Read Time:15 Second

Description

The software receives data from an upstream component, but does not completely filter one or more instances of special elements before sending it to a downstream component.

Modes of Introduction:

– Implementation

Likelihood of Exploit:

 

Related Weaknesses

CWE-791

 

Consequences

Integrity: Unexpected State

 

Potential Mitigations

CVE References