Page(s) : 1 2 3 4 5 6 7 8 9 10 11 [12] 13 14 15 16 17 18 19 20Result(s) : 384
CAPEC IDCAPEC Name
CAPEC-221External Entity Attack
CAPEC-222iFrame Overlay
CAPEC-223Probabilistic Techniques
CAPEC-224Fingerprinting
CAPEC-225Exploitation of Authentication
CAPEC-226Session Credential Falsification through Manipulation
CAPEC-227Denial of Service through Resource Depletion
CAPEC-228Resource Depletion through DTD Injection in a SOAP Message
CAPEC-229XML Attribute Blowup
CAPEC-230Recursive Payloads Sent to XML Parsers
CAPEC-231Oversized Payloads Sent to XML Parsers
CAPEC-232Exploitation of Privilege/Trust
CAPEC-233Privilege Escalation
CAPEC-234Hijacking a privileged process
CAPEC-235Implementing a callback to system routine (old AWT Queue)
CAPEC-236Catching exception throw/signal from privileged block
CAPEC-237Calling signed code from another language within a sandbox that allows this
CAPEC-238Using URL/codebase / G.A.C. (code source) to convince sandbox of privilege
CAPEC-239Subversion of authorization checks: cache filtering, programmatic security, etc.
CAPEC-240Resource Injection
Page(s) : 1 2 3 4 5 6 7 8 9 10 11 [12] 13 14 15 16 17 18 19 20Result(s) : 384