Enumeración de debilidades comunes (CWE)
La enumeración de debilidades comunes (CWE™) es una lista de tipos de debilidades de software que pueden aparecer en la arquitectura, el diseño, el código o la implementación de software. Estas debilidades pueden derivar en vulnerabilidades de seguridad.
Polyspace puede comprobar el código conforme a subconjuntos de la lista CWE, incluidos aquellos subconjuntos o debilidades específicos del código C o C++. Para activar subconjuntos de la lista CWE, utilice la opción de análisis Comprobar CWE (-cwe)
. Polyspace es compatible con la versión 4.12 del estándar CWE.
Resultados de Polyspace
CWE Rule
14 | Compiler Removal of Code to Clear Buffers (Desde R2023a) |
CWE Rule
15 | External Control of System or Configuration Setting (Desde R2024a) |
CWE Rule
20 | Improper Input Validation (Desde R2024a) |
CWE Rule
22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (Desde R2024a) |
CWE Rule
23 | Relative Path Traversal (Desde R2024a) |
CWE Rule
36 | Absolute Path Traversal (Desde R2024a) |
CWE Rule
67 | Improper Handling of Windows Device Names (Desde R2024a) |
CWE Rule
77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') (Desde R2024a) |
CWE Rule
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (Desde R2024a) |
CWE Rule
88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (Desde R2024a) |
CWE Rule
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Desde R2023a) |
CWE Rule
90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') (Desde R2023a) |
CWE Rule
99 | Improper Control of Resource Identifiers ('Resource Injection') (Desde R2024b) |
CWE Rule
114 | Process Control (Desde R2024a) |
CWE Rule
119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (Desde R2023a) |
CWE Rule
120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (Desde R2023a) |
CWE Rule
121 | Stack-based Buffer Overflow (Desde R2023a) |
CWE Rule
122 | Heap-based Buffer Overflow (Desde R2023a) |
CWE Rule
123 | Write-what-where Condition (Desde R2023a) |
CWE Rule
124 | Buffer Underwrite ('Buffer Underflow') (Desde R2023a) |
CWE Rule
125 | Out-of-bounds Read (Desde R2023a) |
CWE Rule
126 | Buffer Over-read (Desde R2023a) |
CWE Rule
127 | Buffer Under-read (Desde R2023a) |
CWE Rule
128 | Wrap-around Error (Desde R2023a) |
CWE Rule
129 | Improper Validation of Array Index (Desde R2023a) |
CWE Rule
130 | Improper Handling of Length Parameter Inconsistency (Desde R2023a) |
CWE Rule
131 | Incorrect Calculation of Buffer Size (Desde R2023a) |
CWE Rule
134 | Use of Externally-Controlled Format String (Desde R2023a) |
CWE Rule
135 | Incorrect Calculation of Multi-Byte String Length (Desde R2023a) |
CWE Rule
170 | Improper Null Termination (Desde R2023a) |
CWE Rule
188 | Reliance on Data/Memory Layout (Desde R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (Desde R2024b) |
CWE Rule
191 | Integer Underflow (Wrap or Wraparound) (Desde R2023a) |
CWE Rule
192 | Integer Coercion Error (Desde R2023a) |
CWE Rule
194 | Unexpected Sign Extension (Desde R2023a) |
CWE Rule
195 | Signed to Unsigned Conversion Error (Desde R2023a) |
CWE Rule
196 | Unsigned to Signed Conversion Error (Desde R2023a) |
CWE Rule
197 | Numeric Truncation Error (Desde R2023a) |
CWE Rule
198 | Use of Incorrect Byte Ordering (Desde R2024a) |
CWE Rule
226 | Sensitive Information in Resource Not Removed Before Reuse (Desde R2024a) |
CWE Rule
240 | Improper Handling of Inconsistent Structural Elements (Desde R2024a) |
CWE Rule
242 | Use of Inherently Dangerous Function (Desde R2023a) |
CWE Rule
243 | Creation of chroot Jail Without Changing Working Directory (Desde R2023a) |
CWE Rule
244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (Desde R2023a) |
CWE Rule
248 | Uncaught Exception (Desde R2023a) |
CWE Rule
250 | Execution with Unnecessary Privileges (Desde R2024a) |
CWE Rule
252 | Unchecked Return Value (Desde R2023a) |
CWE Rule
253 | Incorrect Check of Function Return Value (Desde R2023a) |
CWE Rule
256 | Plaintext storage of a password (Desde R2023a) |
CWE Rule
273 | Improper Check for Dropped Privileges (Desde R2024a) |
CWE Rule
287 | Improper Authentication (Desde R2024a) |
CWE Rule
297 | Improper Validation of Certificate with Host Mismatch (Desde R2024a) |
CWE Rule
304 | Missing Critical Step in Authentication (Desde R2024a) |
CWE Rule
311 | Missing Encryption of Sensitive Data (Desde R2023b) |
CWE Rule
312 | Cleartext Storage of Sensitive Information (Desde R2023a) |
CWE Rule
316 | Cleartext Storage of Sensitive Information in Memory (Desde R2024a) |
CWE Rule
319 | Cleartext Transmission of Sensitive Information (Desde R2023b) |
CWE Rule
321 | Use of Hard-coded Cryptographic Key (Desde R2023b) |
CWE Rule
322 | Key Exchange without Entity Authentication (Desde R2024a) |
CWE Rule
325 | Missing Cryptographic Step (Desde R2024a) |
CWE Rule
326 | Inadequate Encryption Strength (Desde R2024a) |
CWE Rule
327 | Use of a Broken or Risky Cryptographic Algorithm (Desde R2024a) |
CWE Rule
328 | Use of Weak Hash (Desde R2024a) |
CWE Rule
329 | Generation of Predictable IV with CBC Mode (Desde R2024a) |
CWE Rule
330 | Use of Insufficiently Random Values (Desde R2024a) |
CWE Rule
335 | Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) (Desde R2023a) |
CWE Rule
336 | Same Seed in Pseudo-Random Number Generator (PRNG) (Desde R2024a) |
CWE Rule
337 | Predictable Seed in Pseudo-Random Number Generator (PRNG) (Desde R2024a) |
CWE Rule
338 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (Desde R2023a) |
CWE Rule
353 | Missing Support for Integrity Check (Desde R2023a) |
CWE Rule
354 | Improper Validation of Integrity Check Value (Desde R2024a) |
CWE Rule
362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (Desde R2023a) |
CWE Rule
364 | Signal Handler Race Condition (Desde R2023a) |
CWE Rule
366 | Race Condition within a Thread (Desde R2023a) |
CWE Rule
367 | Time-of-check Time-of-use (TOCTOU) Race Condition (Desde R2024a) |
CWE Rule
369 | Divide By Zero (Desde R2023a) |
CWE Rule
372 | Incomplete Internal State Distinction (Desde R2024a) |
CWE Rule
374 | Passing Mutable Objects to an Untrusted Method (Desde R2023b) |
CWE Rule
375 | Returning a Mutable Object to an Untrusted Caller (Desde R2023a) |
CWE Rule
377 | Insecure Temporary File (Desde R2024a) |
CWE Rule
391 | Unchecked Error Condition (Desde R2024a) |
CWE Rule
396 | Declaration of Catch for Generic Exception (Desde R2023a) |
CWE Rule
397 | Declaration of Throws for Generic Exception (Desde R2023a) |
CWE Rule
401 | Missing Release of Memory after Effective Lifetime (Desde R2023a) |
CWE Rule
404 | Improper Resource Shutdown or Release (Desde R2024a) |
CWE Rule
413 | Improper Resource Locking (Desde R2023a) |
CWE Rule
415 | Double Free (Desde R2023a) |
CWE Rule
416 | Use After Free (Desde R2023a) |
CWE Rule
426 | Untrusted Search Path (Desde R2024a) |
CWE Rule
427 | Uncontrolled Search Path Element (Desde R2024a) |
CWE Rule
456 | Missing Initialization of a Variable (Desde R2024a) |
CWE Rule
457 | Use of Uninitialized Variable (Desde R2023a) |
CWE Rule
460 | Improper Cleanup on Thrown Exception (Desde R2023a) |
CWE Rule
463 | Deletion of Data Structure Sentinel (Desde R2023a) |
CWE Rule
466 | Return of Pointer Value Outside of Expected Range (Desde R2023a) |
CWE Rule
467 | Use of sizeof() on a Pointer Type (Desde R2023a) |
CWE Rule
468 | Incorrect Pointer Scaling (Desde R2023a) |
CWE Rule
469 | Use of Pointer Subtraction to Determine Size (Desde R2023a) |
CWE Rule
471 | Modification of Assumed-Immutable Data (MAID) (Desde R2024a) |
CWE Rule
474 | Use of Function with Inconsistent Implementations (Desde R2023a) |
CWE Rule
475 | Undefined Behavior for Input to API (Desde R2024a) |
CWE Rule
476 | NULL Pointer Dereference (Desde R2023a) |
CWE Rule
477 | Use of Obsolete Function (Desde R2023a) |
CWE Rule
478 | Missing Default Case in Multiple Condition Expression (Desde R2023a) |
CWE Rule
479 | Signal Handler Use of a Non-reentrant Function (Desde R2023a) |
CWE Rule
480 | Use of Incorrect Operator (Desde R2023a) |
CWE Rule
481 | Assigning instead of Comparing (Desde R2023a) |
CWE Rule
482 | Comparing instead of Assigning (Desde R2023a) |
CWE Rule
483 | Incorrect Block Delimitation (Desde R2023a) |
CWE Rule
484 | Omitted Break Statement in Switch (Desde R2023a) |
CWE Rule
489 | Active Debug Code (Desde R2023a) |
CWE Rule
493 | Critical Public Variable Without Final Modifier (Desde R2023b) |
CWE Rule
495 | Private Data Structure Returned From A Public Method (Desde R2023a) |
CWE Rule
496 | Public Data Assigned to Private Array-Typed Field (Desde R2023b) |
CWE Rule
498 | Cloneable class containing sensitive information (Desde R2023b) |
CWE Rule
500 | Public Static Field Not Marked Final (Desde R2023a) |
CWE Rule
522 | Insufficiently Protected Credentials (Desde R2023a) |
CWE Rule
532 | Insertion of Sensitive Information into Log File (Desde R2024a) |
CWE Rule
535 | Exposure of Information Through Shell Error Message (Desde R2024a) |
CWE Rule
543 | Use of Singleton Pattern Without Synchronization in a Multithreaded Context (Desde R2024a) |
CWE Rule
547 | Use of Hard-coded, Security-relevant Constants (Desde R2023a) |
CWE Rule
558 | Use of getlogin() in Multithreaded Application (Desde R2023a) |
CWE Rule
560 | Use of umask() with chmod-style Argument (Desde R2023a) |
CWE Rule
561 | Dead Code (Desde R2023a) |
CWE Rule
562 | Return of Stack Variable Address (Desde R2023a) |
CWE Rule
563 | Assignment to Variable without Use (Desde R2023a) |
CWE Rule
570 | Expression is Always False (Desde R2023a) |
CWE Rule
571 | Expression is Always True (Desde R2023a) |
CWE Rule
573 | Improper Following of Specification by Caller (Desde R2024a) |
CWE Rule
587 | Assignment of a Fixed Address to a Pointer (Desde R2023a) |
CWE Rule
590 | Free of Memory not on the Heap (Desde R2024a) |
CWE Rule
606 | Unchecked Input for Loop Condition (Desde R2023b) |
CWE Rule
617 | Reachable Assertion (Desde R2023a) |
CWE Rule
628 | Function Call with Incorrectly Specified Arguments (Desde R2024a) |
CWE Rule
663 | Use of a Non-reentrant Function in a Concurrent Context (Desde R2024a) |
CWE Rule
664 | Improper Control of a Resource Through its Lifetime (Desde R2024a) |
CWE Rule
665 | Improper Initialization (Desde R2024a) |
CWE Rule
666 | Operation on Resource in Wrong Phase of Lifetime (Desde R2024a) |
CWE Rule
667 | Improper Locking (Desde R2024a) |
CWE Rule
672 | Operation on a Resource after Expiration or Release (Desde R2024a) |
CWE Rule
674 | Uncontrolled Recursion (Desde R2024a) |
CWE Rule
675 | Multiple Operations on Resource in Single-Operation Context (Desde R2024a) |
CWE Rule
676 | Use of Potentially Dangerous Function (Desde R2023a) |
CWE Rule
681 | Incorrect Conversion between Numeric Types (Desde R2024a) |
CWE Rule
682 | Incorrect Calculation (Desde R2024a) |
CWE Rule
683 | Function Call With Incorrect Order of Arguments (Desde R2023b) |
CWE Rule
685 | Function Call With Incorrect Number of Arguments (Desde R2023a) |
CWE Rule
686 | Function Call With Incorrect Argument Type (Desde R2023b) |
CWE Rule
687 | Function Call With Incorrectly Specified Argument Value (Desde R2023b) |
CWE Rule
688 | Function Call With Incorrect Variable or Reference as Argument (Desde R2023b) |
CWE Rule
690 | Unchecked Return Value to NULL Pointer Dereference (Desde R2023a) |
CWE Rule
691 | Insufficient Control Flow Management (Desde R2024a) |
CWE Rule
693 | Protection Mechanism Failure (Desde R2024a) |
CWE Rule
696 | Incorrect Behavior Order (Desde R2024a) |
CWE Rule
703 | Improper Check or Handling of Exceptional Conditions (Desde R2024a) |
CWE Rule
704 | Incorrect Type Conversion or Cast (Desde R2023a) |
CWE Rule
705 | Incorrect Control Flow Scoping (Desde R2024a) |
CWE Rule
710 | Improper Adherence to Coding Standards (Desde R2024a) |
CWE Rule
732 | Incorrect Permission Assignment for Critical Resource (Desde R2024a) |
CWE Rule
733 | Compiler Optimization Removal or Modification of Security-critical Code (Desde R2023a) |
CWE Rule
754 | Improper Check for Unusual or Exceptional Conditions (Desde R2024a) |
CWE Rule
755 | Improper Handling of Exceptional Conditions (Desde R2024a) |
CWE Rule
758 | Reliance on Undefined, Unspecified, or Implementation-Defined Behavior (Desde R2024a) |
CWE Rule
759 | Use of a One-Way Hash without a Salt (Desde R2024a) |
CWE Rule
762 | Mismatched Memory Management Routines (Desde R2023a) |
CWE Rule
763 | Release of Invalid Pointer or Reference (Desde R2023a) |
CWE Rule
764 | Multiple Locks of a Critical Resource (Desde R2024a) |
CWE Rule
765 | Multiple Unlocks of a Critical Resource (Desde R2024a) |
CWE Rule
766 | Critical Data Element Declared Public (Desde R2023a) |
CWE Rule
767 | Access to Critical Private Variable via Public Method (Desde R2023a) |
CWE Rule
770 | Allocation of Resources Without Limits or Throttling (Desde R2024a) |
CWE Rule
772 | Missing Release of Resource after Effective Lifetime (Desde R2024a) |
CWE Rule
780 | Use of RSA Algorithm without OAEP (Desde R2024a) |
CWE Rule
783 | Operator Precedence Logic Error (Desde R2023a) |
CWE Rule
785 | Use of Path Manipulation Function without Maximum-sized Buffer (Desde R2023a) |
CWE Rule
786 | Access of Memory Location Before Start of Buffer (Desde R2024a) |
CWE Rule
787 | Out-of-bounds Write (Desde R2023a) |
CWE Rule
789 | Memory Allocation with Excessive Size Value (Desde R2023a) |
CWE Rule
798 | Use of Hard-coded Credentials (Desde R2023a) |
CWE Rule
805 | Buffer Access with Incorrect Length Value (Desde R2023a) |
CWE Rule
806 | Buffer Access Using Size of Source Buffer (Desde R2023a) |
CWE Rule
822 | Untrusted Pointer Dereference (Desde R2023b) |
CWE Rule
823 | Use of Out-of-range Pointer Offset (Desde R2024a) |
CWE Rule
824 | Access of Uninitialized Pointer (Desde R2023a) |
CWE Rule
825 | Expired Pointer Dereference (Desde R2023a) |
CWE Rule
826 | Premature Release of Resource During Expected Lifetime (Desde R2024a) |
CWE Rule
828 | Signal Handler with Functionality that is not Asynchronous-Safe (Desde R2024a) |
CWE Rule
832 | Unlock of a Resource that is not Locked (Desde R2024a) |
CWE Rule
833 | Deadlock (Desde R2024a) |
CWE Rule
839 | Numeric Range Comparison Without Minimum Check (Desde R2023a) |
CWE Rule
843 | Access of Resource Using Incompatible Type ('Type Confusion') (Desde R2023a) |
CWE Rule
908 | Use of Uninitialized Resource (Desde R2024a) |
CWE Rule
910 | Use of Expired File Descriptor (Desde R2023a) |
CWE Rule
922 | Insecure Storage of Sensitive Information (Desde R2023a) |
CWE Rule
1071 | Empty code block (Desde R2023a) |
CWE Rule
1335 | Incorrect Bitwise Shift of Integer (Desde R2023a) |
CWE Rule
1341 | Multiple Releases of Same Resource or Handle (Desde R2023a) |
CWE-658
CWE Rule 14 | Compiler Removal of Code to Clear Buffers (Desde R2023a) |
CWE Rule 119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (Desde R2023a) |
CWE Rule 120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (Desde R2023a) |
CWE Rule 121 | Stack-based Buffer Overflow (Desde R2023a) |
CWE Rule 122 | Heap-based Buffer Overflow (Desde R2023a) |
CWE Rule 123 | Write-what-where Condition (Desde R2023a) |
CWE Rule 124 | Buffer Underwrite ('Buffer Underflow') (Desde R2023a) |
CWE Rule 125 | Out-of-bounds Read (Desde R2023a) |
CWE Rule 126 | Buffer Over-read (Desde R2023a) |
CWE Rule 127 | Buffer Under-read (Desde R2023a) |
CWE Rule 128 | Wrap-around Error (Desde R2023a) |
CWE Rule 129 | Improper Validation of Array Index (Desde R2023a) |
CWE Rule 130 | Improper Handling of Length Parameter Inconsistency (Desde R2023a) |
CWE Rule 131 | Incorrect Calculation of Buffer Size (Desde R2023a) |
CWE Rule 134 | Use of Externally-Controlled Format String (Desde R2023a) |
CWE Rule 135 | Incorrect Calculation of Multi-Byte String Length (Desde R2023a) |
CWE Rule 170 | Improper Null Termination (Desde R2023a) |
CWE Rule 188 | Reliance on Data/Memory Layout (Desde R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (Desde R2024b) |
CWE Rule 191 | Integer Underflow (Wrap or Wraparound) (Desde R2023a) |
CWE Rule 192 | Integer Coercion Error (Desde R2023a) |
CWE Rule 194 | Unexpected Sign Extension (Desde R2023a) |
CWE Rule 195 | Signed to Unsigned Conversion Error (Desde R2023a) |
CWE Rule 196 | Unsigned to Signed Conversion Error (Desde R2023a) |
CWE Rule 197 | Numeric Truncation Error (Desde R2023a) |
CWE Rule 242 | Use of Inherently Dangerous Function (Desde R2023a) |
CWE Rule 243 | Creation of chroot Jail Without Changing Working Directory (Desde R2023a) |
CWE Rule 244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (Desde R2023a) |
CWE Rule 362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (Desde R2023a) |
CWE Rule 364 | Signal Handler Race Condition (Desde R2023a) |
CWE Rule 366 | Race Condition within a Thread (Desde R2023a) |
CWE Rule 374 | Passing Mutable Objects to an Untrusted Method (Desde R2023b) |
CWE Rule 375 | Returning a Mutable Object to an Untrusted Caller (Desde R2023a) |
CWE Rule 401 | Missing Release of Memory after Effective Lifetime (Desde R2023a) |
CWE Rule 415 | Double Free (Desde R2023a) |
CWE Rule 416 | Use After Free (Desde R2023a) |
CWE Rule 457 | Use of Uninitialized Variable (Desde R2023a) |
CWE Rule 460 | Improper Cleanup on Thrown Exception (Desde R2023a) |
CWE Rule 463 | Deletion of Data Structure Sentinel (Desde R2023a) |
CWE Rule 466 | Return of Pointer Value Outside of Expected Range (Desde R2023a) |
CWE Rule 467 | Use of sizeof() on a Pointer Type (Desde R2023a) |
CWE Rule 468 | Incorrect Pointer Scaling (Desde R2023a) |
CWE Rule 469 | Use of Pointer Subtraction to Determine Size (Desde R2023a) |
CWE Rule 474 | Use of Function with Inconsistent Implementations (Desde R2023a) |
CWE Rule 476 | NULL Pointer Dereference (Desde R2023a) |
CWE Rule 478 | Missing Default Case in Multiple Condition Expression (Desde R2023a) |
CWE Rule 479 | Signal Handler Use of a Non-reentrant Function (Desde R2023a) |
CWE Rule 480 | Use of Incorrect Operator (Desde R2023a) |
CWE Rule 481 | Assigning instead of Comparing (Desde R2023a) |
CWE Rule 482 | Comparing instead of Assigning (Desde R2023a) |
CWE Rule 483 | Incorrect Block Delimitation (Desde R2023a) |
CWE Rule 484 | Omitted Break Statement in Switch (Desde R2023a) |
CWE Rule 495 | Private Data Structure Returned From A Public Method (Desde R2023a) |
CWE Rule 496 | Public Data Assigned to Private Array-Typed Field (Desde R2023b) |
CWE Rule 558 | Use of getlogin() in Multithreaded Application (Desde R2023a) |
CWE Rule 560 | Use of umask() with chmod-style Argument (Desde R2023a) |
CWE Rule 562 | Return of Stack Variable Address (Desde R2023a) |
CWE Rule 587 | Assignment of a Fixed Address to a Pointer (Desde R2023a) |
CWE Rule 676 | Use of Potentially Dangerous Function (Desde R2023a) |
CWE Rule 685 | Function Call With Incorrect Number of Arguments (Desde R2023a) |
CWE Rule 688 | Function Call With Incorrect Variable or Reference as Argument (Desde R2023b) |
CWE Rule 690 | Unchecked Return Value to NULL Pointer Dereference (Desde R2023a) |
CWE Rule 704 | Incorrect Type Conversion or Cast (Desde R2023a) |
CWE Rule 733 | Compiler Optimization Removal or Modification of Security-critical Code (Desde R2023a) |
CWE Rule 762 | Mismatched Memory Management Routines (Desde R2023a) |
CWE Rule 783 | Operator Precedence Logic Error (Desde R2023a) |
CWE Rule 785 | Use of Path Manipulation Function without Maximum-sized Buffer (Desde R2023a) |
CWE Rule 787 | Out-of-bounds Write (Desde R2023a) |
CWE Rule 789 | Memory Allocation with Excessive Size Value (Desde R2023a) |
CWE Rule 805 | Buffer Access with Incorrect Length Value (Desde R2023a) |
CWE Rule 806 | Buffer Access Using Size of Source Buffer (Desde R2023a) |
CWE Rule 839 | Numeric Range Comparison Without Minimum Check (Desde R2023a) |
CWE Rule 843 | Access of Resource Using Incompatible Type ('Type Confusion') (Desde R2023a) |
CWE Rule 910 | Use of Expired File Descriptor (Desde R2023a) |
CWE Rule 1335 | Incorrect Bitwise Shift of Integer (Desde R2023a) |
CWE Rule 1341 | Multiple Releases of Same Resource or Handle (Desde R2023a) |
CWE-659
CWE Rule 14 | Compiler Removal of Code to Clear Buffers (Desde R2023a) |
CWE Rule 119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (Desde R2023a) |
CWE Rule 120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (Desde R2023a) |
CWE Rule 121 | Stack-based Buffer Overflow (Desde R2023a) |
CWE Rule 122 | Heap-based Buffer Overflow (Desde R2023a) |
CWE Rule 123 | Write-what-where Condition (Desde R2023a) |
CWE Rule 124 | Buffer Underwrite ('Buffer Underflow') (Desde R2023a) |
CWE Rule 125 | Out-of-bounds Read (Desde R2023a) |
CWE Rule 126 | Buffer Over-read (Desde R2023a) |
CWE Rule 127 | Buffer Under-read (Desde R2023a) |
CWE Rule 128 | Wrap-around Error (Desde R2023a) |
CWE Rule 129 | Improper Validation of Array Index (Desde R2023a) |
CWE Rule 130 | Improper Handling of Length Parameter Inconsistency (Desde R2023a) |
CWE Rule 131 | Incorrect Calculation of Buffer Size (Desde R2023a) |
CWE Rule 134 | Use of Externally-Controlled Format String (Desde R2023a) |
CWE Rule 135 | Incorrect Calculation of Multi-Byte String Length (Desde R2023a) |
CWE Rule 170 | Improper Null Termination (Desde R2023a) |
CWE Rule 188 | Reliance on Data/Memory Layout (Desde R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (Desde R2024b) |
CWE Rule 191 | Integer Underflow (Wrap or Wraparound) (Desde R2023a) |
CWE Rule 192 | Integer Coercion Error (Desde R2023a) |
CWE Rule 194 | Unexpected Sign Extension (Desde R2023a) |
CWE Rule 195 | Signed to Unsigned Conversion Error (Desde R2023a) |
CWE Rule 196 | Unsigned to Signed Conversion Error (Desde R2023a) |
CWE Rule 197 | Numeric Truncation Error (Desde R2023a) |
CWE Rule 242 | Use of Inherently Dangerous Function (Desde R2023a) |
CWE Rule 243 | Creation of chroot Jail Without Changing Working Directory (Desde R2023a) |
CWE Rule 244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (Desde R2023a) |
CWE Rule 248 | Uncaught Exception (Desde R2023a) |
CWE Rule 362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (Desde R2023a) |
CWE Rule 364 | Signal Handler Race Condition (Desde R2023a) |
CWE Rule 366 | Race Condition within a Thread (Desde R2023a) |
CWE Rule 374 | Passing Mutable Objects to an Untrusted Method (Desde R2023b) |
CWE Rule 375 | Returning a Mutable Object to an Untrusted Caller (Desde R2023a) |
CWE Rule 396 | Declaration of Catch for Generic Exception (Desde R2023a) |
CWE Rule 397 | Declaration of Throws for Generic Exception (Desde R2023a) |
CWE Rule 401 | Missing Release of Memory after Effective Lifetime (Desde R2023a) |
CWE Rule 415 | Double Free (Desde R2023a) |
CWE Rule 416 | Use After Free (Desde R2023a) |
CWE Rule 457 | Use of Uninitialized Variable (Desde R2023a) |
CWE Rule 460 | Improper Cleanup on Thrown Exception (Desde R2023a) |
CWE Rule 463 | Deletion of Data Structure Sentinel (Desde R2023a) |
CWE Rule 466 | Return of Pointer Value Outside of Expected Range (Desde R2023a) |
CWE Rule 467 | Use of sizeof() on a Pointer Type (Desde R2023a) |
CWE Rule 468 | Incorrect Pointer Scaling (Desde R2023a) |
CWE Rule 469 | Use of Pointer Subtraction to Determine Size (Desde R2023a) |
CWE Rule 476 | NULL Pointer Dereference (Desde R2023a) |
CWE Rule 478 | Missing Default Case in Multiple Condition Expression (Desde R2023a) |
CWE Rule 479 | Signal Handler Use of a Non-reentrant Function (Desde R2023a) |
CWE Rule 480 | Use of Incorrect Operator (Desde R2023a) |
CWE Rule 481 | Assigning instead of Comparing (Desde R2023a) |
CWE Rule 482 | Comparing instead of Assigning (Desde R2023a) |
CWE Rule 483 | Incorrect Block Delimitation (Desde R2023a) |
CWE Rule 484 | Omitted Break Statement in Switch (Desde R2023a) |
CWE Rule 493 | Critical Public Variable Without Final Modifier (Desde R2023b) |
CWE Rule 495 | Private Data Structure Returned From A Public Method (Desde R2023a) |
CWE Rule 496 | Public Data Assigned to Private Array-Typed Field (Desde R2023b) |
CWE Rule 498 | Cloneable class containing sensitive information (Desde R2023b) |
CWE Rule 500 | Public Static Field Not Marked Final (Desde R2023a) |
CWE Rule 543 | Use of Singleton Pattern Without Synchronization in a Multithreaded Context (Desde R2024a) |
CWE Rule 558 | Use of getlogin() in Multithreaded Application (Desde R2023a) |
CWE Rule 562 | Return of Stack Variable Address (Desde R2023a) |
CWE Rule 587 | Assignment of a Fixed Address to a Pointer (Desde R2023a) |
CWE Rule 676 | Use of Potentially Dangerous Function (Desde R2023a) |
CWE Rule 690 | Unchecked Return Value to NULL Pointer Dereference (Desde R2023a) |
CWE Rule 704 | Incorrect Type Conversion or Cast (Desde R2023a) |
CWE Rule 733 | Compiler Optimization Removal or Modification of Security-critical Code (Desde R2023a) |
CWE Rule 762 | Mismatched Memory Management Routines (Desde R2023a) |
CWE Rule 766 | Critical Data Element Declared Public (Desde R2023a) |
CWE Rule 767 | Access to Critical Private Variable via Public Method (Desde R2023a) |
CWE Rule 783 | Operator Precedence Logic Error (Desde R2023a) |
CWE Rule 785 | Use of Path Manipulation Function without Maximum-sized Buffer (Desde R2023a) |
CWE Rule 787 | Out-of-bounds Write (Desde R2023a) |
CWE Rule 789 | Memory Allocation with Excessive Size Value (Desde R2023a) |
CWE Rule 805 | Buffer Access with Incorrect Length Value (Desde R2023a) |
CWE Rule 806 | Buffer Access Using Size of Source Buffer (Desde R2023a) |
CWE Rule 839 | Numeric Range Comparison Without Minimum Check (Desde R2023a) |
CWE Rule 843 | Access of Resource Using Incompatible Type ('Type Confusion') (Desde R2023a) |
CWE Rule 910 | Use of Expired File Descriptor (Desde R2023a) |
CWE Rule 1335 | Incorrect Bitwise Shift of Integer (Desde R2023a) |
CWE Rule 1341 | Multiple Releases of Same Resource or Handle (Desde R2023a) |
API/Funciones de error
CWE Rule 242 | Use of Inherently Dangerous Function (Desde R2023a) |
CWE Rule 474 | Use of Function with Inconsistent Implementations (Desde R2023a) |
CWE Rule 475 | Undefined Behavior for Input to API (Desde R2024a) |
CWE Rule 477 | Use of Obsolete Function (Desde R2023a) |
CWE Rule 676 | Use of Potentially Dangerous Function (Desde R2023a) |
Malas prácticas de codificación
CWE Rule 478 | Missing Default Case in Multiple Condition Expression (Desde R2023a) |
CWE Rule 489 | Active Debug Code (Desde R2023a) |
CWE Rule 547 | Use of Hard-coded, Security-relevant Constants (Desde R2023a) |
CWE Rule 561 | Dead Code (Desde R2023a) |
CWE Rule 562 | Return of Stack Variable Address (Desde R2023a) |
CWE Rule 563 | Assignment to Variable without Use (Desde R2023a) |
CWE Rule 628 | Function Call with Incorrectly Specified Arguments (Desde R2024a) |
CWE Rule 1071 | Empty code block (Desde R2023a) |
Problemas de comportamiento
CWE Rule 480 | Use of Incorrect Operator (Desde R2023a) |
CWE Rule 483 | Incorrect Block Delimitation (Desde R2023a) |
CWE Rule 484 | Omitted Break Statement in Switch (Desde R2023a) |
CWE Rule 733 | Compiler Optimization Removal or Modification of Security-critical Code (Desde R2023a) |
CWE Rule 783 | Operator Precedence Logic Error (Desde R2023a) |
Problemas de simultaneidad
CWE Rule 366 | Race Condition within a Thread (Desde R2023a) |
CWE Rule 367 | Time-of-check Time-of-use (TOCTOU) Race Condition (Desde R2024a) |
CWE Rule 663 | Use of a Non-reentrant Function in a Concurrent Context (Desde R2024a) |
Errores de gestión de credenciales
CWE Rule
798 | Use of Hard-coded Credentials (Desde R2023a) |
CWE Rule
256 | Plaintext storage of a password (Desde R2023a) |
Problemas criptográficos
CWE Rule 325 | Missing Cryptographic Step (Desde R2024a) |
CWE Rule 328 | Use of Weak Hash (Desde R2024a) |
Problemas de integridad de datos
CWE Rule 353 | Missing Support for Integrity Check (Desde R2023a) |
CWE Rule 354 | Improper Validation of Integrity Check Value (Desde R2024a) |
Problemas de neutralización de datos
CWE Rule
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (Desde R2024a) |
CWE Rule
88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (Desde R2024a) |
CWE Rule
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Desde R2023a) |
CWE Rule
90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') (Desde R2023a) |
CWE Rule
170 | Improper Null Termination (Desde R2023a) |
CWE Rule
188 | Reliance on Data/Memory Layout (Desde R2023a) |
CWE Rule
463 | Deletion of Data Structure Sentinel (Desde R2023a) |
Errores de procesamiento de datos
CWE Rule 130 | Improper Handling of Length Parameter Inconsistency (Desde R2023a) |
Problemas de validación de datos
CWE Rule 129 | Improper Validation of Array Index (Desde R2023a) |
CWE Rule 606 | Unchecked Input for Loop Condition (Desde R2023b) |
Condiciones de error, valores de retorno y códigos de estado
CWE Rule 248 | Uncaught Exception (Desde R2023a) |
CWE Rule 252 | Unchecked Return Value (Desde R2023a) |
CWE Rule 253 | Incorrect Check of Function Return Value (Desde R2023a) |
CWE Rule 391 | Unchecked Error Condition (Desde R2024a) |
CWE Rule 396 | Declaration of Catch for Generic Exception (Desde R2023a) |
CWE Rule 397 | Declaration of Throws for Generic Exception (Desde R2023a) |
CWE Rule 617 | Reachable Assertion (Desde R2023a) |
Problemas de expresión
CWE Rule 570 | Expression is Always False (Desde R2023a) |
CWE Rule 571 | Expression is Always True (Desde R2023a) |
Problemas de gestión de archivos
CWE Rule 22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (Desde R2024a) |
CWE Rule 426 | Untrusted Search Path (Desde R2024a) |
CWE Rule 427 | Uncontrolled Search Path Element (Desde R2024a) |
Errores en identificadores
CWE Rule 479 | Signal Handler Use of a Non-reentrant Function (Desde R2023a) |
Errores en la gestión de la información
CWE Rule 312 | Cleartext Storage of Sensitive Information (Desde R2023a) |
CWE Rule 319 | Cleartext Transmission of Sensitive Information (Desde R2023b) |
CWE Rule 321 | Use of Hard-coded Cryptographic Key (Desde R2023b) |
Errores de inicialización y limpieza
CWE Rule 460 | Improper Cleanup on Thrown Exception (Desde R2023a) |
Errores de gestión de claves
CWE Rule 322 | Key Exchange without Entity Authentication (Desde R2024a) |
Errores de buffer de memoria
CWE Rule 120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (Desde R2023a) |
CWE Rule 123 | Write-what-where Condition (Desde R2023a) |
CWE Rule 124 | Buffer Underwrite ('Buffer Underflow') (Desde R2023a) |
CWE Rule 125 | Out-of-bounds Read (Desde R2023a) |
CWE Rule 131 | Incorrect Calculation of Buffer Size (Desde R2023a) |
CWE Rule 786 | Access of Memory Location Before Start of Buffer (Desde R2024a) |
CWE Rule 787 | Out-of-bounds Write (Desde R2023a) |
CWE Rule 805 | Buffer Access with Incorrect Length Value (Desde R2023a) |
Errores numéricos
CWE Rule 128 | Wrap-around Error (Desde R2023a) |
CWE Rule 191 | Integer Underflow (Wrap or Wraparound) (Desde R2023a) |
CWE Rule 192 | Integer Coercion Error (Desde R2023a) |
CWE Rule 197 | Numeric Truncation Error (Desde R2023a) |
CWE Rule 369 | Divide By Zero (Desde R2023a) |
CWE Rule 681 | Incorrect Conversion between Numeric Types (Desde R2024a) |
CWE Rule 839 | Numeric Range Comparison Without Minimum Check (Desde R2023a) |
Validar entrada
CWE Rule
20 | Improper Input Validation (Desde R2024a) |
CWE Rule
77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') (Desde R2024a) |
CWE Rule
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (Desde R2024a) |
CWE Rule
88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (Desde R2024a) |
CWE Rule
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Desde R2023a) |
CWE Rule
90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') (Desde R2023a) |
CWE Rule
99 | Improper Control of Resource Identifiers ('Resource Injection') (Desde R2024b) |
Otros
CWE Rule 14 | Compiler Removal of Code to Clear Buffers (Desde R2023a) |
CWE Rule 20 | Improper Input Validation (Desde R2024a) |
CWE Rule 23 | Relative Path Traversal (Desde R2024a) |
CWE Rule 36 | Absolute Path Traversal (Desde R2024a) |
CWE Rule 67 | Improper Handling of Windows Device Names (Desde R2024a) |
CWE Rule 77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') (Desde R2024a) |
CWE Rule 88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (Desde R2024a) |
CWE Rule 114 | Process Control (Desde R2024a) |
CWE Rule 119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (Desde R2023a) |
CWE Rule 121 | Stack-based Buffer Overflow (Desde R2023a) |
CWE Rule 122 | Heap-based Buffer Overflow (Desde R2023a) |
CWE Rule 126 | Buffer Over-read (Desde R2023a) |
CWE Rule 127 | Buffer Under-read (Desde R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (Desde R2024b) |
CWE Rule 194 | Unexpected Sign Extension (Desde R2023a) |
CWE Rule 195 | Signed to Unsigned Conversion Error (Desde R2023a) |
CWE Rule 196 | Unsigned to Signed Conversion Error (Desde R2023a) |
CWE Rule 198 | Use of Incorrect Byte Ordering (Desde R2024a) |
CWE Rule 226 | Sensitive Information in Resource Not Removed Before Reuse (Desde R2024a) |
CWE Rule 240 | Improper Handling of Inconsistent Structural Elements (Desde R2024a) |
CWE Rule 244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (Desde R2023a) |
CWE Rule 287 | Improper Authentication (Desde R2024a) |
CWE Rule 297 | Improper Validation of Certificate with Host Mismatch (Desde R2024a) |
CWE Rule 304 | Missing Critical Step in Authentication (Desde R2024a) |
CWE Rule 311 | Missing Encryption of Sensitive Data (Desde R2023b) |
CWE Rule 316 | Cleartext Storage of Sensitive Information in Memory (Desde R2024a) |
CWE Rule 326 | Inadequate Encryption Strength (Desde R2024a) |
CWE Rule 327 | Use of a Broken or Risky Cryptographic Algorithm (Desde R2024a) |
CWE Rule 329 | Generation of Predictable IV with CBC Mode (Desde R2024a) |
CWE Rule 330 | Use of Insufficiently Random Values (Desde R2024a) |
CWE Rule 336 | Same Seed in Pseudo-Random Number Generator (PRNG) (Desde R2024a) |
CWE Rule 337 | Predictable Seed in Pseudo-Random Number Generator (PRNG) (Desde R2024a) |
CWE Rule 362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (Desde R2023a) |
CWE Rule 377 | Insecure Temporary File (Desde R2024a) |
CWE Rule 401 | Missing Release of Memory after Effective Lifetime (Desde R2023a) |
CWE Rule 404 | Improper Resource Shutdown or Release (Desde R2024a) |
CWE Rule 415 | Double Free (Desde R2023a) |
CWE Rule 416 | Use After Free (Desde R2023a) |
CWE Rule 456 | Missing Initialization of a Variable (Desde R2024a) |
CWE Rule 457 | Use of Uninitialized Variable (Desde R2023a) |
CWE Rule 471 | Modification of Assumed-Immutable Data (MAID) (Desde R2024a) |
CWE Rule 481 | Assigning instead of Comparing (Desde R2023a) |
CWE Rule 482 | Comparing instead of Assigning (Desde R2023a) |
CWE Rule 493 | Critical Public Variable Without Final Modifier (Desde R2023b) |
CWE Rule 495 | Private Data Structure Returned From A Public Method (Desde R2023a) |
CWE Rule 496 | Public Data Assigned to Private Array-Typed Field (Desde R2023b) |
CWE Rule 498 | Cloneable class containing sensitive information (Desde R2023b) |
CWE Rule 500 | Public Static Field Not Marked Final (Desde R2023a) |
CWE Rule 522 | Insufficiently Protected Credentials (Desde R2023a) |
CWE Rule 532 | Insertion of Sensitive Information into Log File (Desde R2024a) |
CWE Rule 535 | Exposure of Information Through Shell Error Message (Desde R2024a) |
CWE Rule 543 | Use of Singleton Pattern Without Synchronization in a Multithreaded Context (Desde R2024a) |
CWE Rule 558 | Use of getlogin() in Multithreaded Application (Desde R2023a) |
CWE Rule 560 | Use of umask() with chmod-style Argument (Desde R2023a) |
CWE Rule 573 | Improper Following of Specification by Caller (Desde R2024a) |
CWE Rule 590 | Free of Memory not on the Heap (Desde R2024a) |
CWE Rule 664 | Improper Control of a Resource Through its Lifetime (Desde R2024a) |
CWE Rule 665 | Improper Initialization (Desde R2024a) |
CWE Rule 666 | Operation on Resource in Wrong Phase of Lifetime (Desde R2024a) |
CWE Rule 667 | Improper Locking (Desde R2024a) |
CWE Rule 672 | Operation on a Resource after Expiration or Release (Desde R2024a) |
CWE Rule 674 | Uncontrolled Recursion (Desde R2024a) |
CWE Rule 675 | Multiple Operations on Resource in Single-Operation Context (Desde R2024a) |
CWE Rule 682 | Incorrect Calculation (Desde R2024a) |
CWE Rule 683 | Function Call With Incorrect Order of Arguments (Desde R2023b) |
CWE Rule 685 | Function Call With Incorrect Number of Arguments (Desde R2023a) |
CWE Rule 686 | Function Call With Incorrect Argument Type (Desde R2023b) |
CWE Rule 687 | Function Call With Incorrectly Specified Argument Value (Desde R2023b) |
CWE Rule 688 | Function Call With Incorrect Variable or Reference as Argument (Desde R2023b) |
CWE Rule 690 | Unchecked Return Value to NULL Pointer Dereference (Desde R2023a) |
CWE Rule 691 | Insufficient Control Flow Management (Desde R2024a) |
CWE Rule 693 | Protection Mechanism Failure (Desde R2024a) |
CWE Rule 696 | Incorrect Behavior Order (Desde R2024a) |
CWE Rule 703 | Improper Check or Handling of Exceptional Conditions (Desde R2024a) |
CWE Rule 704 | Incorrect Type Conversion or Cast (Desde R2023a) |
CWE Rule 705 | Incorrect Control Flow Scoping (Desde R2024a) |
CWE Rule 710 | Improper Adherence to Coding Standards (Desde R2024a) |
CWE Rule 732 | Incorrect Permission Assignment for Critical Resource (Desde R2024a) |
CWE Rule 754 | Improper Check for Unusual or Exceptional Conditions (Desde R2024a) |
CWE Rule 755 | Improper Handling of Exceptional Conditions (Desde R2024a) |
CWE Rule 758 | Reliance on Undefined, Unspecified, or Implementation-Defined Behavior (Desde R2024a) |
CWE Rule 759 | Use of a One-Way Hash without a Salt (Desde R2024a) |
CWE Rule 762 | Mismatched Memory Management Routines (Desde R2023a) |
CWE Rule 780 | Use of RSA Algorithm without OAEP (Desde R2024a) |
CWE Rule 785 | Use of Path Manipulation Function without Maximum-sized Buffer (Desde R2023a) |
CWE Rule 789 | Memory Allocation with Excessive Size Value (Desde R2023a) |
CWE Rule 806 | Buffer Access Using Size of Source Buffer (Desde R2023a) |
CWE Rule 828 | Signal Handler with Functionality that is not Asynchronous-Safe (Desde R2024a) |
CWE Rule 922 | Insecure Storage of Sensitive Information (Desde R2023a) |
CWE Rule 1335 | Incorrect Bitwise Shift of Integer (Desde R2023a) |
CWE Rule 1341 | Multiple Releases of Same Resource or Handle (Desde R2023a) |
Problemas de permisos
CWE Rule 766 | Critical Data Element Declared Public (Desde R2023a) |
CWE Rule 767 | Access to Critical Private Variable via Public Method (Desde R2023a) |
Problemas con los punteros
CWE Rule 466 | Return of Pointer Value Outside of Expected Range (Desde R2023a) |
CWE Rule 467 | Use of sizeof() on a Pointer Type (Desde R2023a) |
CWE Rule 468 | Incorrect Pointer Scaling (Desde R2023a) |
CWE Rule 469 | Use of Pointer Subtraction to Determine Size (Desde R2023a) |
CWE Rule 476 | NULL Pointer Dereference (Desde R2023a) |
CWE Rule 587 | Assignment of a Fixed Address to a Pointer (Desde R2023a) |
CWE Rule 763 | Release of Invalid Pointer or Reference (Desde R2023a) |
CWE Rule 822 | Untrusted Pointer Dereference (Desde R2023b) |
CWE Rule 823 | Use of Out-of-range Pointer Offset (Desde R2024a) |
CWE Rule 824 | Access of Uninitialized Pointer (Desde R2023a) |
CWE Rule 825 | Expired Pointer Dereference (Desde R2023a) |
Problemas de privilegios
CWE Rule 243 | Creation of chroot Jail Without Changing Working Directory (Desde R2023a) |
CWE Rule 250 | Execution with Unnecessary Privileges (Desde R2024a) |
CWE Rule 273 | Improper Check for Dropped Privileges (Desde R2024a) |
Problemas con números aleatorios
CWE Rule 335 | Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) (Desde R2023a) |
CWE Rule 338 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (Desde R2023a) |
Problemas de bloqueo de recursos
CWE Rule 413 | Improper Resource Locking (Desde R2023a) |
CWE Rule 764 | Multiple Locks of a Critical Resource (Desde R2024a) |
CWE Rule 765 | Multiple Unlocks of a Critical Resource (Desde R2024a) |
CWE Rule 832 | Unlock of a Resource that is not Locked (Desde R2024a) |
CWE Rule 833 | Deadlock (Desde R2024a) |
Errores de gestión de recursos
CWE Rule 770 | Allocation of Resources Without Limits or Throttling (Desde R2024a) |
CWE Rule 772 | Missing Release of Resource after Effective Lifetime (Desde R2024a) |
CWE Rule 826 | Premature Release of Resource During Expected Lifetime (Desde R2024a) |
CWE Rule 908 | Use of Uninitialized Resource (Desde R2024a) |
CWE Rule 910 | Use of Expired File Descriptor (Desde R2023a) |
Errores de señal
CWE Rule 364 | Signal Handler Race Condition (Desde R2023a) |
Errores de estado
CWE Rule 15 | External Control of System or Configuration Setting (Desde R2024a) |
CWE Rule 372 | Incomplete Internal State Distinction (Desde R2024a) |
CWE Rule 374 | Passing Mutable Objects to an Untrusted Method (Desde R2023b) |
CWE Rule 375 | Returning a Mutable Object to an Untrusted Caller (Desde R2023a) |
Errores de cadenas
CWE Rule 134 | Use of Externally-Controlled Format String (Desde R2023a) |
CWE Rule 135 | Incorrect Calculation of Multi-Byte String Length (Desde R2023a) |
Errores de tipo
CWE Rule 843 | Access of Resource Using Incompatible Type ('Type Confusion') (Desde R2023a) |
Temas
- CWE Coding Standard Coverage Using Polyspace
Group CWE results by category and view list of
all-exact-checkers
. - Polyspace Support for Coding Standards
Check the Polyspace support for different coding standards.
- Check for and Review Coding Standard Violations
Check for violations of AUTOSAR C++14, CERT® C, CERT C++, CWE, MISRA C™, MISRA™ C++, JSF AV C++, or ISO-17961 standards with Polyspace Bug Finder.
MATLAB Command
You clicked a link that corresponds to this MATLAB command:
Run the command by entering it in the MATLAB Command Window. Web browsers do not support MATLAB commands.
Seleccione un país/idioma
Seleccione un país/idioma para obtener contenido traducido, si está disponible, y ver eventos y ofertas de productos y servicios locales. Según su ubicación geográfica, recomendamos que seleccione: .
También puede seleccionar uno de estos países/idiomas:
Cómo obtener el mejor rendimiento
Seleccione China (en idioma chino o inglés) para obtener el mejor rendimiento. Los sitios web de otros países no están optimizados para ser accedidos desde su ubicación geográfica.
América
- América Latina (Español)
- Canada (English)
- United States (English)
Europa
- Belgium (English)
- Denmark (English)
- Deutschland (Deutsch)
- España (Español)
- Finland (English)
- France (Français)
- Ireland (English)
- Italia (Italiano)
- Luxembourg (English)
- Netherlands (English)
- Norway (English)
- Österreich (Deutsch)
- Portugal (English)
- Sweden (English)
- Switzerland
- United Kingdom (English)