Modos de Introdução
Architecture and Design : This weakness may occur when software designers choose to not leverage input validation frameworks provided by the source language.
Implementation : This weakness may occur when developers do not correctly use a provided input validation framework.
Plataformas Aplicáveis
Linguagem
Class: Not Language-Specific (Undetermined)
Consequências Comuns
| Escopo |
Impacto |
Probabilidade |
| Integrity | Unexpected State
Note: Unchecked input leads to cross-site scripting, process control, and SQL injection vulnerabilities, among others. | |
Mitigações Potenciais
Phases : Implementation
Properly use provided input validation frameworks.
Métodos de Detecção
Automated Static Analysis
Notas de Mapeamento de Vulnerabilidade
Justificativa : This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.
Comentário : Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
Submissão
| Nome |
Organização |
Data |
Data de lançamento |
Version |
| CWE Content Team |
MITRE |
2018-12-21 +00:00 |
2019-01-03 +00:00 |
3.2 |
Modificações
| Nome |
Organização |
Data |
Comentário |
| CWE Content Team |
MITRE |
2020-02-24 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2020-06-25 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2021-10-28 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-01-31 +00:00 |
updated Description |
| CWE Content Team |
MITRE |
2023-04-27 +00:00 |
updated Relationships |
| CWE Content Team |
MITRE |
2023-06-29 +00:00 |
updated Mapping_Notes |