Read Time:13 Second

Description

The software does not correctly convert an object, resource, or structure from one type to a different type.

Modes of Introduction:

– Architecture and Design

Likelihood of Exploit:

 

Related Weaknesses

CWE-664

 

Consequences

Other: Other

 

Potential Mitigations

CVE References