This category represents one of the phyla in the Seven Pernicious Kingdoms vulnerability classification. It includes weaknesses that exist when an application does not properly validate or represent input.
Katrina Tsipenyuk, Brian Chess
and Gary McGraw. "Seven Pernicious Kingdoms: A Taxonomy of Software Security
Errors". IEEE Security and Privacy (Volume: 3, Issue:
6). IEEE. 12 December 2005. <http://ieeexplore.ieee.org/document/1556543>.
7 Pernicious Kingdoms
More information is available — Please select a different filter.
Page Last Updated:
May 05, 2017
Use of the Common Weakness Enumeration and the associated references from this website are subject to the