logo

CAPECâ„¢


Summary

Common Attack Pattern Enumeration and Classification helps by providing a comprehensive dictionary of known patterns of attack employed by adversaries to exploit known weaknesses in cyber-enabled capabilities. It can be used by analysts, developers, testers and educators to advance community understanding and enhance defenses. The version used in this section is CAPEC List v3.9.


Definitions

DefinitionRequirements
CAPEC-1. Accessing functionality not properly constrained by ACLs
CAPEC-2. Inducing account lockout
CAPEC-3. Using leading 'ghost' character sequences to bypass input filters
CAPEC-4. Using alternative IP address encodings
CAPEC-6. Argument injection
CAPEC-7. Blind SQL injection
CAPEC-11. Cause web server misclassification
CAPEC-12. Choosing message identifier
CAPEC-13. Subverting environment variable values
CAPEC-15. Command delimiters
CAPEC-16. Dictionary-based password attack
CAPEC-17. Using malicious files
CAPEC-18. XSS targeting non-script elements
CAPEC-19. Embedding scripts within scripts
CAPEC-20. Encryption brute forcing
CAPEC-21. Exploitation of trusted identifiers
CAPEC-22. Exploiting trust in client
CAPEC-23. File content injection
CAPEC-24. Filter failure through buffer overflow
CAPEC-25. Forced deadlock
CAPEC-26. Leveraging race conditions
CAPEC-27. Leveraging race conditions via symbolic links
CAPEC-28. Fuzzing
CAPEC-29. Leveraging time-of-check and time-of-use (TOCTOU) race conditions
CAPEC-30. Hijacking a privileged thread of execution
CAPEC-31. Accessing/Intercepting/Modifying HTTP cookies
CAPEC-32. XSS through HTTP query strings
CAPEC-33. HTTP request smuggling
CAPEC-34. HTTP response splitting
CAPEC-35. Leverage executable code in non-executable files
CAPEC-36. Using unpublished interfaces
CAPEC-38. Leveraging/Manipulating configuration file search paths
CAPEC-39. Manipulating opaque client-based data tokens
CAPEC-41. Using meta-characters in e-mail headers to inject malicious payloads
CAPEC-42. MIME conversion
CAPEC-43. Exploiting multiple input interpretation layers
CAPEC-48. Passing local filenames to functions that expect a URL
CAPEC-49. Password brute forcing
CAPEC-60. Reusing session IDs (aka session replay)
CAPEC-70. Try common usernames and passwords
CAPEC-74. Manipulating state
CAPEC-94. Adversary in the middle (AiTM)
CAPEC-113. Interface manipulation
CAPEC-114. Authentication abuse
CAPEC-115. Authentication bypass
CAPEC-116. Excavation
CAPEC-117. Interception
CAPEC-122. Privilege abuse
CAPEC-123. Buffer manipulation
CAPEC-124. Shared resource manipulation
CAPEC-125. Flooding
CAPEC-129. Pointer manipulation
CAPEC-130. Excessive allocation
CAPEC-131. Resource leak exposure
CAPEC-137. Parameter injection
CAPEC-148. Content spoofing
CAPEC-151. Identity spoofing
CAPEC-153. Input data manipulation
CAPEC-154. Resource location spoofing
CAPEC-155. Screen temporary files for sensitive information
CAPEC-161. Infrastructure manipulation
CAPEC-165. File manipulation
CAPEC-169. Footprinting
CAPEC-173. Action spoofing
CAPEC-175. Code inclusion
CAPEC-176. Configuration/Environment manipulation
CAPEC-188. Reverse engineering
CAPEC-212. Functionality misuse
CAPEC-216. Communication channel manipulation
CAPEC-224. Fingerprinting
CAPEC-227. Sustained client engagement
CAPEC-233. Privilege escalation
CAPEC-240. Resource injection
CAPEC-242. Code injection
CAPEC-248. Command injection
CAPEC-272. Protocol manipulation
CAPEC-438. Modification during manufacture
CAPEC-442. Infected software
CAPEC-475. Signature spoofing by improper validation
CAPEC-549. Local execution of code
CAPEC-554. Functionality bypass
CAPEC-560. Use of known domain credentials
CAPEC-586. Object injection
CAPEC-594. Traffic injection
CAPEC-613. WiFi SSID tracking
CAPEC-619. Signal strength tracking
CAPEC-654. Credential Prompt Impersonation
CAPEC-676. NoSQL Injection
CAPEC-677. Server Motherboard Compromise
CAPEC-678. System Build Data Maliciously Altered
CAPEC-679. Exploitation of Improperly Configured or Implemented Memory Protections
CAPEC-680. Exploitation of Improperly Controlled Registers
CAPEC-681. Exploitation of Improperly Controlled Hardware Security Identifiers
CAPEC-682. Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities
CAPEC-690. Metadata Spoofing
CAPEC-691. Spoof Open-Source Software Metadata
CAPEC-692. Spoof Version Control System Commit Metadata
CAPEC-693. StarJacking
CAPEC-694. System Location Discovery
CAPEC-695. Repo Jacking
CAPEC-697. DHCP Spoofing
CAPEC-698. Install Malicious Extension
CAPEC-700. Network Boundary Bridging
CAPEC-701. Browser in the Middle (BiTM)

Last updated

2025/06/13