CWE-348 - Use of Less Trusted Source

Description

The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.

Latest vulnerabilities for CWE-348

No vulnerabilities found using your search criteria

References

Description of CWE-348 on Mitre website