Pretraži prema CWE oznaci - CERT CVE

CWE lista

CWE ID Opis
CWE-705 The software does not properly return control flow to the proper location after it has completed a task or detected an unusual condition.
CWE-706 The software uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside of the intended control sphere.
CWE-707 The product does not ensure or incorrectly ensures that structured messages or data are well-formed and that certain security properties are met before being read from an upstream component or sent to a downstream component.
CWE-708 The software assigns an owner to a resource, but the owner is outside of the intended control sphere.
CWE-71 This entry has been deprecated as it represents a specific observed example of a UNIX Hard Link weakness type rather than its own individual weakness type. Please refer to CWE-62.
CWE-710 The software does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the severity of the associated vulnerabilities.
CWE-72 The software does not properly handle special paths that may identify the data or resource fork of a file on the HFS+ file system.
CWE-73 The software allows user input to control or influence paths or file names that are used in filesystem operations.
CWE-732 The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
CWE-733 The developer builds a security-critical protection mechanism into the software, but the compiler optimizes the program such that the mechanism is removed or modified.