Existing Patterns
Modified with Enhanced Material
|
CAPEC-3 |
Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-12 |
Choosing Message Identifier |
CAPEC-17 |
Accessing, Modifying or Executing Executable Files |
CAPEC-22 |
Exploiting Trust in Client |
CAPEC-23 |
File Content Injection |
CAPEC-32 |
Embedding Scripts in HTTP Query Strings |
CAPEC-35 |
Leverage Executable Code in Non-Executable Files |
CAPEC-36 |
Using Unpublished APIs |
CAPEC-44 |
Overflow Binary Resource File |
CAPEC-47 |
Buffer Overflow via Parameter Expansion |
CAPEC-48 |
Passing Local Filenames to Functions That Expect a URL |
CAPEC-58 |
Restful Privilege Elevation |
CAPEC-62 |
Cross Site Request Forgery (aka Session Riding) |
CAPEC-65 |
Sniff Application Code |
CAPEC-75 |
Manipulating Writeable Configuration Files |
CAPEC-87 |
Forceful Browsing |
CAPEC-89 |
Pharming |
CAPEC-95 |
WSDL Scanning |
CAPEC-104 |
Cross Zone Scripting |
CAPEC-111 |
JSON Hijacking (aka JavaScript Hijacking) |
CAPEC-113 |
API Manipulation |
CAPEC-122 |
Privilege Abuse |
CAPEC-133 |
Try All Common Switches |
CAPEC-139 |
Relative Path Traversal |
CAPEC-141 |
Cache Poisoning |
CAPEC-143 |
Detect Unpublicized Web Pages |
CAPEC-144 |
Detect Unpublicized Web Services |
CAPEC-150 |
Collect Data from Common Resource Locations |
CAPEC-157 |
Sniffing Attacks |
CAPEC-158 |
Sniffing Network Traffic |
CAPEC-160 |
Exploit Script-Based APIs |
CAPEC-162 |
Manipulating Hidden Fields |
CAPEC-170 |
Web Application Fingerprinting |
CAPEC-179 |
Calling Micro-Services Directly |
CAPEC-180 |
Exploiting Incorrectly Configured Access Control Security Levels |
CAPEC-200 |
Removal of filters: Input filters, output filters, data masking |
CAPEC-207 |
Removing Important Client Functionality |
CAPEC-208 |
Removing/short-circuiting 'Purse' logic: removing/mutating 'cash' decrements |
CAPEC-212 |
Functionality Misuse |
CAPEC-213 |
Directory Traversal |
CAPEC-216 |
Communication Channel Manipulation |
CAPEC-217 |
Exploiting Incorrectly Configured SSL |
CAPEC-233 |
Privilege Escalation |
CAPEC-239 |
Subversion of authorization checks: cache filtering, programmatic security, etc. |
CAPEC-240 |
Resource Injection |
CAPEC-310 |
Scanning for Vulnerable Software |
CAPEC-464 |
Evercookie |
CAPEC-465 |
Transparent Proxy Abuse |
CAPEC-468 |
Generic Cross-Browser Cross-Domain Theft |
CAPEC-545 |
Pull Data from System Resources |
CAPEC-560 |
Use of Known Domain Credentials |
CAPEC-609 |
Cellular Traffic Intercept |
CAPEC-620 |
Drop Encryption Level |