| Software Integrity Attack |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
| Malicious Software Download |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
| Malicious Software Update |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
| Malicious Automated Software Update via Redirection |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
| Malicious Manual Software Update |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
| Open-Source Library Manipulation |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|
| Malicious Automated Software Update via Spoofing |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
| Adversary in the Browser (AiTB) |
|
CWE-300
|
Channel Accessible by Non-Endpoint
|
|
CWE-494
|
Download of Code Without Integrity Check
|
|
| Spoof Open-Source Software Metadata |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
| Spoof Version Control System Commit Metadata |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
| StarJacking |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
| Repo Jacking |
|
CWE-494
|
Download of Code Without Integrity Check
|
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere
|
|