Download
| Alert*
Intentionally Introduced Nonmalicious Weakness
Description Nonmalicious introduction of weaknesses into software can still render it vulnerable to various attacks. Applicable PlatformsNone Common ConsequencesNone Detection MethodsNone Potential MitigationsNone Relationships
Demonstrative ExamplesNone White Box Definitions None Black Box Definitions None Taxynomy Mappings
References:None |