corporation

Comment:

Updated Example_Instances
▼Previous Name Entries
Change DatePrevious Entry Name
2017-01-09Manipulating Input to File System Calls

Change Date: 2017-01-09

Previous Entry Name: Manipulating Input to File System Calls