Statements (24)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:Common_Weakness_Enumeration
|
| gptkbp:category |
Software Weakness
|
| gptkbp:cause |
gptkb:Denial_of_Service
gptkb:Security_Vulnerability Data Corruption Code Execution |
| gptkbp:describedBy |
gptkb:MITRE_CWE
|
| gptkbp:describes |
The software does not validate or incorrectly validates input that can affect the control flow or data flow of a program.
|
| gptkbp:example |
Failing to check user input in a web form
|
| gptkbp:externalLink |
https://cwe.mitre.org/data/definitions/20.html
|
| gptkbp:firstPublished |
2006
|
| gptkbp:hasCWE |
gptkb:CWE-20
|
| gptkbp:maintainedBy |
gptkb:MITRE_Corporation
|
| gptkbp:name |
Improper Input Validation
|
| gptkbp:prevention |
Input Validation
|
| gptkbp:relatedTo |
gptkb:CWE-119
gptkb:CWE-352 gptkb:CWE-89 |
| gptkbp:usedIn |
gptkb:CWE_Top_25_Most_Dangerous_Software_Weaknesses
|
| gptkbp:bfsParent |
gptkb:CWE
gptkb:CVE-2021-44228 gptkb:CVE-2017-0144 |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
CWE-20
|