Dark Mode

Settings

Capec-240 Detail

Resource Injection

Meta Communications Software Likelihood: High Typical Severity: High

Children: 610

Description

An adversary exploits weaknesses in input validation by manipulating resource identifiers enabling the unintended modification or specification of a resource.

Not present

Not present

  1. The target application allows the user to both specify the identifier used to access a system resource. Through this permission, the user gains the capability to perform actions on that resource (e.g., overwrite the file)

Not present

Not present

Integrity Confidentiality
Modify Data Read Data

Not present