CWE-750

GPTKB entity

Statements (21)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:bfsLayer 5
gptkbp:bfsParent gptkb:CWE-20
gptkbp:category gptkb:software
gptkbp:difficulty gptkb:High
gptkbp:example Using system calls that can be manipulated by user input.
gptkbp:has_weakness gptkb:CWE-119
gptkb:CWE-200
gptkb:CWE-352
gptkb:CWE-434
gptkb:CWE-918
https://www.w3.org/2000/01/rdf-schema#label CWE-750
gptkbp:impact Allows attackers to execute arbitrary code.
gptkbp:is_described_as The software exposes a dangerous method or function that can be exploited by an attacker.
gptkbp:is_protected_by Implement input validation.
Limit access to dangerous functions.
gptkbp:is_referenced_in https://cwe.mitre.org/data/definitions/750.html
gptkbp:name Exposed Dangerous Method or Function
gptkbp:related_to gptkb:CWE-22
gptkb:CWE-74
gptkb:CWE-20