CAPEC-52: Embedding NULL Bytes

An adversary embeds one or more null bytes in input to the target software. This attack relies on the usage of a null-valued byte as a string terminator in many environments. The goal is for certain components of the target software to stop processing the input when it encounters the null byte(s).

Severity
High
Likelihood
High
10
/ 100
low-risk
Active Threat 8/50 · Minimal
Exploit Availability 2/50 · Minimal