Statements (71)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Common_Weakness_Enumeration
|
gptkbp:category |
Input Validation
|
gptkbp:consequences |
Unauthorized access
Data corruption Denial of service |
gptkbp:difficulty |
gptkb:High
|
gptkbp:example |
An application that accepts user input without validation.
|
gptkbp:has_weakness |
gptkb:CWE-118
gptkb:CWE-119 gptkb:CWE-200 gptkb:CWE-601 gptkb:CWE-703 gptkb:CWE-744 gptkb:CWE-745 gptkb:CWE-746 gptkb:CWE-747 gptkb:CWE-748 gptkb:CWE-749 gptkb:CWE-750 gptkb:CWE-20 CWE-704 CWE-705 CWE-706 CWE-707 CWE-708 CWE-709 CWE-710 CWE-711 CWE-712 CWE-713 CWE-714 CWE-715 CWE-716 CWE-717 CWE-718 CWE-719 CWE-720 CWE-721 CWE-722 CWE-723 CWE-724 CWE-725 CWE-726 CWE-727 CWE-728 CWE-729 CWE-730 CWE-731 CWE-732 CWE-733 CWE-734 CWE-735 CWE-736 CWE-737 CWE-738 CWE-739 CWE-740 CWE-741 CWE-742 CWE-743 |
https://www.w3.org/2000/01/rdf-schema#label |
CWE-20
|
gptkbp:impact |
Security vulnerabilities
|
gptkbp:is_described_as |
The software does not validate or incorrectly validates input that can affect the control flow or data.
|
gptkbp:is_protected_by |
Implement input validation checks.
|
gptkbp:name |
Improper Input Validation
|
gptkbp:related_to |
gptkb:CWE-21
gptkb:CWE-22 gptkb:CWE-23 gptkb:CWE-74 |
gptkbp:bfsParent |
gptkb:CVE-2019-0230
|
gptkbp:bfsLayer |
4
|