Statements (21)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Common_Weakness_Enumeration
|
gptkbp:bfsLayer |
5
|
gptkbp:bfsParent |
gptkb:CWE-20
|
gptkbp:category |
gptkb:software
|
gptkbp:difficulty |
gptkb:High
|
gptkbp:example |
Using system calls that can be manipulated by user input.
|
gptkbp:has_weakness |
gptkb:CWE-119
gptkb:CWE-200 gptkb:CWE-352 gptkb:CWE-434 gptkb:CWE-918 |
https://www.w3.org/2000/01/rdf-schema#label |
CWE-750
|
gptkbp:impact |
Allows attackers to execute arbitrary code.
|
gptkbp:is_described_as |
The software exposes a dangerous method or function that can be exploited by an attacker.
|
gptkbp:is_protected_by |
Implement input validation.
Limit access to dangerous functions. |
gptkbp:is_referenced_in |
https://cwe.mitre.org/data/definitions/750.html
|
gptkbp:name |
Exposed Dangerous Method or Function
|
gptkbp:related_to |
gptkb:CWE-22
gptkb:CWE-74 gptkb:CWE-20 |