Download
| Alert*
Trust Boundary Violation
Description The product mixes trusted and untrusted data in the same data structure or structured message. Extended DescriptionBy combining trusted and untrusted data in the same data structure, it becomes easier for programmers to mistakenly trust unvalidated data. Applicable PlatformsLanguage Class: All Time Of Introduction
Common Consequences
Detection MethodsNone Potential MitigationsNone Relationships
Demonstrative Examples (Details) White Box Definitions None Black Box Definitions None Taxynomy Mappings
References:None |