Trapdoor |
Weakness ID: 510 (Weakness Base) | Status: Incomplete |
Description Summary
Always verify the integrity of the software that is being installed. |
Identify and closely inspect the conditions for entering privileged areas of the code, especially those related to authentication, process invocation, and network communications. |
Nature | Type | ID | Name | View(s) this relationship pertains to![]() |
---|---|---|---|---|
ChildOf | ![]() | 506 | Embedded Malicious Code | Development Concepts (primary)699 Research Concepts (primary)1000 |
CAPEC-ID | Attack Pattern Name | (CAPEC Version: 1.4) |
---|---|---|
56 | Removing/short-circuiting 'guard logic' |
Submissions | ||||
---|---|---|---|---|
Submission Date | Submitter | Organization | Source | |
Landwehr | Externally Mined | |||
Modifications | ||||
Modification Date | Modifier | Organization | Source | |
2008-07-01 | Eric Dalci | Cigital | External | |
updated Potential Mitigations, Time of Introduction | ||||
2008-09-08 | CWE Content Team | MITRE | Internal | |
updated Relationships, Taxonomy Mappings |
Security-Database help your corporation foresee and avoid any security risks that may impact your IT infrastructure and business applications.