Read Time:13 Second
Description
The software does not correctly convert an object, resource, or structure from one type to a different type.
Modes of Introduction:
– Architecture and Design
Likelihood of Exploit:
Related Weaknesses
Consequences
Other: Other
Potential Mitigations
CVE References