Description
The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.
Latest vulnerabilities for CWE-348
No vulnerabilities found using your search criteria
References
Description of CWE-348 on Mitre website