Page(s) : 1 2 3 4 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 19 20 Result(s) : 384
CAPEC ID CAPEC Name
CAPEC-201 External Entity Attack
CAPEC-202 Create Malicious Client
CAPEC-203 Manipulate Application Registry Values
CAPEC-204 Lifting cached, sensitive data embedded in client distributions (thick or thin)
CAPEC-205 Lifting credential(s)/key material embedded in client distributions (thick or thin)
CAPEC-206 Lifting signing key and signing malicious code from a production environment
CAPEC-207 Removing Important Functionality from the Client
CAPEC-208 Removing/short-circuiting 'Purse' logic: removing/mutating 'cash' decrements
CAPEC-209 Cross-Site Scripting Using MIME Type Mismatch
CAPEC-210 Abuse of Functionality
CAPEC-211 Leveraging web tools (e.g. Mozilla's GreaseMonkey, Firebug) to change application behavior
CAPEC-212 Functionality Misuse
CAPEC-213 Directory Traversal
CAPEC-214 Fuzzing for garnering J2EE/.NET-based stack traces, for application mapping
CAPEC-215 Fuzzing and observing application log data/errors for application mapping
CAPEC-216 Abuse of Communication Channels
CAPEC-217 Exploiting Incorrectly Configured SSL Security Levels
CAPEC-218 Spoofing of UDDI/ebXML Messages
CAPEC-219 XML Routing Detour Attacks
CAPEC-220 Client-Server Protocol Manipulation
Page(s) : 1 2 3 4 5 6 7 8 9 10 [11] 12 13 14 15 16 17 18 19 20 Result(s) : 384