Insufficient Verification of Data Authenticity
Because of improper verification of data origin or authenticity, software can receive invalid data.
The vulnerability is introduced during Architecture and Design, Implementation stages.
The vulnerability is introduced during Architecture and Design, Implementation stages.