logo

Database

CAPEC™

Last updated: 2025/06/13
logo

Common Attack Pattern Enumeration and Classification helps by providing a comprehensive dictionary of known patterns of attack employed by adversaries to exploit known weaknesses in cyber-enabled capabilities. It can be used by analysts, developers, testers and educators to advance community understanding and enhance defenses. The version used in this section is CAPEC List v3.9.

Control-Requirement Mapping

DefinitionRequirements
1. Accessing functionality not properly constrained by ACLs
2. Inducing account lockout
3. Using leading 'ghost' character sequences to bypass input filters
4. Using alternative IP address encodings
6. Argument injection
7. Blind SQL injection
11. Cause web server misclassification
12. Choosing message identifier
13. Subverting environment variable values
15. Command delimiters
16. Dictionary-based password attack
17. Using malicious files
18. XSS targeting non-script elements
19. Embedding scripts within scripts
20. Encryption brute forcing
21. Exploitation of trusted identifiers
22. Exploiting trust in client
23. File content injection
24. Filter failure through buffer overflow
25. Forced deadlock
26. Leveraging race conditions
27. Leveraging race conditions via symbolic links
28. Fuzzing
29. Leveraging time-of-check and time-of-use (TOCTOU) race conditions
30. Hijacking a privileged thread of execution
31. Accessing/Intercepting/Modifying HTTP cookies
32. XSS through HTTP query strings
33. HTTP request smuggling
34. HTTP response splitting
35. Leverage executable code in non-executable files
36. Using unpublished interfaces
38. Leveraging/Manipulating configuration file search paths
39. Manipulating opaque client-based data tokens
41. Using meta-characters in e-mail headers to inject malicious payloads
42. MIME conversion
43. Exploiting multiple input interpretation layers
48. Passing local filenames to functions that expect a URL
49. Password brute forcing
60. Reusing session IDs (aka session replay)
70. Try common usernames and passwords
74. Manipulating state
94. Adversary in the middle (AiTM)
113. Interface manipulation
114. Authentication abuse
115. Authentication bypass
116. Excavation
117. Interception
122. Privilege abuse
123. Buffer manipulation
124. Shared resource manipulation
125. Flooding
129. Pointer manipulation
130. Excessive allocation
131. Resource leak exposure
137. Parameter injection
148. Content spoofing
151. Identity spoofing
153. Input data manipulation
154. Resource location spoofing
155. Screen temporary files for sensitive information
161. Infrastructure manipulation
165. File manipulation
169. Footprinting
173. Action spoofing
175. Code inclusion
176. Configuration/Environment manipulation
188. Reverse engineering
212. Functionality misuse
216. Communication channel manipulation
224. Fingerprinting
227. Sustained client engagement
233. Privilege escalation
240. Resource injection
242. Code injection
248. Command injection
272. Protocol manipulation
438. Modification during manufacture
442. Infected software
475. Signature spoofing by improper validation
549. Local execution of code
554. Functionality bypass
560. Use of known domain credentials
586. Object injection
594. Traffic injection
613. WiFi SSID tracking
619. Signal strength tracking
654. Credential Prompt Impersonation
676. NoSQL Injection
677. Server Motherboard Compromise
678. System Build Data Maliciously Altered
679. Exploitation of Improperly Configured or Implemented Memory Protections
680. Exploitation of Improperly Controlled Registers
681. Exploitation of Improperly Controlled Hardware Security Identifiers
682. Exploitation of Firmware or ROM Code with Unpatchable Vulnerabilities
690. Metadata Spoofing
691. Spoof Open-Source Software Metadata
692. Spoof Version Control System Commit Metadata
693. StarJacking
694. System Location Discovery
695. Repo Jacking
697. DHCP Spoofing
698. Install Malicious Extension
700. Network Boundary Bridging
701. Browser in the Middle (BiTM)