Read Time:16 Second
Description
The software does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of the software.
Modes of Introduction:
– Architecture and Design
Likelihood of Exploit:
Related Weaknesses
Consequences
Confidentiality, Availability, Integrity: Read Application Data, DoS: Crash, Exit, or Restart, Unexpected State
Potential Mitigations
CVE References