Threat Event
An attacker exploits a weakness in input validation by controlling the format, structure, and composition of data to an input-processing interface. By supplying input of a non-standard or unexpected form an attacker can adversely impact the security of the target.
|
|
| ID | CAPEC-153 |
| Latest Sync Date | 11/05/25 15:15:38 |
| Original ID | 153 |
| Abstraction | Meta |
| Status | Draft |
| Alternate Terms | |
| Likelihood Of Attack | |
| Typical Severity | Medium |
| Related Attack Patterns | |
| Execution Flow | |
| Prerequisites | ::The target must accept user data for processing and the manner in which this data is processed must depend on some aspect of the format or flags that the attacker can control.:: |
| Skills Required | |
| Resources Required | ::None: No specialized resources are required to execute this type of attack.:: |
| Indicators | |
| Consequences | |
| Mitigations | |
| Example Instances | |
| Related Weaknesses | ::20:: |
| Taxonomy Mappings | |
| Notes | |