gptkbp:instanceOf
|
gptkb:Common_Weakness_Enumeration
|
gptkbp:category
|
Software Weakness
|
gptkbp:cause
|
gptkb:Denial_of_Service
Data Corruption
Code Execution
Security Vulnerability
|
gptkbp:describedBy
|
gptkb:MITRE_CWE
|
gptkbp:describes
|
The software does not validate or incorrectly validates input that can affect the control flow or data flow of a program.
|
gptkbp:example
|
Failing to check user input in a web form
|
gptkbp:externalLink
|
https://cwe.mitre.org/data/definitions/20.html
|
gptkbp:firstPublished
|
2006
|
gptkbp:hasCWE
|
gptkb:CWE-20
|
https://www.w3.org/2000/01/rdf-schema#label
|
CWE-20
|
gptkbp:maintainedBy
|
gptkb:MITRE_Corporation
|
gptkbp:name
|
Improper Input Validation
|
gptkbp:prevention
|
Input Validation
|
gptkbp:relatedTo
|
gptkb:CWE-119
gptkb:CWE-352
gptkb:CWE-89
|
gptkbp:usedIn
|
gptkb:CWE_Top_25_Most_Dangerous_Software_Weaknesses
|
gptkbp:bfsParent
|
gptkb:CWE
gptkb:CVE-2017-0143
gptkb:CVE-2017-0145
gptkb:CVE-2017-0146
gptkb:CVE-2021-44228
gptkb:CVE-2017-5638
gptkb:CVE-2018-11776
gptkb:CVE-2015-7755
gptkb:CVE-2015-7756
gptkb:CVE-2017-0144
|
gptkbp:bfsLayer
|
7
|