Run Software at Logon |
|
Disable Security Software |
|
Data Injected During Configuration |
|
Replace Trusted Executable |
|
Embedding Scripts within Scripts |
|
Intent Spoof |
|
Modify Existing Service |
CWE-284
|
Improper Access Control
|
CWE-522
|
Insufficiently Protected Credentials
|
|
Add Malicious File to Shared Webroot |
|
Install New Service |
|
Malicious Logic Insertion |
|
WebView Exposure |
|
Modification of Windows Service Configuration |
|
Probe Application Memory |
CWE-284
|
Improper Access Control
|
CWE-1266
|
Improper Scrubbing of Sensitive Data from Decommissioned Device
|
CWE-1272
|
Sensitive Information Uncleared Before Debug/Power State Transition
|
|
Install Rootkit |
|
Modify Shared File |
|
Malicious Root Certificate |
|
Replace File Extension Handlers |
|