Page(s) : 1 [2] 3 4 5 6 7 8 9 10 11 12 ...Result(s) : 384
CAPEC IDCAPEC Name
CAPEC-21Exploitation of Session Variables, Resource IDs and other Trusted Credentials
CAPEC-22Exploiting Trust in Client (aka Make the Client Invisible)
CAPEC-23File System Function Injection, Content Based
CAPEC-24Filter Failure through Buffer Overflow
CAPEC-25Forced Deadlock
CAPEC-26Leveraging Race Conditions
CAPEC-27Leveraging Race Conditions via Symbolic Links
CAPEC-28Fuzzing
CAPEC-29Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
CAPEC-30Hijacking a Privileged Thread of Execution
CAPEC-31Accessing/Intercepting/Modifying HTTP Cookies
CAPEC-32Embedding Scripts in HTTP Query Strings
CAPEC-33HTTP Request Smuggling
CAPEC-34HTTP Response Splitting
CAPEC-35Leverage Executable Code in Nonexecutable Files
CAPEC-36Using Unpublished Web Service APIs
CAPEC-37Lifting Data Embedded in Client Distributions
CAPEC-38Leveraging/Manipulating Configuration File Search Paths
CAPEC-39Manipulating Opaque Client-based Data Tokens
CAPEC-40Manipulating Writeable Terminal Devices
Page(s) : 1 [2] 3 4 5 6 7 8 9 10 11 12 ...Result(s) : 384