肺大泡有什么危害| 周公解梦是什么意思| 副师级是什么军衔| 美洲大蠊主治什么病| 阴道内痒是什么原因| 反胃酸是什么原因| 端午节是什么星座| 为什么现在不吃糖丸了| 为难是什么意思| 傻缺什么意思| gsy什么意思| 刚怀孕吃什么最好最营养| 三个山是什么字| 子宫肌瘤是什么意思| 抗皱用什么产品好| 血沉高是什么原因引起的| 夜明珠代表什么生肖| 什么食物含硒多| 企鹅是什么动物| 胸长什么样| nt和无创有什么区别| 脾大是什么病| 11月11号什么星座| 梦见包被偷了什么预兆| 月令是什么意思| 举头三尺有神明是什么意思| 很无奈是什么意思| 血小板低是什么问题| 十一月二十是什么星座| lv中文名叫什么| 喝苏打水有什么好处和坏处| 连长相当于地方什么官| 瘙痒是什么意思| 淋是什么意思| 04年的猴是什么命| 身上长了好多红痣是什么原因| 上海话娘娘是什么意思| hv是什么意思| 不眠之夜是什么意思| 轻断食什么意思| 油烟机什么牌子好| 各就各位是什么意思| 91视频是什么| 8宫代表什么| 世界上笔画最多的字是什么| 什么是豹子号| alpaca是什么意思| hpv阳性意味着什么| versus什么意思| 胸口疼痛是什么原因| hbsag阴性是什么意思| 结婚50年是什么婚| 维纳斯是什么意思| 瑞什么意思| 基因是什么| 养猫需要准备什么东西| 负面影响是什么意思| 九九重阳节是什么意思| 早孕三项检查什么| 奥美拉唑什么时候吃最好| 宠幸是什么意思| 脑梗吃什么药好| 右耳朵痒是什么预兆| 佩戴貔貅有什么讲究与禁忌| 臭屁什么意思| 耳朵挂什么科| 发菜是什么菜| poem是什么意思| 湉字五行属什么| 肠炎发烧吃什么药| 老年人缺钾是什么原因引起的| 手脚热是什么原因| 吃什么减肥瘦肚子| 唾液腺是什么组织| 便秘吃什么可以调理| 膈是什么器官| 男人气血不足吃什么药| 怀孕了吃什么药能流掉| 人为什么会出汗| ye是什么意思| 猴子屁股为什么是红色| 梳子断了有什么预兆| 肛门长期瘙痒是什么原因| 利而不害为而不争是什么意思| 瘦人吃什么能长胖| 减肥喝什么水| 二胎什么时候放开的| 发烧喝什么饮料比较好| crh是什么意思| 孕妇红细胞偏低是什么原因| 肾上腺彩超是检查什么| 宠幸是什么意思| 羽毛球拍磅数是什么意思| hpv56阳性是什么意思| 水奶和奶粉什么区别| 裂纹舌是什么原因引起的| 胎盘位于子宫前壁是什么意思| 去鱼腥味最好的方法是什么| 双氧水是什么| 汗水多是什么原因| 尿常规查什么| 什么学海无涯苦作舟| 女人什么时候最想要| 唇炎属于什么科| 梵行是什么意思| 为什么男生| 性取向是什么意思| 风水是什么意思| 嘴麻是什么原因| 什么如什么| 什么明月| 淋病和梅毒有什么区别| 国家的实质是什么| 肚脐左侧疼是什么原因| 白板是什么意思| 为什么会感染真菌| 每天尿都是黄的是什么原因| 西瓜虫吃什么食物| 苦瓜汤为什么要放黄豆| 社会是什么意思| 苏轼是什么派诗人| 没吃多少东西但肚子很胀是什么| 焦作有什么大学| 生理年龄是什么意思| 苹果什么时候吃最好| 猫咪为什么害怕黄瓜| 哪吒的武器是什么| 拔罐之后要注意什么| 行政许可是什么意思| 什么原因导致月经量少| 36什么意思| hpv39阳性是什么意思| 嘴苦什么原因| 阿昔洛韦片是什么药| 皮肤病用什么药膏好| 2026是什么年| 地铁站务员是干什么的| 糟老头是什么意思| 乡政府属于什么单位| 嫌恶是什么意思| 什么叫痛风| 为什么贫血| 冰箱底部漏水是什么原因| 打封闭针有什么坏处| 孕妇吃什么会流产| 一学年是什么意思| 磁共振是查什么的| 肠胃炎能吃什么水果| 吃什么药可以减肥| 缱绻旖旎是什么意思| 天气热吃什么好| ct和磁共振有什么区别| 扁桃体1度肿大是什么意思| 真空什么意思| 龟头炎用什么药| 美国为什么打伊朗| 哈尔滨有什么特产| 簋是什么| 直女是什么意思| 鸭肫是什么部位| 梦见娃娃是什么意思| 鱼不能和什么一起吃| 南辕北辙告诉我们什么道理| 保家仙是什么意思| 唐氏筛查和无创有什么区别| 五更泻吃什么药| 高血压喝什么茶最好| 淋巴瘤是什么症状| 火把节在每年农历的什么时间举行| 军校出来能干什么| 半硬半软是什么症状| 拉大便出血是什么原因| hpv检查什么项目| 女人的逼什么样| 为老不尊是什么意思| gina是什么意思| 错位是什么意思| 看病人带什么水果| 力不从心的意思是什么| 痛风什么不能吃| 亨特综合症是什么病| 手口足吃什么药| 端午节吃什么食物| 生理盐水和食用盐水有什么区别| 圹是什么意思| 搬迁送什么礼物好| 米线是什么做的| 晕3d是什么原因| 扁桃体发炎看什么科| 凉皮用什么面粉| 11月16日是什么星座| holly是什么意思| cy什么意思| 频繁流鼻血是什么病的前兆| 阿莫西林是什么| 儿童说话晚去医院挂什么科| 炸肺是什么意思| 宝宝干咳嗽是什么原因| 15天来一次月经是什么原因| 江西有什么特产| 梦见黑棺材是什么征兆| 30年属什么生肖| 腹部ct平扫能检查出什么| 壁立千仞无欲则刚是什么意思| 甘油三酯高应该注意什么| 卩是什么意思| 益母草煮鸡蛋有什么功效| 楠字取名有什么寓意| 米粉和米线有什么区别| 壶嘴为什么不能对着人| 癸水的根是什么| 左眼皮跳代表什么| 女人梦见蛇缠身是什么预兆| 人皇是什么意思| 指甲变形是什么原因| 魂牵梦萦是什么意思| 有什么花| 百草霜是什么| 家中养什么鸟最干净| 什么花秋天开| kub是什么检查| 乌龟肺炎用什么药| 来例假吃什么水果| 有所作为的意思是什么| 天天做梦是什么原因| 冷面是什么面| 螳螂代表什么生肖| 云肖是什么生肖| 老鸨是什么意思| 中医治未病是什么意思| btc是什么意思| 吃了紧急避孕药会有什么反应| 什么是低保| 自省是什么意思| 宫颈ca什么意思| 流浓黄鼻涕是什么原因| 做梦梦见打架是什么意思| 梦游是什么原因造成的| 副市长什么级别| 割掉胆对人有什么影响| 炖肉什么时候放盐| 安徽简称什么| 为什么会得脚气| 晚点是什么意思| 虾青素有什么作用| 敌敌畏中毒用什么洗胃| 木耳不能和什么食物一起吃| cps是什么单位| 带状疱疹是什么症状| 太五行属什么| 后背疼是什么原因| 传染性单核细胞增多症是什么病| 便秘吃什么药能根治| 狗仗人势是什么生肖| 你会不会突然的出现是什么歌| 下蛊是什么意思| 梦见吃豆腐是什么意思| pp1是什么意思| 又字加一笔是什么字| 胰腺炎是什么病| 药店加盟需要什么条件| 什么是平舌音什么是翘舌音| 撑台脚是什么意思| 开庭前家属做什么准备| 百度
CWE

中国新闻技术工作者联合会第六届四次理事会 2017年学术年会暨王选奖颁奖大会在渝召开

百度 北京八路军山东抗日根据地研究会罗东进会长在致辞中简要介绍了山东抗日根据地的重要历史地位和重大历史贡献,介绍了这次历史图片展的内容及办展宗旨,最后强调指出要铭记历史,缅怀先烈,获得有益启迪,传承红色基因,不忘初心,牢记使命,砥砺奋进,开创未来,更加紧密地团结在以习近平同志为核心的党中央周围,深入贯彻落实党的十九大精神,为决胜全面建成小康社会,夺取新时代中国特色社会主义伟大胜利,实现中华民族伟大复兴的中国梦而不懈奋斗!山东省政府和八路军115师司令部旧址管理处党委书记兼主任赵树敏在开幕式上简要介绍了全国重点文物保护单位——山东省政府和八路军115师司令部旧址及山东抗日根据地纪念馆建设情况,以及这次历史图片展筹备情况,表示在展览期间,要组织讲解人员以高昂的精神状态,全力为各位领导和参观者做好讲解工作,确保展览圆满成功。

A community-developed list of SW & HW weaknesses that can become vulnerabilities

New to CWE? click here!
CWE Most Important Hardware Weaknesses
CWE Top 25 Most Dangerous Weaknesses
Home > CWE List > CWE-1286: Improper Validation of Syntactic Correctness of Input (4.17)  
ID

CWE-1286: Improper Validation of Syntactic Correctness of Input

Weakness ID: 1286
Vulnerability Mapping: ALLOWED This CWE ID may be used to map to real-world vulnerabilities
Abstraction: Base Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource.
View customized information:
For users who are interested in more notional aspects of a weakness. Example: educators, technical writers, and project/program managers. For users who are concerned with the practical application and details about the nature of a weakness and how to prevent it from happening. Example: tool developers, security researchers, pen-testers, incident response analysts. For users who are mapping an issue to CWE/CAPEC IDs, i.e., finding the most appropriate CWE for a specific issue (e.g., a CVE record). Example: tool developers, security researchers. For users who wish to see all available information for the CWE/CAPEC entry. For users who want to customize what details are displayed.
×

Edit Custom Filter


+ Description
The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not validate or incorrectly validates that the input complies with the syntax.
+ Extended Description

Often, complex inputs are expected to follow a particular syntax, which is either assumed by the input itself, or declared within metadata such as headers. The syntax could be for data exchange formats, markup languages, or even programming languages. When untrusted input is not properly validated for the expected syntax, attackers could cause parsing failures, trigger unexpected errors, or expose latent vulnerabilities that might not be directly exploitable if the input had conformed to the syntax.

+ Common Consequences
Section HelpThis table specifies different individual consequences associated with the weakness. The Scope identifies the application security area that is violated, while the Impact describes the negative technical impact that arises if an adversary succeeds in exploiting this weakness. The Likelihood provides information about how likely the specific consequence is expected to be seen relative to the other consequences in the list. For example, there may be high likelihood that a weakness will be exploited to achieve a certain impact, but a low likelihood that it will be exploited to achieve a different impact.
Impact Details

Varies by Context

Scope: Other

+ Potential Mitigations
Phase(s) Mitigation

Implementation

Strategy: Input Validation

Assume all input is malicious. Use an "accept known good" input validation strategy, i.e., use a list of acceptable inputs that strictly conform to specifications. Reject any input that does not strictly conform to specifications, or transform it into something that does.

When performing input validation, consider all potentially relevant properties, including length, type of input, the full range of acceptable values, missing or extra inputs, syntax, consistency across related fields, and conformance to business rules. As an example of business rule logic, "boat" may be syntactically valid because it only contains alphanumeric characters, but it is not valid if the input is only expected to contain colors such as "red" or "blue."

Do not rely exclusively on looking for malicious or malformed inputs. This is likely to miss at least one undesirable input, especially if the code's environment changes. This can give attackers enough room to bypass the intended validation. However, denylists can be useful for detecting potential attacks or determining which inputs are so malformed that they should be rejected outright.

Effectiveness: High

+ Relationships
Section Help This table shows the weaknesses and high level categories that are related to this weakness. These relationships are defined as ChildOf, ParentOf, MemberOf and give insight to similar items that may exist at higher and lower levels of abstraction. In addition, relationships such as PeerOf and CanAlsoBe are defined to show similar weaknesses that the user may want to explore.
+ Relevant to the view "Research Concepts" (View-1000)
Nature Type ID Name
ChildOf Class Class - a weakness that is described in a very abstract fashion, typically independent of any specific language or technology. More specific than a Pillar Weakness, but more general than a Base Weakness. Class level weaknesses typically describe issues in terms of 1 or 2 of the following dimensions: behavior, property, and resource. 20 Improper Input Validation
ParentOf Base Base - a weakness that is still mostly independent of a resource or technology, but with sufficient details to provide specific methods for detection and prevention. Base level weaknesses typically describe issues in terms of 2 or 3 of the following dimensions: behavior, property, technology, language, and resource. 112 Missing XML Validation
+ Relevant to the view "Software Development" (View-699)
Nature Type ID Name
MemberOf Category Category - a CWE entry that contains a set of other entries that share a common characteristic. 1215 Data Validation Issues
+ Modes Of Introduction
Section HelpThe different Modes of Introduction provide information about how and when this weakness may be introduced. The Phase identifies a point in the life cycle at which introduction may occur, while the Note provides a typical scenario related to introduction during the given phase.
Phase Note
Implementation
+ Applicable Platforms
Section HelpThis listing shows possible areas for which the given weakness could appear. These may be for specific named Languages, Operating Systems, Architectures, Paradigms, Technologies, or a class of such platforms. The platform is listed along with how frequently the given weakness appears for that instance.
Languages

Class: Not Language-Specific (Often Prevalent)

+ Demonstrative Examples

Example 1


The following code loads and parses an XML file.

(bad code)
Example Language: Java 

// Read DOM
try {
...
DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
factory.setValidating( false );
....
c_dom = factory.newDocumentBuilder().parse( xmlFile );
} catch(Exception ex) {
...
}

The XML file is loaded without validating it against a known XML Schema or DTD.



+ Selected Observed Examples

Note: this is a curated list of examples for users to understand the variety of ways in which this weakness can be introduced. It is not a complete list of all CVEs that are related to this CWE entry.

Reference Description
Chain: incorrect validation of intended decimal-based IP address format (CWE-1286) enables parsing of octal or hexadecimal formats (CWE-1389), allowing bypass of an SSRF protection mechanism (CWE-918).
HTTP request with missing protocol version number leads to crash
+ Memberships
Section HelpThis MemberOf Relationships table shows additional CWE Categories and Views that reference this weakness as a member. This information is often useful in understanding where a weakness fits within the context of external information sources.
Nature Type ID Name
MemberOf CategoryCategory - a CWE entry that contains a set of other entries that share a common characteristic. 1406 Comprehensive Categorization: Improper Input Validation
+ Vulnerability Mapping Notes
Usage ALLOWED
(this CWE ID may be used to map to real-world vulnerabilities)
Reason Acceptable-Use

Rationale

This CWE entry is at the Base level of abstraction, which is a preferred level of abstraction for mapping to the root causes of vulnerabilities.

Comments

Carefully read both the name and description to ensure that this mapping is an appropriate fit. Do not try to 'force' a mapping to a lower-level Base/Variant simply to comply with this preferred level of abstraction.
+ Notes

Maintenance

This entry is still under development and will continue to see updates and content improvements.
+ Content History
+ Submissions
Submission Date Submitter Organization
2025-08-05
(CWE 4.1, 2025-08-05)
CWE Content Team MITRE
+ Modifications
Modification Date Modifier Organization
2025-08-05 CWE Content Team MITRE
updated Mapping_Notes
2025-08-05 CWE Content Team MITRE
updated Relationships
2025-08-05 CWE Content Team MITRE
updated Observed_Examples
2025-08-05 CWE Content Team MITRE
updated Related_Attack_Patterns
2025-08-05 CWE Content Team MITRE
updated Related_Attack_Patterns
Page Last Updated: April 03, 2025
87年是什么年 吃什么可以丰胸 波涛澎湃是什么意思 义眼是什么意思 孕妇吃什么盐最好
珍贵的动物是什么生肖 脚抽筋吃什么钙片好 反复是什么意思 眉毛长白毛是什么征兆 哥哥的女儿叫什么
为什么医生不推荐特立帕肽呢 脚麻吃什么药有效 浮屠是什么意思 枫叶是什么颜色的 子鱼是什么鱼
罗红霉素治什么病 幽门螺旋杆菌是什么原因造成的 男人湿气重吃什么药 鬓角长痘痘是什么原因 什么叫脂溢性脱发
灼口综合症吃什么药bfb118.com 晚上右眼跳是什么预兆hcv9jop1ns6r.cn 士字五行属什么hcv8jop1ns4r.cn 牙齿突然出血是什么原因hcv7jop9ns5r.cn 飞机什么时候停止登机hcv9jop0ns8r.cn
1月生日是什么星座yanzhenzixun.com 吃你鲍鱼是什么意思hcv9jop4ns4r.cn 非你莫属是什么意思hcv9jop0ns1r.cn 牙疼脸肿了吃什么药hcv8jop5ns6r.cn 什么样的耳朵hcv7jop5ns5r.cn
脑梗吃什么hcv9jop4ns0r.cn 头晕是什么感觉hcv9jop4ns7r.cn 背疼挂什么科室最好hcv9jop3ns4r.cn 荷叶和什么搭配最减肥hcv7jop6ns6r.cn 乙木的根是什么hcv8jop0ns1r.cn
时隔是什么意思hcv8jop8ns2r.cn 宫颈炎吃什么药最好hcv9jop5ns6r.cn 咽喉炎是什么原因引起的hcv9jop0ns8r.cn 21什么意思hcv8jop7ns1r.cn 喝什么胸会变大hcv8jop2ns2r.cn
百度