Weaknesses in this category are related to improper handling of
data within protection mechanisms that attempt to perform neutralization for
untrusted data.
The software decodes the same input twice, which can limit the
effectiveness of any protection mechanism that occurs in between the decoding
operations.
The software does not properly account for differences in case
sensitivity when accessing or determining the properties of a resource, leading
to inconsistent results.
The software validates input before applying protection
mechanisms that modify the input, which could allow an attacker to bypass the
validation via dangerous inputs that only arise after the
modification.