CAPEC ID |
Naziv |
CAPEC-10 |
Buffer Overflow via Environment Variables |
CAPEC-101 |
Server Side Include (SSI) Injection |
CAPEC-108 |
Command Line Execution through SQL Injection |
CAPEC-120 |
Double Encoding |
CAPEC-13 |
Subverting Environment Variable Values |
CAPEC-135 |
Format String Injection |
CAPEC-14 |
Client-side Injection-induced Buffer Overflow |
CAPEC-24 |
Filter Failure through Buffer Overflow |
CAPEC-250 |
XML Injection |
CAPEC-267 |
Leverage Alternate Encoding |
CAPEC-273 |
HTTP Response Smuggling |
CAPEC-28 |
Fuzzing |
CAPEC-3 |
Using Leading 'Ghost' Character Sequences to Bypass Input Filters |
CAPEC-34 |
HTTP Response Splitting |
CAPEC-42 |
MIME Conversion |
CAPEC-43 |
Exploiting Multiple Input Interpretation Layers |
CAPEC-45 |
Buffer Overflow via Symbolic Links |
CAPEC-46 |
Overflow Variables and Tags |
CAPEC-47 |
Buffer Overflow via Parameter Expansion |
CAPEC-51 |
Poison Web Service Registry |
CAPEC-52 |
Embedding NULL Bytes |
CAPEC-53 |
Postfix, Null Terminate, and Backslash |
CAPEC-6 |
Argument Injection |
CAPEC-64 |
Using Slashes and URL Encoding Combined to Bypass Validation Logic |
CAPEC-67 |
String Format Overflow in syslog() |
CAPEC-7 |
Blind SQL Injection |
CAPEC-71 |
Using Unicode Encoding to Bypass Validation Logic |
CAPEC-72 |
URL Encoding |
CAPEC-76 |
Manipulating Web Input to File System Calls |
CAPEC-78 |
Using Escaped Slashes in Alternate Encoding |
CAPEC-79 |
Using Slashes in Alternate Encoding |
CAPEC-8 |
Buffer Overflow in an API Call |
CAPEC-80 |
Using UTF-8 Encoding to Bypass Validation Logic |
CAPEC-83 |
XPath Injection |
CAPEC-84 |
XQuery Injection |
CAPEC-9 |
Buffer Overflow in Local Command-Line Utilities |