Statements (25)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:Common_Weakness_Enumeration
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:CWE-200
gptkb:CWE-74 |
gptkbp:affects |
Web applications
Mobile applications Desktop applications |
gptkbp:category |
Injection
|
gptkbp:difficulty |
gptkb:High
|
gptkbp:example |
SQL Injection
OS Command Injection Script Injection |
https://www.w3.org/2000/01/rdf-schema#label |
CWE-94
|
gptkbp:impact |
Execution of arbitrary code
|
gptkbp:is_described_as |
Code Injection occurs when an attacker is able to inject code into a program, which is then executed by the program.
|
gptkbp:is_protected_by |
Input validation
Output encoding Use of safe AP Is |
gptkbp:is_referenced_in |
gptkb:SANS_Top_25
gptkb:API NISTSP 800-53 |
gptkbp:name |
Code Injection
|
gptkbp:related_to |
gptkb:CWE-77
gptkb:CWE-89 gptkb:CWE-20 |