Statements (14)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Common_Weakness_Enumeration
|
gptkbp:category |
gptkb:security
|
gptkbp:description |
The software includes functionality that is controlled by an untrusted source.
|
gptkbp:difficulty_levels |
gptkb:High
|
gptkbp:example |
Using a third-party library without validating its source.
|
https://www.w3.org/2000/01/rdf-schema#label |
CWE-829
|
gptkbp:impact |
Security vulnerabilities
|
gptkbp:name |
Inclusion of Functionality from Untrusted Control Sphere
|
gptkbp:prevention |
Validate and sanitize all inputs.
|
gptkbp:related_to |
gptkb:CWE-74
gptkb:CWE-829 gptkb:CWE-20 |
gptkbp:bfsParent |
gptkb:CWE-23
|
gptkbp:bfsLayer |
8
|