Vulnerability Intelligence and Management by Cybersecurity Help s.r.o.



Insufficient Verification of Data Authenticity

Because of improper verification of data origin or authenticity, software can receive invalid data.
The vulnerability is introduced during Architecture and Design, Implementation stages.