The extension of a file name is often used in various contexts to determine the application that is used to open and use it. If an attacker can cause an alternative application to be used, it may be able to execute malicious code, cause a denial of service or expose sensitive information.
Description
Mitigations
1
Consequences
Relationships
Related ATT&CK Techniques
1