Wymagania wstępne
The target must use the affected file without verifying its integrity.
Wymagane zasoby
None: No specialized resources are required to execute this type of attack. In some cases, tools can be used to better control the response of the targeted application to the modified file.
Zgłoszenie
| Nazwa |
Organizacja |
Data |
Data wydania |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modyfikacje
| Nazwa |
Organizacja |
Data |
Komentarz |
| CAPEC Content Team |
The MITRE Corporation |
2017-01-09 +00:00 |
Updated Related_Attack_Patterns |
| CAPEC Content Team |
The MITRE Corporation |
2017-08-04 +00:00 |
Updated Resources_Required |
| CAPEC Content Team |
The MITRE Corporation |
2022-09-29 +00:00 |
Updated Taxonomy_Mappings |