angler-fishThe Vulnerability History Project

CWE-807: Reliance on Untrusted Inputs in a Security Decision

"The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism." - Entry from the Common Weakness Enumeration For more info visit <a href="https://cwe.mitre.org/data/definitions/807.html" target="_blank" rel="noopener noreferrer">CWE-807</a>

Examples


    There are no articles here... yet

expand_less