Introductiemodi
Architecture and Design : This weakness may occur when software designers choose to not leverage input validation frameworks provided by the source language.
Implementation : This weakness may occur when developers do not correctly use a provided input validation framework.
Toepasselijke platforms
Taal
Class: Not Language-Specific (Undetermined)
Veelvoorkomende gevolgen
| Bereik |
Impact |
Waarschijnlijkheid |
| Integrity | Unexpected State
Note: Unchecked input leads to cross-site scripting, process control, and SQL injection vulnerabilities, among others. | |
Mogelijke risicobeperkingen
Phases : Implementation
Properly use provided input validation frameworks.
Detectiemethoden
Automated Static Analysis
Notities kwetsbaarheidsmapping
Rechtvaardiging : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Opmerking : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Indiening
| Naam |
Organisatie |
Datum |
Releasedatum |
Version |
| CWE Content Team |
MITRE |
2018-12-21 +00:00 |
2019-01-03 +00:00 |
3.2 |
Wijzigingen
| Naam |
Organisatie |
Datum |
Opmerking |
| CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2020-06-25 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2021-10-28 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |