Pretraži prema CWE oznaci - CERT CVE

CWE lista

CWE ID Opis
CWE-368 A product performs a series of non-atomic actions to switch between contexts that cross privilege or other security boundaries, but a race condition allows an attacker to modify or misrepresent the product's behavior during the switch.
CWE-369 The product divides a value by zero.
CWE-37 A software system that accepts input in the form of a slash absolute path ('/absolute/pathname/here') without appropriate validation can allow an attacker to traverse the file system to unintended locations or access arbitrary files.
CWE-370 The software does not check the revocation status of a certificate after its initial revocation check, which can cause the software to perform privileged actions even after the certificate is revoked at a later time.
CWE-372 The software does not properly determine which state it is in, causing it to assume it is in state X when in fact it is in state Y, causing it to perform incorrect operations in a security-relevant manner.
CWE-373 This entry was deprecated because it overlapped the same concepts as race condition (CWE-362) and Improper Synchronization (CWE-662).
CWE-374 The program sends non-cloned mutable data as an argument to a method or function.
CWE-375 Sending non-cloned mutable data as a return value may result in that data being altered or deleted by the calling function.
CWE-377 Creating and using insecure temporary files can leave application and system data vulnerable to attack.
CWE-378 Opening temporary files without appropriate measures or controls can leave the file, its contents and any function that it impacts vulnerable to attack.