Pretraži prema CWE oznaci - CERT CVE

CWE lista

CWE ID Opis
CWE-32 The software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '...' (triple dot) sequences that can resolve to a location that is outside of that directory.
CWE-321 The use of a hard-coded cryptographic key significantly increases the possibility that encrypted data may be recovered.
CWE-322 The software performs a key exchange with an actor without verifying the identity of that actor.
CWE-323 Nonces should be used for the present occasion and only once.
CWE-324 The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by increasing the timing window for cracking attacks against that key.
CWE-325 The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than advertised by that algorithm.
CWE-326 The software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required.
CWE-327 The use of a broken or risky cryptographic algorithm is an unnecessary risk that may result in the exposure of sensitive information.
CWE-328 The product uses a hashing algorithm that produces a hash value that can be used to determine the original input, or to find an input that can produce the same hash, more efficiently than brute force techniques.
CWE-329 Not using a random initialization Vector (IV) with Cipher Block Chaining (CBC) Mode causes algorithms to be susceptible to dictionary attacks.