Statements (21)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Common_Weakness_Enumeration
|
gptkbp:affects |
Software security.
|
gptkbp:associated_with |
Memory corruption.
|
gptkbp:can_lead_to |
Buffer overflow vulnerabilities.
|
gptkbp:category |
Data Validation
|
gptkbp:difficulty |
gptkb:High
|
gptkbp:example |
Accessing an array element outside its defined range.
|
https://www.w3.org/2000/01/rdf-schema#label |
CWE-125
|
gptkbp:impact |
Information Disclosure
|
gptkbp:is_described_as |
The software reads data past the end of a buffer or before the beginning of a buffer.
|
gptkbp:is_often_used_in |
C/ C++ programming languages.
|
gptkbp:is_protected_by |
Implement bounds checking.
Use safe libraries. |
gptkbp:is_vulnerable_to |
Attackers.
char buffer[10]; strcpy(buffer, user Input); strcpy. |
gptkbp:name |
Out-of-bounds Read
|
gptkbp:related_to |
gptkb:CWE-119
gptkb:CWE-130 |
gptkbp:bfsParent |
gptkb:JEP_413
|
gptkbp:bfsLayer |
5
|