Prerequisiti
Direct access to the object or software.
Risorse richieste
Reverse engineering of software requires varying tools and methods that enable the decompiling of executable or other compiled objects.
Vulnerabilità correlate
| CWE-ID |
Nome della vulnerabilità |
|
Improper Management of Sensitive Trace Data Trace data collected from several sources on the
System-on-Chip (SoC) is stored in unprotected locations or
transported to untrusted agents. |
Invio
| Nome |
Organizzazione |
Data |
Data di rilascio |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modifiche
| Nome |
Organizzazione |
Data |
Commento |
| CAPEC Content Team |
The MITRE Corporation |
2015-11-09 +00:00 |
Updated Activation_Zone, Attack_Prerequisites, Description Summary, Injection_Vector, Payload, Payload_Activation_Impact, Related_Attack_Patterns, Related_Weaknesses, Resources_Required |
| CAPEC Content Team |
The MITRE Corporation |
2020-12-17 +00:00 |
Updated Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2023-01-24 +00:00 |
Updated Related_Weaknesses |