CWE DATABASE
About
GET A DEMO
Backslash Vulnerability Database
Use of Less Trusted Source
Use of Less Trusted Source
CWE-348
Per technology (GHSA, All time)
100%
-
Go
Short description
The product has two different sources of the same data or information, but it uses the source that has less support for verification, is less trusted, or is less resistant to attack.