angler-fishThe Vulnerability History Project

CWE-300: Channel Accessible by Non-Endpoint

"The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint." - Entry from the Common Weakness Enumeration For more info visit <a href="https://cwe.mitre.org/data/definitions/300.html" target="_blank" rel="noopener noreferrer">CWE-300</a>

Examples


    There are no articles here... yet

expand_less