test_scratch
/
cti-ATT-CK-v13.1
/capec
/2.1
/course-of-action
/course-of-action--01f15bc6-e25d-4388-8a84-c6f82d7a7378.json
{ | |
"id": "bundle--c0d1f313-dccd-45e3-84df-9789fea24306", | |
"objects": [ | |
{ | |
"created": "2014-06-23T00:00:00.000Z", | |
"created_by_ref": "identity--e50ab59c-5c4f-4d40-bf6a-d58418d89bcd", | |
"description": "\n <xhtml:p>Do not allow override of global variables and do Not Trust Global Variables.</xhtml:p>\n <xhtml:p>If the register_globals option is enabled, PHP will create global variables for each GET, POST, and cookie variable included in the HTTP request. This means that a malicious user may be able to set variables unexpectedly. For instance make sure that the server setting for PHP does not expose global variables.</xhtml:p>\n ", | |
"id": "course-of-action--01f15bc6-e25d-4388-8a84-c6f82d7a7378", | |
"modified": "2022-09-29T00:00:00.000Z", | |
"name": "coa-77-0", | |
"object_marking_refs": [ | |
"marking-definition--17d82bb2-eeeb-4898-bda5-3ddbcd2b799d" | |
], | |
"spec_version": "2.1", | |
"type": "course-of-action", | |
"x_capec_version": "3.9" | |
} | |
], | |
"type": "bundle" | |
} |