Read Time:15 Second
Description
The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.
Modes of Introduction:
– Architecture and Design
Related Weaknesses
Consequences
Integrity, Other: Varies by Context, Unexpected State