| CAPEC ID | Naziv |
|---|---|
| CAPEC-1 | Accessing Functionality Not Properly Constrained by ACLs |
| CAPEC-107 | Cross Site Tracing |
| CAPEC-127 | Directory Indexing |
| CAPEC-17 | Using Malicious Files |
| CAPEC-20 | Encryption Brute Forcing |
| CAPEC-22 | Exploiting Trust in Client |
| CAPEC-237 | Escaping a Sandbox by Calling Signed Code in Another Language |
| CAPEC-36 | Using Unpublished Interfaces |
| CAPEC-477 | Signature Spoofing by Mixing Signed and Unsigned Content |
| CAPEC-480 | Escaping Virtualization |
| CAPEC-51 | Poison Web Service Registry |
| CAPEC-57 | Utilizing REST's Trust in the System Resource to Obtain Sensitive Data |
| CAPEC-59 | Session Credential Falsification through Prediction |
| CAPEC-65 | Sniff Application Code |
| CAPEC-74 | Manipulating State |
| CAPEC-87 | Forceful Browsing |

