CAPEC Attack Patterns

CAPEC attack patterns scored by proportion of reachable CVEs with active exploitation.

444 capec attack patterns scored · Page 3 of 5

critical-risk
0
high-risk
0
moderate-risk
2
low-risk
442
Attack Pattern Score Tier
DOM-Based XSS 6/100 low-risk
Disable Security Software 6/100 low-risk
Forceful Browsing 6/100 low-risk
Embedding Scripts within Scripts 6/100 low-risk
Bypassing of Intermediate Forms in Multiple-Form Sets 6/100 low-risk
Run Software at Logon 6/100 low-risk
AJAX Footprinting 6/100 low-risk
Add Malicious File to Shared Webroot 6/100 low-risk
Modify Shared File 6/100 low-risk
Replace Trusted Executable 6/100 low-risk
Replace File Extension Handlers 6/100 low-risk
WebView Exposure 6/100 low-risk
Modify Existing Service 6/100 low-risk
Install New Service 6/100 low-risk
Using Malicious Files 6/100 low-risk
Incomplete Data Deletion in a Multi-Tenant Environment 6/100 low-risk
Data Injected During Configuration 6/100 low-risk
Spoof Version Control System Commit Metadata 5/100 low-risk
Hijacking a privileged process 5/100 low-risk
Leveraging Race Conditions 5/100 low-risk
Exploitation of Trusted Identifiers 5/100 low-risk
Hijacking a Privileged Thread of Execution 5/100 low-risk
Signing Malicious Code 5/100 low-risk
Reverse Engineer an Executable to Expose Assumed Hidden Functionality 5/100 low-risk
Black Box Reverse Engineering 5/100 low-risk
Malicious Automated Software Update via Redirection 5/100 low-risk
Malicious Software Update 5/100 low-risk
Malicious Software Download 5/100 low-risk
Software Integrity Attack 5/100 low-risk
HTTP Response Splitting 5/100 low-risk
Regular Expression Exponential Blowup 5/100 low-risk
Poison Web Service Registry 5/100 low-risk
Malicious Manual Software Update 5/100 low-risk
Overread Buffers 5/100 low-risk
XML Ping of the Death 5/100 low-risk
Use of Known Domain Credentials 5/100 low-risk
Reflected XSS 5/100 low-risk
Stored XSS 5/100 low-risk
Try All Common Switches 5/100 low-risk
Credential Stuffing 5/100 low-risk
Replace Binaries 5/100 low-risk
Use of Known Operating System Credentials 5/100 low-risk
Malicious Automated Software Update via Spoofing 5/100 low-risk
Spoof Open-Source Software Metadata 5/100 low-risk
StarJacking 5/100 low-risk
Manipulating State 5/100 low-risk
Cross Site Tracing 5/100 low-risk
HTTP Request Splitting 5/100 low-risk
XQuery Injection 5/100 low-risk
PHP Remote File Inclusion 4/100 low-risk
Generic Cross-Browser Cross-Domain Theft 4/100 low-risk
XSS Through HTTP Headers 4/100 low-risk
Padding Oracle Crypto Attack 4/100 low-risk
Session Credential Falsification through Manipulation 4/100 low-risk
Session Sidejacking 4/100 low-risk
XSS Through HTTP Query Strings 4/100 low-risk
Kerberoasting 4/100 low-risk
Session Fixation 4/100 low-risk
Brute Force 4/100 low-risk
Use of Captured Hashes (Pass The Hash) 4/100 low-risk
Use of Captured Tickets (Pass The Ticket) 4/100 low-risk
Encryption Brute Forcing 4/100 low-risk
XML Schema Poisoning 4/100 low-risk
Exploiting Incorrectly Configured Access Control Security Levels 4/100 low-risk
Windows Admin Shares with Stolen Credentials 4/100 low-risk
XSS Targeting Non-Script Elements 4/100 low-risk
Remote Services with Stolen Credentials 4/100 low-risk
XML Routing Detour Attacks 4/100 low-risk
Adversary in the Browser (AiTB) 4/100 low-risk
Creating a Rogue Certification Authority Certificate 4/100 low-risk
DNS Cache Poisoning 3/100 low-risk
ICMP Fragmentation 3/100 low-risk
Probe iOS Screenshots 3/100 low-risk
Dictionary-based Password Attack 3/100 low-risk
Exploit Script-Based APIs 3/100 low-risk
BlueSmacking 3/100 low-risk
Root/Jailbreak Detection Evasion via Debugging 3/100 low-risk
Resource Leak Exposure 3/100 low-risk
Excessive Allocation 3/100 low-risk
Exploit Non-Production Interfaces 3/100 low-risk
Pointer Manipulation 3/100 low-risk
Pharming 3/100 low-risk
Flooding 3/100 low-risk
HTTP DoS 3/100 low-risk
Evercookie 3/100 low-risk
Leveraging Race Conditions via Symbolic Links 3/100 low-risk
Manipulating Opaque Client-based Data Tokens 3/100 low-risk
TCP Flood 3/100 low-risk
Signature Spoofing by Key Recreation 3/100 low-risk
UDP Flood 3/100 low-risk
ICMP Flood 3/100 low-risk
Inter-component Protocol Manipulation 3/100 low-risk
Password Spraying 3/100 low-risk
HTTP Flood 3/100 low-risk
Serialized Data Parameter Blowup 3/100 low-risk
Cache Poisoning 3/100 low-risk
Protocol Analysis 3/100 low-risk
SSL Flood 3/100 low-risk
Session Credential Falsification through Forging 3/100 low-risk
Password Brute Forcing 3/100 low-risk
« Prev 1 2 3 4 5 Next »