CWE-676 |
Use of Potentially Dangerous Function |
|
|
CWE-675 |
Duplicate Operations on Resource |
|
|
CWE-674 |
Uncontrolled Recursion |
|
|
CWE-673 |
External Influence of Sphere Definition |
|
|
CWE-672 |
Operation on a Resource after Expiration or Release |
|
|
CWE-671 |
Lack of Administrator Control over Security |
|
|
CWE-670 |
Always-Incorrect Control Flow Implementation |
|
|
CWE-67 |
Improper Handling of Windows Device Names |
|
|
CWE-669 |
Incorrect Resource Transfer Between Spheres |
|
|
CWE-668 |
Exposure of Resource to Wrong Sphere |
|
|
CWE-667 |
Improper Locking |
|
|
CWE-666 |
Operation on Resource in Wrong Phase of Lifetime |
|
|
CWE-665 |
Improper Initialization |
|
|
CWE-664 |
Improper Control of a Resource Through its Lifetime |
|
|
CWE-663 |
Use of a Non-reentrant Function in a Concurrent Context |
|
|
CWE-662 |
Improper Synchronization |
|
|
CWE-66 |
Improper Handling of File Names that Identify Virtual Resources |
|
|
CWE-657 |
Violation of Secure Design Principles |
|
|
CWE-656 |
Reliance on Security Through Obscurity |
|
|
CWE-655 |
Insufficient Psychological Acceptability |
|
|