Statements (25)
Predicate | Object |
---|---|
gptkbp:instanceOf |
software weakness
|
gptkbp:category |
gptkb:CWE_(Common_Weakness_Enumeration)
|
gptkbp:cause |
arbitrary code execution
data corruption buffer overflow system crash |
gptkbp:describes |
A weakness where software does not properly restrict operations within the bounds of a memory buffer, leading to buffer overflows and related vulnerabilities.
|
gptkbp:externalLink |
https://cwe.mitre.org/data/definitions/119.html
|
gptkbp:firstPublished |
2006
|
https://www.w3.org/2000/01/rdf-schema#label |
CWE-119
|
gptkbp:maintainedBy |
gptkb:MITRE_Corporation
|
gptkbp:name |
Improper Restriction of Operations within the Bounds of a Memory Buffer
|
gptkbp:partOf |
gptkb:CWE_Top_25_Most_Dangerous_Software_Weaknesses
|
gptkbp:relatedTo |
CWE-787
CWE-120 CWE-121 CWE-122 CWE-788 |
gptkbp:usedBy |
software developers
security researchers penetration testers |
gptkbp:usedIn |
software security testing
|
gptkbp:vulnerableTo |
119
|
gptkbp:bfsParent |
gptkb:CVE-2014-0160
|
gptkbp:bfsLayer |
6
|