CWE-20

GPTKB entity

Statements (71)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:category Input Validation
gptkbp:consequences Unauthorized access
Data corruption
Denial of service
gptkbp:difficulty gptkb:High
gptkbp:example An application that accepts user input without validation.
gptkbp:has_weakness gptkb:CWE-118
gptkb:CWE-119
gptkb:CWE-200
gptkb:CWE-601
gptkb:CWE-703
gptkb:CWE-744
gptkb:CWE-745
gptkb:CWE-746
gptkb:CWE-747
gptkb:CWE-748
gptkb:CWE-749
gptkb:CWE-750
gptkb:CWE-20
CWE-704
CWE-705
CWE-706
CWE-707
CWE-708
CWE-709
CWE-710
CWE-711
CWE-712
CWE-713
CWE-714
CWE-715
CWE-716
CWE-717
CWE-718
CWE-719
CWE-720
CWE-721
CWE-722
CWE-723
CWE-724
CWE-725
CWE-726
CWE-727
CWE-728
CWE-729
CWE-730
CWE-731
CWE-732
CWE-733
CWE-734
CWE-735
CWE-736
CWE-737
CWE-738
CWE-739
CWE-740
CWE-741
CWE-742
CWE-743
https://www.w3.org/2000/01/rdf-schema#label CWE-20
gptkbp:impact Security vulnerabilities
gptkbp:is_described_as The software does not validate or incorrectly validates input that can affect the control flow or data.
gptkbp:is_protected_by Implement input validation checks.
gptkbp:name Improper Input Validation
gptkbp:related_to gptkb:CWE-21
gptkb:CWE-22
gptkb:CWE-23
gptkb:CWE-74
gptkbp:bfsParent gptkb:CVE-2019-0230
gptkbp:bfsLayer 4