Read Time:13 Second

Description

The software uses a function, library, or third party component
that has been explicitly prohibited, whether by the developer or
the customer.

Modes of Introduction:

– Architecture and Design

 

 

Related Weaknesses

CWE-710

 

Consequences

Other: Reduce Maintainability

 

Potential Mitigations

CVE References