CAPEC ID |
Naziv |
CAPEC-10 |
Buffer Overflow via Environment Variables |
CAPEC-120 |
Double Encoding |
CAPEC-14 |
Client-side Injection-induced Buffer Overflow |
CAPEC-15 |
Command Delimiters |
CAPEC-182 |
Flash Injection |
CAPEC-24 |
Filter Failure through Buffer Overflow |
CAPEC-267 |
Leverage Alternate Encoding |
CAPEC-3 |
Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-34 |
HTTP Response Splitting |
CAPEC-41 |
Using Meta-characters in E-mail Headers to Inject Malicious Payloads |
CAPEC-43 |
Exploiting Multiple Input Interpretation Layers |
CAPEC-44 |
Overflow Binary Resource File |
CAPEC-45 |
Buffer Overflow via Symbolic Links |
CAPEC-46 |
Overflow Variables and Tags |
CAPEC-47 |
Buffer Overflow via Parameter Expansion |
CAPEC-52 |
Embedding NULL Bytes |
CAPEC-53 |
Postfix, Null Terminate, and Backslash |
CAPEC-6 |
Argument Injection |
CAPEC-64 |
Using Slashes and URL Encoding Combined to Bypass Validation Logic |
CAPEC-67 |
String Format Overflow in syslog() |
CAPEC-7 |
Blind SQL Injection |
CAPEC-71 |
Using Unicode Encoding to Bypass Validation Logic |
CAPEC-73 |
User-Controlled Filename |
CAPEC-78 |
Using Escaped Slashes in Alternate Encoding |
CAPEC-79 |
Using Slashes in Alternate Encoding |
CAPEC-8 |
Buffer Overflow in an API Call |
CAPEC-80 |
Using UTF-8 Encoding to Bypass Validation Logic |
CAPEC-88 |
OS Command Injection |
CAPEC-9 |
Buffer Overflow in Local Command-Line Utilities |
CAPEC-92 |
Forced Integer Overflow |