CWE-354: Insufficient Verification of Data Authenticity
This CWE entry discusses the vulnerability of insufficiently verifying the authenticity of data. Recommendations include proper validation of checksums according to protocol specifications.
Is your System Free of Underlying Vulnerabilities? Find Out Now