CWE-829

GPTKB entity

Statements (14)
Predicate Object
gptkbp:instance_of gptkb:Common_Weakness_Enumeration
gptkbp:bfsLayer 6
gptkbp:bfsParent gptkb:CWE-23
gptkbp:category gptkb:software
gptkbp:difficulty gptkb:High
gptkbp:example Using a third-party library without validating its source.
https://www.w3.org/2000/01/rdf-schema#label CWE-829
gptkbp:impact Security vulnerabilities
gptkbp:is_described_as The software includes functionality that is controlled by an untrusted source.
gptkbp:is_protected_by Validate and sanitize all inputs.
gptkbp:name Inclusion of Functionality from Untrusted Control Sphere
gptkbp:related_to gptkb:CWE-74
gptkb:CWE-829
gptkb:CWE-20