Download
| Alert*
Insufficient Verification of Data Authenticity
Description The software does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data. Applicable PlatformsLanguage Class: All Time Of Introduction
Related Attack Patterns
Common Consequences
Detection MethodsNone Potential MitigationsNone Relationships"origin validation" could fall under this.
Demonstrative ExamplesNone White Box Definitions None Black Box Definitions None Taxynomy Mappings
References:
|