CAPEC-153: Input Data Manipulation

An attacker exploits a weakness in input validation by controlling the format, structure, and composition of data to an input-processing interface. By supplying input of a non-standard or unexpected form an attacker can adversely impact the security of the target.

Severity
Medium
12
/ 100
low-risk
Active Threat 10/50 · Low
Exploit Availability 2/50 · Minimal