Wymagania wstępne
Targeted software is utilizing application framework APIs
Wymagane zasoby
A software program that allows the use of adversary-in-the-middle communications between the client and server, such as an adversary-in-the-middle proxy.
Powiązane słabości
| CWE-ID |
Nazwa słabości |
|
Missing Support for Integrity Check The product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data during transmission, such as a checksum. |
Odniesienia
REF-327
So Many Ways [...]: Exploiting Facebook and YoVille
Tom Stracener, Sean Barnum.
Zgłoszenie
| Nazwa |
Organizacja |
Data |
Data wydania |
| CAPEC Content Team |
The MITRE Corporation |
2014-06-23 +00:00 |
|
Modyfikacje
| Nazwa |
Organizacja |
Data |
Komentarz |
| CAPEC Content Team |
The MITRE Corporation |
2019-04-04 +00:00 |
Updated Related_Weaknesses |
| CAPEC Content Team |
The MITRE Corporation |
2019-09-30 +00:00 |
Updated @Abstraction |
| CAPEC Content Team |
The MITRE Corporation |
2021-06-24 +00:00 |
Updated Description, Resources_Required |