Statements (23)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:CEO
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:CWE-74
|
gptkbp:category |
Improper Control of Generation of Code
|
gptkbp:example |
An application that allows users to modify critical configuration settings.
|
gptkbp:has_weakness |
gptkb:CWE-703
gptkb:CWE-77 gptkb:CWE-89 gptkb:CWE-20 CWE-78 |
https://www.w3.org/2000/01/rdf-schema#label |
CWE-133
|
gptkbp:impact |
Availability
Confidentiality Data Integrity |
gptkbp:is_described_as |
The software uses external input to control critical state data.
|
gptkbp:is_protected_by |
Implement strict access controls.
Use secure coding practices. Validate and sanitize all external inputs. |
gptkbp:name |
External Control of Critical State Data
|
gptkbp:related_to |
gptkb:CWE-22
gptkb:CWE-74 gptkb:CWE-94 gptkb:CWE-20 |