CWE-133

GPTKB entity

Statements (23)
Predicate Object
gptkbp:instance_of gptkb:CEO
gptkbp:bfsLayer 6
gptkbp:bfsParent gptkb:CWE-74
gptkbp:category Improper Control of Generation of Code
gptkbp:example An application that allows users to modify critical configuration settings.
gptkbp:has_weakness gptkb:CWE-703
gptkb:CWE-77
gptkb:CWE-89
gptkb:CWE-20
CWE-78
https://www.w3.org/2000/01/rdf-schema#label CWE-133
gptkbp:impact Availability
Confidentiality
Data Integrity
gptkbp:is_described_as The software uses external input to control critical state data.
gptkbp:is_protected_by Implement strict access controls.
Use secure coding practices.
Validate and sanitize all external inputs.
gptkbp:name External Control of Critical State Data
gptkbp:related_to gptkb:CWE-22
gptkb:CWE-74
gptkb:CWE-94
gptkb:CWE-20