| CAPEC --> CAPEC Mappings Removed |
| CAPEC-17 Using Malicious Files |
|
Has Child --> |
CAPEC-1 |
Accessing Functionality Not Properly Constrained by ACLs |
|
Has Child --> |
CAPEC-165 |
File Manipulation |
| CAPEC-31 Accessing/Intercepting/Modifying HTTP Cookies |
|
Has Child --> |
CAPEC-150 |
Collect Data from Common Resource Locations |
| CAPEC-58 Restful Privilege Elevation |
|
Has Child --> |
CAPEC-233 |
Privilege Escalation |
| CAPEC-85 AJAX Fingerprinting |
|
Has Child --> |
CAPEC-541 |
Application Fingerprinting |
| CAPEC-89 Pharming |
|
CanFollow --> |
CAPEC-89 |
Pharming |
|
CanFollow --> |
CAPEC-543 |
Counterfeit Websites |
|
CanFollow --> |
CAPEC-611 |
BitSquatting |
|
CanFollow --> |
CAPEC-630 |
TypoSquatting |
|
CanFollow --> |
CAPEC-631 |
SoundSquatting |
|
CanFollow --> |
CAPEC-632 |
Homograph Attack via Homoglyphs |
| CAPEC-90 Reflection Attack in Authentication Protocol |
|
Has Child --> |
CAPEC-220 |
Client-Server Protocol Manipulation |
| CAPEC-94 Man in the Middle Attack |
|
CanFollow --> |
CAPEC-185 |
Malicious Software Download |
| CAPEC-107 Cross Site Tracing |
|
CanFollow --> |
CAPEC-63 |
Cross-Site Scripting (XSS) |
| CAPEC-110 SQL Injection through SOAP Parameter Tampering |
|
CanFollow --> |
CAPEC-279 |
SOAP Manipulation |
| CAPEC-155 Screen Temporary Files for Sensitive Information |
|
CanFollow --> |
CAPEC-149 |
Explore for Predictable Temporary File Names |
| CAPEC-163 Spear Phishing |
|
CanFollow --> |
CAPEC-116 |
Excavation |
|
CanFollow --> |
CAPEC-406 |
Dumpster Diving |
|
CanFollow --> |
CAPEC-407 |
Pretexting |
| CAPEC-197 XML Entity Expansion |
|
CanFollow --> |
CAPEC-228 |
DTD Injection |
| CAPEC-214 Fuzzing for garnering J2EE/.NET-based stack traces, for application mapping |
|
Has Child --> |
CAPEC-54 |
Query System for Information |
| CAPEC-228 DTD Injection |
|
CanFollow --> |
CAPEC-279 |
SOAP Manipulation |
| CAPEC-237 Escaping a Sandbox by Calling Signed Code in Another Language |
|
Has Child --> |
CAPEC-68 |
Subvert Code-signing Facilities |
| CAPEC-333 WASC Threat Classification 2.0 |
|
Has Member --> |
CAPEC-336 |
DEPRECATED: WASC-03 - Integer Overflows |
|
Has Member --> |
CAPEC-338 |
DEPRECATED: WASC-05 - Remote File Inclusion |
|
Has Member --> |
CAPEC-339 |
DEPRECATED: WASC-06 - Format String |
|
Has Member --> |
CAPEC-340 |
DEPRECATED: WASC-07 - Buffer Overflow |
|
Has Member --> |
CAPEC-341 |
DEPRECATED: WASC-08 - Cross-Site Scripting |
|
Has Member --> |
CAPEC-342 |
DEPRECATED: WASC-09 - Cross-Site Request Forgery |
|
Has Member --> |
CAPEC-343 |
DEPRECATED: WASC-10 - Denial of Service |
|
Has Member --> |
CAPEC-344 |
DEPRECATED: WASC-11 - Brute Force |
|
Has Member --> |
CAPEC-345 |
DEPRECATED: WASC-12 - Content Spoofing |
|
Has Member --> |
CAPEC-351 |
DEPRECATED: WASC-18 - Credential/Session Prediction |
|
Has Member --> |
CAPEC-352 |
DEPRECATED: WASC-19 - SQL Injection |
|
Has Member --> |
CAPEC-356 |
DEPRECATED: WASC-23 - XML Injection |
|
Has Member --> |
CAPEC-357 |
DEPRECATED: WASC-24 - HTTP Request Splitting |
|
Has Member --> |
CAPEC-358 |
DEPRECATED: WASC-25 - HTTP Response Splitting |
|
Has Member --> |
CAPEC-359 |
DEPRECATED: WASC-26 - HTTP Request Smuggling |
|
Has Member --> |
CAPEC-360 |
DEPRECATED: WASC-27 - HTTP Response Smuggling |
|
Has Member --> |
CAPEC-361 |
DEPRECATED: WASC-28 - Null Byte Injection |
|
Has Member --> |
CAPEC-362 |
DEPRECATED: WASC-29 - LDAP Injection |
|
Has Member --> |
CAPEC-363 |
DEPRECATED: WASC-30 - Mail Command Injection |
|
Has Member --> |
CAPEC-364 |
DEPRECATED: WASC-31 - OS Commanding |
|
Has Member --> |
CAPEC-365 |
DEPRECATED: WASC-32 - Routing Detour |
|
Has Member --> |
CAPEC-366 |
DEPRECATED: WASC-33 - Path Traversal |
|
Has Member --> |
CAPEC-367 |
DEPRECATED: WASC-34 - Predictable Resource Location |
|
Has Member --> |
CAPEC-368 |
DEPRECATED: WASC-35 - SOAP Array Abuse |
|
Has Member --> |
CAPEC-369 |
DEPRECATED: WASC-36 - SSI Injection |
|
Has Member --> |
CAPEC-370 |
DEPRECATED: WASC-37 - Session Fixation |
|
Has Member --> |
CAPEC-371 |
DEPRECATED: WASC-38 - URL Redirector Abuse |
|
Has Member --> |
CAPEC-372 |
DEPRECATED: WASC-39 - XPath Injection |
|
Has Member --> |
CAPEC-374 |
DEPRECATED: WASC-41 - XML Attribute Blowup |
|
Has Member --> |
CAPEC-375 |
DEPRECATED: WASC-42 - Abuse of Functionality |
|
Has Member --> |
CAPEC-376 |
DEPRECATED: WASC-43 - XML External Entities |
|
Has Member --> |
CAPEC-377 |
DEPRECATED: WASC-44 - XML Entity Expansion |
|
Has Member --> |
CAPEC-378 |
DEPRECATED: WASC-45 - Fingerprinting |
|
Has Member --> |
CAPEC-379 |
DEPRECATED: WASC-46 - XQuery Injection |
| CAPEC-336 WASC-03 - Integer Overflows |
|
Has Member --> |
CAPEC-92 |
Forced Integer Overflow |
| CAPEC-338 WASC-05 - Remote File Inclusion |
|
Has Member --> |
CAPEC-253 |
Remote Code Inclusion |
| CAPEC-340 WASC-07 - Buffer Overflow |
|
Has Member --> |
CAPEC-100 |
Overflow Buffers |
| CAPEC-341 WASC-08 - Cross-Site Scripting |
|
Has Member --> |
CAPEC-63 |
Cross-Site Scripting (XSS) |
| CAPEC-342 WASC-09 - Cross-Site Request Forgery |
|
Has Member --> |
CAPEC-62 |
Cross Site Request Forgery |
| CAPEC-343 WASC-10 - Denial of Service |
|
Has Member --> |
CAPEC-125 |
Flooding |
|
Has Member --> |
CAPEC-130 |
Excessive Allocation |
|
Has Member --> |
CAPEC-131 |
Resource Leak Exposure |
|
Has Member --> |
CAPEC-227 |
Sustained Client Engagement |
| CAPEC-344 WASC-11 - Brute Force |
|
Has Member --> |
CAPEC-112 |
Brute Force |
| CAPEC-345 WASC-12 - Content Spoofing |
|
Has Member --> |
CAPEC-148 |
Content Spoofing |
| CAPEC-351 WASC-18 - Credential/Session Prediction |
|
Has Member --> |
CAPEC-59 |
Session Credential Falsification through Prediction |
| CAPEC-352 WASC-19 - SQL Injection |
|
Has Member --> |
CAPEC-66 |
SQL Injection |
| CAPEC-356 WASC-23 - XML Injection |
|
Has Member --> |
CAPEC-250 |
XML Injection |
| CAPEC-357 WASC-24 - HTTP Request Splitting |
|
Has Member --> |
CAPEC-105 |
HTTP Request Splitting |
| CAPEC-358 WASC-25 - HTTP Response Splitting |
|
Has Member --> |
CAPEC-34 |
HTTP Response Splitting |
| CAPEC-359 WASC-26 - HTTP Request Smuggling |
|
Has Member --> |
CAPEC-33 |
HTTP Request Smuggling |
| CAPEC-360 WASC-27 - HTTP Response Smuggling |
|
Has Member --> |
CAPEC-273 |
HTTP Response Smuggling |
| CAPEC-361 WASC-28 - Null Byte Injection |
|
Has Member --> |
CAPEC-52 |
Embedding NULL Bytes |
| CAPEC-362 WASC-29 - LDAP Injection |
|
Has Member --> |
CAPEC-136 |
LDAP Injection |
| CAPEC-363 WASC-30 - Mail Command Injection |
|
Has Member --> |
CAPEC-134 |
Email Injection |
| CAPEC-364 WASC-31 - OS Commanding |
|
Has Member --> |
CAPEC-88 |
OS Command Injection |
| CAPEC-365 WASC-32 - Routing Detour |
|
Has Member --> |
CAPEC-219 |
XML Routing Detour Attacks |
| CAPEC-366 WASC-33 - Path Traversal |
|
Has Member --> |
CAPEC-126 |
Path Traversal |
| CAPEC-367 WASC-34 - Predictable Resource Location |
|
Has Member --> |
CAPEC-87 |
Forceful Browsing |
| CAPEC-368 WASC-35 - SOAP Array Abuse |
|
Has Member --> |
CAPEC-256 |
SOAP Array Overflow |
| CAPEC-369 WASC-36 - SSI Injection |
|
Has Member --> |
CAPEC-101 |
Server Side Include (SSI) Injection |
| CAPEC-370 WASC-37 - Session Fixation |
|
Has Member --> |
CAPEC-61 |
Session Fixation |
| CAPEC-371 WASC-38 - URL Redirector Abuse |
|
Has Member --> |
CAPEC-194 |
Fake the Source of Data |
| CAPEC-374 WASC-41 - XML Attribute Blowup |
|
Has Member --> |
CAPEC-229 |
Serialized Data Parameter Blowup |
| CAPEC-375 WASC-42 - Abuse of Functionality |
|
Has Member --> |
CAPEC-210 |
Abuse Existing Functionality |
| CAPEC-376 WASC-43 - XML External Entities |
|
Has Member --> |
CAPEC-221 |
Data Serialization External Entities Blowup |
| CAPEC-377 WASC-44 - XML Entity Expansion |
|
Has Member --> |
CAPEC-197 |
XML Entity Expansion |
|
Has Member --> |
CAPEC-219 |
XML Routing Detour Attacks |
| CAPEC-378 WASC-45 - Fingerprinting |
|
Has Member --> |
CAPEC-224 |
Fingerprinting |
| CAPEC-379 WASC-46 - XQuery Injection |
|
Has Member --> |
CAPEC-84 |
XQuery Injection |
| CAPEC-491 XML Quadratic Expansion |
|
CanFollow --> |
CAPEC-228 |
DTD Injection |
| CAPEC-505 Scheme Squatting |
|
Has Child --> |
CAPEC-173 |
Action Spoofing |
| CAPEC-543 Counterfeit Websites |
|
CanFollow --> |
CAPEC-98 |
Phishing |
|
CanFollow --> |
CAPEC-611 |
BitSquatting |
|
CanFollow --> |
CAPEC-630 |
TypoSquatting |
|
CanFollow --> |
CAPEC-631 |
SoundSquatting |
|
CanFollow --> |
CAPEC-632 |
Homograph Attack via Homoglyphs |
| CAPEC-561 Windows Admin Shares with Stolen Credentials |
|
CanFollow --> |
CAPEC-16 |
Dictionary-based Password Attack |
|
CanFollow --> |
CAPEC-49 |
Password Brute Forcing |
|
CanFollow --> |
CAPEC-50 |
Password Recovery Exploitation |
|
CanFollow --> |
CAPEC-55 |
Rainbow Table Password Cracking |
|
CanFollow --> |
CAPEC-70 |
Try Common or Default Usernames and Passwords |
|
CanFollow --> |
CAPEC-565 |
Password Spraying |
|
CanFollow --> |
CAPEC-568 |
Capture Credentials via Keylogger |
| CAPEC-611 BitSquatting |
|
CanFollow --> |
CAPEC-98 |
Phishing |
| CAPEC-630 TypoSquatting |
|
CanFollow --> |
CAPEC-98 |
Phishing |
| CAPEC-631 SoundSquatting |
|
CanFollow --> |
CAPEC-98 |
Phishing |
| CAPEC-632 Homograph Attack via Homoglyphs |
|
CanFollow --> |
CAPEC-98 |
Phishing |
| CAPEC-652 Use of Known Kerberos Credentials |
|
CanFollow --> |
CAPEC-157 |
Sniffing Attacks |