CWE-682 |
The software performs a calculation that generates incorrect or unintended results that are later used in security-critical decisions or resource management. |
CWE-683 |
The software calls a function, procedure, or routine, but the caller specifies the arguments in an incorrect order, leading to resultant weaknesses. |
CWE-684 |
The code does not function according to its published specifications, potentially leading to incorrect usage. |
CWE-685 |
The software calls a function, procedure, or routine, but the caller specifies too many arguments, or too few arguments, which may lead to undefined behavior and resultant weaknesses. |
CWE-687 |
The software calls a function, procedure, or routine, but the caller specifies an argument that contains the wrong value, which may lead to resultant weaknesses. |
CWE-688 |
The software calls a function, procedure, or routine, but the caller specifies the wrong variable or reference as one of the arguments, which may lead to undefined behavior and resultant weaknesses. |
CWE-689 |
The product, while copying or cloning a resource, does not set the resource's permissions or access control until the copy is complete, leaving the resource exposed to other spheres while the copy is taking place. |
CWE-69 |
The software does not properly prevent access to, or detect usage of, alternate data streams (ADS). |
CWE-690 |
The product does not check for an error after calling a function that can return with a NULL pointer if the function fails, which leads to a resultant NULL pointer dereference. |
CWE-691 |
The code does not sufficiently manage its control flow during execution, creating conditions in which the control flow can be modified in unexpected ways. |