Read Time:17 Second

Description

The software does not sufficiently hide the internal representation and implementation details of data or methods, which might allow external components or modules to modify data unexpectedly, invoke unexpected functionality, or introduce dependencies that the programmer did not intend.

Modes of Introduction:

 

 

Related Weaknesses

CWE-710

 

Consequences

 

Potential Mitigations

CVE References