CAPEC-153: Input Data Manipulation
An attacker exploits a weakness in input validation by controlling the format, structure, and composition of data to an input-processing interface. By supplying input of a non-standard or unexpected form an attacker can adversely impact the security of the target.
Severity
Medium
12
/ 100
low-risk
Active Threat
10/50 · Low
Exploit Availability
2/50 · Minimal