CAPEC-200 Metadata
Likelihood of Attack
Low
Typical Severity
Medium
Overview
Summary
An attacker removes or disables filtering mechanisms on the target application. Input filters prevent invalid data from being sent to an application (for example, overly large inputs that might cause a buffer overflow or other malformed inputs that may not be correctly handled by an application). Input filters might also be designed to constrained executable content.
Prerequisites
The target application must utilize some sort of filtering mechanism (input, output, or data masking).
Potential Solutions / Mitigations
No specific solutions listed.
Related CAPECs
CAPEC ID | Description |
---|---|
CAPEC-207 | An adversary removes or disables functionality on the client that the server assumes to be present and trustworthy. |
Stay Ahead of Attack Patterns
Understanding CAPEC patterns helps security professionals anticipate and thwart potential attacks. Leverage these insights to enhance threat modeling, strengthen your software development lifecycle, and train your security teams effectively.