CAPEC-23: File Content Injection
An adversary poisons files with a malicious payload (targeting the file systems accessible by the target software), which may be passed through by standard channels such as via email, and standard web content like PDF and multimedia files. The adversary exploits known vulnerabilities or handling routines in the target processes, in order to exploit the host's trust in executing remote content, including binary files.
Severity
Very High
Likelihood
High
12
/ 100
low-risk
Active Threat
10/50 · Low
Exploit Availability
2/50 · Minimal