Software Integrity Attack |
CWE-494
|
Download of Code Without Integrity Check
|
|
Malicious Software Download |
CWE-494
|
Download of Code Without Integrity Check
|
|
Malicious Software Update |
CWE-494
|
Download of Code Without Integrity Check
|
|
Malicious Automated Software Update via Redirection |
CWE-494
|
Download of Code Without Integrity Check
|
|
Malicious Manual Software Update |
CWE-494
|
Download of Code Without Integrity Check
|
|
Open-Source Library Manipulation |
CWE-494
|
Download of Code Without Integrity Check
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
Malicious Automated Software Update via Spoofing |
CWE-494
|
Download of Code Without Integrity Check
|
|
Adversary in the Browser (AiTB) |
CWE-300
|
Channel Accessible by Non-Endpoint
|
CWE-494
|
Download of Code Without Integrity Check
|
|
Spoof Open-Source Software Metadata |
CWE-494
|
Download of Code Without Integrity Check
|
|
Spoof Version Control System Commit Metadata |
CWE-494
|
Download of Code Without Integrity Check
|
|
StarJacking |
CWE-494
|
Download of Code Without Integrity Check
|
|
Repo Jacking |
CWE-494
|
Download of Code Without Integrity Check
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|