Attack patterns within this category focus on the use of malicious code to achieve a desired negative technical impact. These patterns are often used in conjunction with other patterns to fully exploit a vulnerable system.
More information is available — Please select a different filter.
Page Last Updated or Reviewed:
December 07, 2015
Use of the Common Attack Pattern Enumeration and Classification dictionary and classification taxonomy, and the associated references from this website, are subject to the