This CWE entry is permissible for mapping to real-world vulnerabilities at the Base level of abstraction, aiding in identifying underlying causes. Ensure proper usage without manipulating the mapping.
Is your System Free of Underlying Vulnerabilities? Find Out Now