CAPEC 153 Input Data Manipulation

Draft Meta Unknown Risk
Severity Medium

Description

An attacker exploits a weakness in input validation by controlling the format, structure, and composition of data to an input-processing interface. By supplying input of a non-standard or unexpected form an attacker can adversely impact the security of the target.

Consequences

Relationships

Resources Required

1