An adversary misuses the functionality of an application in order to achieve a negative technical impact. In this pattern of attack, the system functionality is not altered or modified, rather it is used in a way that was not intended. This is often accomplished through overuse of the functionality, or by leveraging functionality with design flaws that enables
More information is available — Please select a different filter.
Page Last Updated or Reviewed:
December 07, 2015
Use of the Common Attack Pattern Enumeration and Classification dictionary and classification taxonomy, and the associated references from this website, are subject to the