CAPEC攻击模式浏览
Common Attack Pattern Enumeration and Classification(通用攻击模式枚举与分类)- 常见攻击模式的综合字典和分类
总攻击模式数
615
分类数
78
视图数
13
CAPEC攻击模式列表 共 615 条
| CAPEC ID | 名称 | 抽象级别 | 严重程度 | 状态 | 操作 |
|---|---|---|---|---|---|
| CAPEC-21 | Exploitation of Trusted Identifiers | Meta | High | Stable | 查看详情 |
| CAPEC-22 | Exploiting Trust in Client | Meta | High | Draft | 查看详情 |
| CAPEC-23 | File Content Injection | Standard | Very High | Draft | 查看详情 |
| CAPEC-24 | Filter Failure through Buffer Overflow | Detailed | High | Draft | 查看详情 |
| CAPEC-25 | Forced Deadlock | Meta | High | Stable | 查看详情 |
| CAPEC-26 | Leveraging Race Conditions | Meta | High | Stable | 查看详情 |
| CAPEC-27 | Leveraging Race Conditions via Symbolic Links | Detailed | High | Draft | 查看详情 |
| CAPEC-28 | Fuzzing | Meta | Medium | Draft | 查看详情 |
| CAPEC-29 | Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions | Standard | High | Draft | 查看详情 |
| CAPEC-30 | Hijacking a Privileged Thread of Execution | Standard | Very High | Draft | 查看详情 |
| CAPEC-31 | Accessing/Intercepting/Modifying HTTP Cookies | Detailed | High | Draft | 查看详情 |
| CAPEC-32 | XSS Through HTTP Query Strings | Detailed | High | Draft | 查看详情 |
| CAPEC-33 | HTTP Request Smuggling | Detailed | High | Stable | 查看详情 |
| CAPEC-34 | HTTP Response Splitting | Detailed | High | Stable | 查看详情 |
| CAPEC-35 | Leverage Executable Code in Non-Executable Files | Detailed | Very High | Draft | 查看详情 |
| CAPEC-36 | Using Unpublished Interfaces or Functionality | Standard | High | Draft | 查看详情 |
| CAPEC-37 | Retrieve Embedded Sensitive Data | Detailed | Very High | Draft | 查看详情 |
| CAPEC-38 | Leveraging/Manipulating Configuration File Search Paths | Detailed | Very High | Draft | 查看详情 |
| CAPEC-39 | Manipulating Opaque Client-based Data Tokens | Standard | Medium | Draft | 查看详情 |
| CAPEC-40 | Manipulating Writeable Terminal Devices | Standard | Very High | Draft | 查看详情 |