CAPEC-562: Modify Shared File

An adversary manipulates the files in a shared location by adding malicious programs, scripts, or exploit code to valid content. Once a user opens the shared content, the tainted content is executed.

6
/ 100
low-risk
Active Threat 5/50 · Minimal
Exploit Availability 1/50 · Minimal