Download
| Alert*
Data Handling
Description Weaknesses in this category are typically found in functionality that processes data. Applicable PlatformsNone Related Attack Patterns Common ConsequencesNone Detection MethodsNone Potential MitigationsNone Relationships
Demonstrative ExamplesNone White Box Definitions None Black Box Definitions None Taxynomy MappingsNone References:None |