An adversary uses or manipulates one or more functions of an application in order to achieve a malicious objective not originally intended by the application. This is a broad class of attacks wherein the adversary is able to alter the intended result or purpose of the functionality and thereby affect application behavior or information integrity. Outcomes can range from information exposure to vandalism and reduction in service to the execution of arbitrary code on the target machine.
More information is available — Please select a different filter.
Page Last Updated:
December 07, 2015
Use of the Common Attack Pattern Enumeration and Classification dictionary and classification taxonomy, and the associated references from this website, are subject to the