angler-fishThe Vulnerability History Project

CWE-183: Permissive List of Allowed Inputs

"The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are explicitly allowed by policy because the inputs are assumed to be safe, but the list is too permissive - that is, it allows an input that is unsafe, leading to resultant weaknesses." - Entry from the Common Weakness Enumeration

For more info visit CWE-183

Examples


    There are no articles here... yet

expand_less