Weaknesses in this category are related to the design and architecture of a system's data integrity components. Frequently these deal with ensuring integrity of data, such as messages, resource files, deployment files, and configuration files. The weaknesses in this category could lead to a degradation of data integrity quality if they are not addressed when designing or implementing a secure architecture.
[REF-10] Santos, J. C. S., Peruma, A., Mirakhorli, M., Galster, M.
and Sejfia, A.. "Understanding Software Vulnerabilities Related to Architectural Security Tactics: An Empirical Investigation of Chromium, PHP and Thunderbird.". pages 69 - 78. 2017 IEEE International Conference on Software Architecture (ICSA). 2017.
CWE Content Team
More information is available — Please select a different filter.
Page Last Updated:
November 15, 2017
Use of the Common Weakness Enumeration and the associated references from this website are subject to the