Énumération des faiblesses communes (CWE)
L'énumération des faiblesses communes (CWE™) répertorie les types de faiblesses logicielles qui peuvent apparaître dans l'architecture, le design, le code ou l‘implémentation des logiciels. Ces faiblesses peuvent conduire à des vulnérabilités de sécurité.
Polyspace peut vérifier votre code par rapport à des sous-ensembles de la liste CWE, y compris des sous-ensembles ou des faiblesses propres au code C ou C++. Pour activer des sous-ensembles de la liste CWE, utilisez l'option d'analyse Check CWE (-cwe)
. Polyspace supporte la version 4.12 de la norme CWE.
Résultats Polyspace
CWE Rule
14 | Compiler Removal of Code to Clear Buffers (depuis R2023a) |
CWE Rule
15 | External Control of System or Configuration Setting (depuis R2024a) |
CWE Rule
20 | Improper Input Validation (depuis R2024a) |
CWE Rule
22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (depuis R2024a) |
CWE Rule
23 | Relative Path Traversal (depuis R2024a) |
CWE Rule
36 | Absolute Path Traversal (depuis R2024a) |
CWE Rule
67 | Improper Handling of Windows Device Names (depuis R2024a) |
CWE Rule
77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') (depuis R2024a) |
CWE Rule
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (depuis R2024a) |
CWE Rule
88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (depuis R2024a) |
CWE Rule
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (depuis R2023a) |
CWE Rule
90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') (depuis R2023a) |
CWE Rule
99 | Improper Control of Resource Identifiers ('Resource Injection') (depuis R2024b) |
CWE Rule
114 | Process Control (depuis R2024a) |
CWE Rule
119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (depuis R2023a) |
CWE Rule
120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (depuis R2023a) |
CWE Rule
121 | Stack-based Buffer Overflow (depuis R2023a) |
CWE Rule
122 | Heap-based Buffer Overflow (depuis R2023a) |
CWE Rule
123 | Write-what-where Condition (depuis R2023a) |
CWE Rule
124 | Buffer Underwrite ('Buffer Underflow') (depuis R2023a) |
CWE Rule
125 | Out-of-bounds Read (depuis R2023a) |
CWE Rule
126 | Buffer Over-read (depuis R2023a) |
CWE Rule
127 | Buffer Under-read (depuis R2023a) |
CWE Rule
128 | Wrap-around Error (depuis R2023a) |
CWE Rule
129 | Improper Validation of Array Index (depuis R2023a) |
CWE Rule
130 | Improper Handling of Length Parameter Inconsistency (depuis R2023a) |
CWE Rule
131 | Incorrect Calculation of Buffer Size (depuis R2023a) |
CWE Rule
134 | Use of Externally-Controlled Format String (depuis R2023a) |
CWE Rule
135 | Incorrect Calculation of Multi-Byte String Length (depuis R2023a) |
CWE Rule
170 | Improper Null Termination (depuis R2023a) |
CWE Rule
188 | Reliance on Data/Memory Layout (depuis R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (depuis R2024b) |
CWE Rule
191 | Integer Underflow (Wrap or Wraparound) (depuis R2023a) |
CWE Rule
192 | Integer Coercion Error (depuis R2023a) |
CWE Rule
194 | Unexpected Sign Extension (depuis R2023a) |
CWE Rule
195 | Signed to Unsigned Conversion Error (depuis R2023a) |
CWE Rule
196 | Unsigned to Signed Conversion Error (depuis R2023a) |
CWE Rule
197 | Numeric Truncation Error (depuis R2023a) |
CWE Rule
198 | Use of Incorrect Byte Ordering (depuis R2024a) |
CWE Rule
226 | Sensitive Information in Resource Not Removed Before Reuse (depuis R2024a) |
CWE Rule
240 | Improper Handling of Inconsistent Structural Elements (depuis R2024a) |
CWE Rule
242 | Use of Inherently Dangerous Function (depuis R2023a) |
CWE Rule
243 | Creation of chroot Jail Without Changing Working Directory (depuis R2023a) |
CWE Rule
244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (depuis R2023a) |
CWE Rule
248 | Uncaught Exception (depuis R2023a) |
CWE Rule
250 | Execution with Unnecessary Privileges (depuis R2024a) |
CWE Rule
252 | Unchecked Return Value (depuis R2023a) |
CWE Rule
253 | Incorrect Check of Function Return Value (depuis R2023a) |
CWE Rule
256 | Plaintext storage of a password (depuis R2023a) |
CWE Rule
273 | Improper Check for Dropped Privileges (depuis R2024a) |
CWE Rule
287 | Improper Authentication (depuis R2024a) |
CWE Rule
297 | Improper Validation of Certificate with Host Mismatch (depuis R2024a) |
CWE Rule
304 | Missing Critical Step in Authentication (depuis R2024a) |
CWE Rule
311 | Missing Encryption of Sensitive Data (depuis R2023b) |
CWE Rule
312 | Cleartext Storage of Sensitive Information (depuis R2023a) |
CWE Rule
316 | Cleartext Storage of Sensitive Information in Memory (depuis R2024a) |
CWE Rule
319 | Cleartext Transmission of Sensitive Information (depuis R2023b) |
CWE Rule
321 | Use of Hard-coded Cryptographic Key (depuis R2023b) |
CWE Rule
322 | Key Exchange without Entity Authentication (depuis R2024a) |
CWE Rule
325 | Missing Cryptographic Step (depuis R2024a) |
CWE Rule
326 | Inadequate Encryption Strength (depuis R2024a) |
CWE Rule
327 | Use of a Broken or Risky Cryptographic Algorithm (depuis R2024a) |
CWE Rule
328 | Use of Weak Hash (depuis R2024a) |
CWE Rule
329 | Generation of Predictable IV with CBC Mode (depuis R2024a) |
CWE Rule
330 | Use of Insufficiently Random Values (depuis R2024a) |
CWE Rule
335 | Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) (depuis R2023a) |
CWE Rule
336 | Same Seed in Pseudo-Random Number Generator (PRNG) (depuis R2024a) |
CWE Rule
337 | Predictable Seed in Pseudo-Random Number Generator (PRNG) (depuis R2024a) |
CWE Rule
338 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (depuis R2023a) |
CWE Rule
353 | Missing Support for Integrity Check (depuis R2023a) |
CWE Rule
354 | Improper Validation of Integrity Check Value (depuis R2024a) |
CWE Rule
362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (depuis R2023a) |
CWE Rule
364 | Signal Handler Race Condition (depuis R2023a) |
CWE Rule
366 | Race Condition within a Thread (depuis R2023a) |
CWE Rule
367 | Time-of-check Time-of-use (TOCTOU) Race Condition (depuis R2024a) |
CWE Rule
369 | Divide By Zero (depuis R2023a) |
CWE Rule
372 | Incomplete Internal State Distinction (depuis R2024a) |
CWE Rule
374 | Passing Mutable Objects to an Untrusted Method (depuis R2023b) |
CWE Rule
375 | Returning a Mutable Object to an Untrusted Caller (depuis R2023a) |
CWE Rule
377 | Insecure Temporary File (depuis R2024a) |
CWE Rule
391 | Unchecked Error Condition (depuis R2024a) |
CWE Rule
396 | Declaration of Catch for Generic Exception (depuis R2023a) |
CWE Rule
397 | Declaration of Throws for Generic Exception (depuis R2023a) |
CWE Rule
401 | Missing Release of Memory after Effective Lifetime (depuis R2023a) |
CWE Rule
404 | Improper Resource Shutdown or Release (depuis R2024a) |
CWE Rule
413 | Improper Resource Locking (depuis R2023a) |
CWE Rule
415 | Double Free (depuis R2023a) |
CWE Rule
416 | Use After Free (depuis R2023a) |
CWE Rule
426 | Untrusted Search Path (depuis R2024a) |
CWE Rule
427 | Uncontrolled Search Path Element (depuis R2024a) |
CWE Rule
456 | Missing Initialization of a Variable (depuis R2024a) |
CWE Rule
457 | Use of Uninitialized Variable (depuis R2023a) |
CWE Rule
460 | Improper Cleanup on Thrown Exception (depuis R2023a) |
CWE Rule
463 | Deletion of Data Structure Sentinel (depuis R2023a) |
CWE Rule
466 | Return of Pointer Value Outside of Expected Range (depuis R2023a) |
CWE Rule
467 | Use of sizeof() on a Pointer Type (depuis R2023a) |
CWE Rule
468 | Incorrect Pointer Scaling (depuis R2023a) |
CWE Rule
469 | Use of Pointer Subtraction to Determine Size (depuis R2023a) |
CWE Rule
471 | Modification of Assumed-Immutable Data (MAID) (depuis R2024a) |
CWE Rule
474 | Use of Function with Inconsistent Implementations (depuis R2023a) |
CWE Rule
475 | Undefined Behavior for Input to API (depuis R2024a) |
CWE Rule
476 | NULL Pointer Dereference (depuis R2023a) |
CWE Rule
477 | Use of Obsolete Function (depuis R2023a) |
CWE Rule
478 | Missing Default Case in Multiple Condition Expression (depuis R2023a) |
CWE Rule
479 | Signal Handler Use of a Non-reentrant Function (depuis R2023a) |
CWE Rule
480 | Use of Incorrect Operator (depuis R2023a) |
CWE Rule
481 | Assigning instead of Comparing (depuis R2023a) |
CWE Rule
482 | Comparing instead of Assigning (depuis R2023a) |
CWE Rule
483 | Incorrect Block Delimitation (depuis R2023a) |
CWE Rule
484 | Omitted Break Statement in Switch (depuis R2023a) |
CWE Rule
489 | Active Debug Code (depuis R2023a) |
CWE Rule
493 | Critical Public Variable Without Final Modifier (depuis R2023b) |
CWE Rule
495 | Private Data Structure Returned From A Public Method (depuis R2023a) |
CWE Rule
496 | Public Data Assigned to Private Array-Typed Field (depuis R2023b) |
CWE Rule
498 | Cloneable class containing sensitive information (depuis R2023b) |
CWE Rule
500 | Public Static Field Not Marked Final (depuis R2023a) |
CWE Rule
522 | Insufficiently Protected Credentials (depuis R2023a) |
CWE Rule
532 | Insertion of Sensitive Information into Log File (depuis R2024a) |
CWE Rule
535 | Exposure of Information Through Shell Error Message (depuis R2024a) |
CWE Rule
543 | Use of Singleton Pattern Without Synchronization in a Multithreaded Context (depuis R2024a) |
CWE Rule
547 | Use of Hard-coded, Security-relevant Constants (depuis R2023a) |
CWE Rule
558 | Use of getlogin() in Multithreaded Application (depuis R2023a) |
CWE Rule
560 | Use of umask() with chmod-style Argument (depuis R2023a) |
CWE Rule
561 | Dead Code (depuis R2023a) |
CWE Rule
562 | Return of Stack Variable Address (depuis R2023a) |
CWE Rule
563 | Assignment to Variable without Use (depuis R2023a) |
CWE Rule
570 | Expression is Always False (depuis R2023a) |
CWE Rule
571 | Expression is Always True (depuis R2023a) |
CWE Rule
573 | Improper Following of Specification by Caller (depuis R2024a) |
CWE Rule
587 | Assignment of a Fixed Address to a Pointer (depuis R2023a) |
CWE Rule
590 | Free of Memory not on the Heap (depuis R2024a) |
CWE Rule
606 | Unchecked Input for Loop Condition (depuis R2023b) |
CWE Rule
617 | Reachable Assertion (depuis R2023a) |
CWE Rule
628 | Function Call with Incorrectly Specified Arguments (depuis R2024a) |
CWE Rule
663 | Use of a Non-reentrant Function in a Concurrent Context (depuis R2024a) |
CWE Rule
664 | Improper Control of a Resource Through its Lifetime (depuis R2024a) |
CWE Rule
665 | Improper Initialization (depuis R2024a) |
CWE Rule
666 | Operation on Resource in Wrong Phase of Lifetime (depuis R2024a) |
CWE Rule
667 | Improper Locking (depuis R2024a) |
CWE Rule
672 | Operation on a Resource after Expiration or Release (depuis R2024a) |
CWE Rule
674 | Uncontrolled Recursion (depuis R2024a) |
CWE Rule
675 | Multiple Operations on Resource in Single-Operation Context (depuis R2024a) |
CWE Rule
676 | Use of Potentially Dangerous Function (depuis R2023a) |
CWE Rule
681 | Incorrect Conversion between Numeric Types (depuis R2024a) |
CWE Rule
682 | Incorrect Calculation (depuis R2024a) |
CWE Rule
683 | Function Call With Incorrect Order of Arguments (depuis R2023b) |
CWE Rule
685 | Function Call With Incorrect Number of Arguments (depuis R2023a) |
CWE Rule
686 | Function Call With Incorrect Argument Type (depuis R2023b) |
CWE Rule
687 | Function Call With Incorrectly Specified Argument Value (depuis R2023b) |
CWE Rule
688 | Function Call With Incorrect Variable or Reference as Argument (depuis R2023b) |
CWE Rule
690 | Unchecked Return Value to NULL Pointer Dereference (depuis R2023a) |
CWE Rule
691 | Insufficient Control Flow Management (depuis R2024a) |
CWE Rule
693 | Protection Mechanism Failure (depuis R2024a) |
CWE Rule
696 | Incorrect Behavior Order (depuis R2024a) |
CWE Rule
703 | Improper Check or Handling of Exceptional Conditions (depuis R2024a) |
CWE Rule
704 | Incorrect Type Conversion or Cast (depuis R2023a) |
CWE Rule
705 | Incorrect Control Flow Scoping (depuis R2024a) |
CWE Rule
710 | Improper Adherence to Coding Standards (depuis R2024a) |
CWE Rule
732 | Incorrect Permission Assignment for Critical Resource (depuis R2024a) |
CWE Rule
733 | Compiler Optimization Removal or Modification of Security-critical Code (depuis R2023a) |
CWE Rule
754 | Improper Check for Unusual or Exceptional Conditions (depuis R2024a) |
CWE Rule
755 | Improper Handling of Exceptional Conditions (depuis R2024a) |
CWE Rule
758 | Reliance on Undefined, Unspecified, or Implementation-Defined Behavior (depuis R2024a) |
CWE Rule
759 | Use of a One-Way Hash without a Salt (depuis R2024a) |
CWE Rule
762 | Mismatched Memory Management Routines (depuis R2023a) |
CWE Rule
763 | Release of Invalid Pointer or Reference (depuis R2023a) |
CWE Rule
764 | Multiple Locks of a Critical Resource (depuis R2024a) |
CWE Rule
765 | Multiple Unlocks of a Critical Resource (depuis R2024a) |
CWE Rule
766 | Critical Data Element Declared Public (depuis R2023a) |
CWE Rule
767 | Access to Critical Private Variable via Public Method (depuis R2023a) |
CWE Rule
770 | Allocation of Resources Without Limits or Throttling (depuis R2024a) |
CWE Rule
772 | Missing Release of Resource after Effective Lifetime (depuis R2024a) |
CWE Rule
780 | Use of RSA Algorithm without OAEP (depuis R2024a) |
CWE Rule
783 | Operator Precedence Logic Error (depuis R2023a) |
CWE Rule
785 | Use of Path Manipulation Function without Maximum-sized Buffer (depuis R2023a) |
CWE Rule
786 | Access of Memory Location Before Start of Buffer (depuis R2024a) |
CWE Rule
787 | Out-of-bounds Write (depuis R2023a) |
CWE Rule
789 | Memory Allocation with Excessive Size Value (depuis R2023a) |
CWE Rule
798 | Use of Hard-coded Credentials (depuis R2023a) |
CWE Rule
805 | Buffer Access with Incorrect Length Value (depuis R2023a) |
CWE Rule
806 | Buffer Access Using Size of Source Buffer (depuis R2023a) |
CWE Rule
822 | Untrusted Pointer Dereference (depuis R2023b) |
CWE Rule
823 | Use of Out-of-range Pointer Offset (depuis R2024a) |
CWE Rule
824 | Access of Uninitialized Pointer (depuis R2023a) |
CWE Rule
825 | Expired Pointer Dereference (depuis R2023a) |
CWE Rule
826 | Premature Release of Resource During Expected Lifetime (depuis R2024a) |
CWE Rule
828 | Signal Handler with Functionality that is not Asynchronous-Safe (depuis R2024a) |
CWE Rule
832 | Unlock of a Resource that is not Locked (depuis R2024a) |
CWE Rule
833 | Deadlock (depuis R2024a) |
CWE Rule
839 | Numeric Range Comparison Without Minimum Check (depuis R2023a) |
CWE Rule
843 | Access of Resource Using Incompatible Type ('Type Confusion') (depuis R2023a) |
CWE Rule
908 | Use of Uninitialized Resource (depuis R2024a) |
CWE Rule
910 | Use of Expired File Descriptor (depuis R2023a) |
CWE Rule
922 | Insecure Storage of Sensitive Information (depuis R2023a) |
CWE Rule
1071 | Empty code block (depuis R2023a) |
CWE Rule
1335 | Incorrect Bitwise Shift of Integer (depuis R2023a) |
CWE Rule
1341 | Multiple Releases of Same Resource or Handle (depuis R2023a) |
CWE-658
CWE Rule 14 | Compiler Removal of Code to Clear Buffers (depuis R2023a) |
CWE Rule 119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (depuis R2023a) |
CWE Rule 120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (depuis R2023a) |
CWE Rule 121 | Stack-based Buffer Overflow (depuis R2023a) |
CWE Rule 122 | Heap-based Buffer Overflow (depuis R2023a) |
CWE Rule 123 | Write-what-where Condition (depuis R2023a) |
CWE Rule 124 | Buffer Underwrite ('Buffer Underflow') (depuis R2023a) |
CWE Rule 125 | Out-of-bounds Read (depuis R2023a) |
CWE Rule 126 | Buffer Over-read (depuis R2023a) |
CWE Rule 127 | Buffer Under-read (depuis R2023a) |
CWE Rule 128 | Wrap-around Error (depuis R2023a) |
CWE Rule 129 | Improper Validation of Array Index (depuis R2023a) |
CWE Rule 130 | Improper Handling of Length Parameter Inconsistency (depuis R2023a) |
CWE Rule 131 | Incorrect Calculation of Buffer Size (depuis R2023a) |
CWE Rule 134 | Use of Externally-Controlled Format String (depuis R2023a) |
CWE Rule 135 | Incorrect Calculation of Multi-Byte String Length (depuis R2023a) |
CWE Rule 170 | Improper Null Termination (depuis R2023a) |
CWE Rule 188 | Reliance on Data/Memory Layout (depuis R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (depuis R2024b) |
CWE Rule 191 | Integer Underflow (Wrap or Wraparound) (depuis R2023a) |
CWE Rule 192 | Integer Coercion Error (depuis R2023a) |
CWE Rule 194 | Unexpected Sign Extension (depuis R2023a) |
CWE Rule 195 | Signed to Unsigned Conversion Error (depuis R2023a) |
CWE Rule 196 | Unsigned to Signed Conversion Error (depuis R2023a) |
CWE Rule 197 | Numeric Truncation Error (depuis R2023a) |
CWE Rule 242 | Use of Inherently Dangerous Function (depuis R2023a) |
CWE Rule 243 | Creation of chroot Jail Without Changing Working Directory (depuis R2023a) |
CWE Rule 244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (depuis R2023a) |
CWE Rule 362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (depuis R2023a) |
CWE Rule 364 | Signal Handler Race Condition (depuis R2023a) |
CWE Rule 366 | Race Condition within a Thread (depuis R2023a) |
CWE Rule 374 | Passing Mutable Objects to an Untrusted Method (depuis R2023b) |
CWE Rule 375 | Returning a Mutable Object to an Untrusted Caller (depuis R2023a) |
CWE Rule 401 | Missing Release of Memory after Effective Lifetime (depuis R2023a) |
CWE Rule 415 | Double Free (depuis R2023a) |
CWE Rule 416 | Use After Free (depuis R2023a) |
CWE Rule 457 | Use of Uninitialized Variable (depuis R2023a) |
CWE Rule 460 | Improper Cleanup on Thrown Exception (depuis R2023a) |
CWE Rule 463 | Deletion of Data Structure Sentinel (depuis R2023a) |
CWE Rule 466 | Return of Pointer Value Outside of Expected Range (depuis R2023a) |
CWE Rule 467 | Use of sizeof() on a Pointer Type (depuis R2023a) |
CWE Rule 468 | Incorrect Pointer Scaling (depuis R2023a) |
CWE Rule 469 | Use of Pointer Subtraction to Determine Size (depuis R2023a) |
CWE Rule 474 | Use of Function with Inconsistent Implementations (depuis R2023a) |
CWE Rule 476 | NULL Pointer Dereference (depuis R2023a) |
CWE Rule 478 | Missing Default Case in Multiple Condition Expression (depuis R2023a) |
CWE Rule 479 | Signal Handler Use of a Non-reentrant Function (depuis R2023a) |
CWE Rule 480 | Use of Incorrect Operator (depuis R2023a) |
CWE Rule 481 | Assigning instead of Comparing (depuis R2023a) |
CWE Rule 482 | Comparing instead of Assigning (depuis R2023a) |
CWE Rule 483 | Incorrect Block Delimitation (depuis R2023a) |
CWE Rule 484 | Omitted Break Statement in Switch (depuis R2023a) |
CWE Rule 495 | Private Data Structure Returned From A Public Method (depuis R2023a) |
CWE Rule 496 | Public Data Assigned to Private Array-Typed Field (depuis R2023b) |
CWE Rule 558 | Use of getlogin() in Multithreaded Application (depuis R2023a) |
CWE Rule 560 | Use of umask() with chmod-style Argument (depuis R2023a) |
CWE Rule 562 | Return of Stack Variable Address (depuis R2023a) |
CWE Rule 587 | Assignment of a Fixed Address to a Pointer (depuis R2023a) |
CWE Rule 676 | Use of Potentially Dangerous Function (depuis R2023a) |
CWE Rule 685 | Function Call With Incorrect Number of Arguments (depuis R2023a) |
CWE Rule 688 | Function Call With Incorrect Variable or Reference as Argument (depuis R2023b) |
CWE Rule 690 | Unchecked Return Value to NULL Pointer Dereference (depuis R2023a) |
CWE Rule 704 | Incorrect Type Conversion or Cast (depuis R2023a) |
CWE Rule 733 | Compiler Optimization Removal or Modification of Security-critical Code (depuis R2023a) |
CWE Rule 762 | Mismatched Memory Management Routines (depuis R2023a) |
CWE Rule 783 | Operator Precedence Logic Error (depuis R2023a) |
CWE Rule 785 | Use of Path Manipulation Function without Maximum-sized Buffer (depuis R2023a) |
CWE Rule 787 | Out-of-bounds Write (depuis R2023a) |
CWE Rule 789 | Memory Allocation with Excessive Size Value (depuis R2023a) |
CWE Rule 805 | Buffer Access with Incorrect Length Value (depuis R2023a) |
CWE Rule 806 | Buffer Access Using Size of Source Buffer (depuis R2023a) |
CWE Rule 839 | Numeric Range Comparison Without Minimum Check (depuis R2023a) |
CWE Rule 843 | Access of Resource Using Incompatible Type ('Type Confusion') (depuis R2023a) |
CWE Rule 910 | Use of Expired File Descriptor (depuis R2023a) |
CWE Rule 1335 | Incorrect Bitwise Shift of Integer (depuis R2023a) |
CWE Rule 1341 | Multiple Releases of Same Resource or Handle (depuis R2023a) |
CWE-659
CWE Rule 14 | Compiler Removal of Code to Clear Buffers (depuis R2023a) |
CWE Rule 119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (depuis R2023a) |
CWE Rule 120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (depuis R2023a) |
CWE Rule 121 | Stack-based Buffer Overflow (depuis R2023a) |
CWE Rule 122 | Heap-based Buffer Overflow (depuis R2023a) |
CWE Rule 123 | Write-what-where Condition (depuis R2023a) |
CWE Rule 124 | Buffer Underwrite ('Buffer Underflow') (depuis R2023a) |
CWE Rule 125 | Out-of-bounds Read (depuis R2023a) |
CWE Rule 126 | Buffer Over-read (depuis R2023a) |
CWE Rule 127 | Buffer Under-read (depuis R2023a) |
CWE Rule 128 | Wrap-around Error (depuis R2023a) |
CWE Rule 129 | Improper Validation of Array Index (depuis R2023a) |
CWE Rule 130 | Improper Handling of Length Parameter Inconsistency (depuis R2023a) |
CWE Rule 131 | Incorrect Calculation of Buffer Size (depuis R2023a) |
CWE Rule 134 | Use of Externally-Controlled Format String (depuis R2023a) |
CWE Rule 135 | Incorrect Calculation of Multi-Byte String Length (depuis R2023a) |
CWE Rule 170 | Improper Null Termination (depuis R2023a) |
CWE Rule 188 | Reliance on Data/Memory Layout (depuis R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (depuis R2024b) |
CWE Rule 191 | Integer Underflow (Wrap or Wraparound) (depuis R2023a) |
CWE Rule 192 | Integer Coercion Error (depuis R2023a) |
CWE Rule 194 | Unexpected Sign Extension (depuis R2023a) |
CWE Rule 195 | Signed to Unsigned Conversion Error (depuis R2023a) |
CWE Rule 196 | Unsigned to Signed Conversion Error (depuis R2023a) |
CWE Rule 197 | Numeric Truncation Error (depuis R2023a) |
CWE Rule 242 | Use of Inherently Dangerous Function (depuis R2023a) |
CWE Rule 243 | Creation of chroot Jail Without Changing Working Directory (depuis R2023a) |
CWE Rule 244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (depuis R2023a) |
CWE Rule 248 | Uncaught Exception (depuis R2023a) |
CWE Rule 362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (depuis R2023a) |
CWE Rule 364 | Signal Handler Race Condition (depuis R2023a) |
CWE Rule 366 | Race Condition within a Thread (depuis R2023a) |
CWE Rule 374 | Passing Mutable Objects to an Untrusted Method (depuis R2023b) |
CWE Rule 375 | Returning a Mutable Object to an Untrusted Caller (depuis R2023a) |
CWE Rule 396 | Declaration of Catch for Generic Exception (depuis R2023a) |
CWE Rule 397 | Declaration of Throws for Generic Exception (depuis R2023a) |
CWE Rule 401 | Missing Release of Memory after Effective Lifetime (depuis R2023a) |
CWE Rule 415 | Double Free (depuis R2023a) |
CWE Rule 416 | Use After Free (depuis R2023a) |
CWE Rule 457 | Use of Uninitialized Variable (depuis R2023a) |
CWE Rule 460 | Improper Cleanup on Thrown Exception (depuis R2023a) |
CWE Rule 463 | Deletion of Data Structure Sentinel (depuis R2023a) |
CWE Rule 466 | Return of Pointer Value Outside of Expected Range (depuis R2023a) |
CWE Rule 467 | Use of sizeof() on a Pointer Type (depuis R2023a) |
CWE Rule 468 | Incorrect Pointer Scaling (depuis R2023a) |
CWE Rule 469 | Use of Pointer Subtraction to Determine Size (depuis R2023a) |
CWE Rule 476 | NULL Pointer Dereference (depuis R2023a) |
CWE Rule 478 | Missing Default Case in Multiple Condition Expression (depuis R2023a) |
CWE Rule 479 | Signal Handler Use of a Non-reentrant Function (depuis R2023a) |
CWE Rule 480 | Use of Incorrect Operator (depuis R2023a) |
CWE Rule 481 | Assigning instead of Comparing (depuis R2023a) |
CWE Rule 482 | Comparing instead of Assigning (depuis R2023a) |
CWE Rule 483 | Incorrect Block Delimitation (depuis R2023a) |
CWE Rule 484 | Omitted Break Statement in Switch (depuis R2023a) |
CWE Rule 493 | Critical Public Variable Without Final Modifier (depuis R2023b) |
CWE Rule 495 | Private Data Structure Returned From A Public Method (depuis R2023a) |
CWE Rule 496 | Public Data Assigned to Private Array-Typed Field (depuis R2023b) |
CWE Rule 498 | Cloneable class containing sensitive information (depuis R2023b) |
CWE Rule 500 | Public Static Field Not Marked Final (depuis R2023a) |
CWE Rule 543 | Use of Singleton Pattern Without Synchronization in a Multithreaded Context (depuis R2024a) |
CWE Rule 558 | Use of getlogin() in Multithreaded Application (depuis R2023a) |
CWE Rule 562 | Return of Stack Variable Address (depuis R2023a) |
CWE Rule 587 | Assignment of a Fixed Address to a Pointer (depuis R2023a) |
CWE Rule 676 | Use of Potentially Dangerous Function (depuis R2023a) |
CWE Rule 690 | Unchecked Return Value to NULL Pointer Dereference (depuis R2023a) |
CWE Rule 704 | Incorrect Type Conversion or Cast (depuis R2023a) |
CWE Rule 733 | Compiler Optimization Removal or Modification of Security-critical Code (depuis R2023a) |
CWE Rule 762 | Mismatched Memory Management Routines (depuis R2023a) |
CWE Rule 766 | Critical Data Element Declared Public (depuis R2023a) |
CWE Rule 767 | Access to Critical Private Variable via Public Method (depuis R2023a) |
CWE Rule 783 | Operator Precedence Logic Error (depuis R2023a) |
CWE Rule 785 | Use of Path Manipulation Function without Maximum-sized Buffer (depuis R2023a) |
CWE Rule 787 | Out-of-bounds Write (depuis R2023a) |
CWE Rule 789 | Memory Allocation with Excessive Size Value (depuis R2023a) |
CWE Rule 805 | Buffer Access with Incorrect Length Value (depuis R2023a) |
CWE Rule 806 | Buffer Access Using Size of Source Buffer (depuis R2023a) |
CWE Rule 839 | Numeric Range Comparison Without Minimum Check (depuis R2023a) |
CWE Rule 843 | Access of Resource Using Incompatible Type ('Type Confusion') (depuis R2023a) |
CWE Rule 910 | Use of Expired File Descriptor (depuis R2023a) |
CWE Rule 1335 | Incorrect Bitwise Shift of Integer (depuis R2023a) |
CWE Rule 1341 | Multiple Releases of Same Resource or Handle (depuis R2023a) |
Erreurs de l'API/des fonctions
CWE Rule 242 | Use of Inherently Dangerous Function (depuis R2023a) |
CWE Rule 474 | Use of Function with Inconsistent Implementations (depuis R2023a) |
CWE Rule 475 | Undefined Behavior for Input to API (depuis R2024a) |
CWE Rule 477 | Use of Obsolete Function (depuis R2023a) |
CWE Rule 676 | Use of Potentially Dangerous Function (depuis R2023a) |
Mauvaises pratiques de codage
CWE Rule 478 | Missing Default Case in Multiple Condition Expression (depuis R2023a) |
CWE Rule 489 | Active Debug Code (depuis R2023a) |
CWE Rule 547 | Use of Hard-coded, Security-relevant Constants (depuis R2023a) |
CWE Rule 561 | Dead Code (depuis R2023a) |
CWE Rule 562 | Return of Stack Variable Address (depuis R2023a) |
CWE Rule 563 | Assignment to Variable without Use (depuis R2023a) |
CWE Rule 628 | Function Call with Incorrectly Specified Arguments (depuis R2024a) |
CWE Rule 1071 | Empty code block (depuis R2023a) |
Problèmes comportementaux
CWE Rule 480 | Use of Incorrect Operator (depuis R2023a) |
CWE Rule 483 | Incorrect Block Delimitation (depuis R2023a) |
CWE Rule 484 | Omitted Break Statement in Switch (depuis R2023a) |
CWE Rule 733 | Compiler Optimization Removal or Modification of Security-critical Code (depuis R2023a) |
CWE Rule 783 | Operator Precedence Logic Error (depuis R2023a) |
Problèmes d’accès concurrent
CWE Rule 366 | Race Condition within a Thread (depuis R2023a) |
CWE Rule 367 | Time-of-check Time-of-use (TOCTOU) Race Condition (depuis R2024a) |
CWE Rule 663 | Use of a Non-reentrant Function in a Concurrent Context (depuis R2024a) |
Erreurs de gestion des identifiants
CWE Rule
798 | Use of Hard-coded Credentials (depuis R2023a) |
CWE Rule
256 | Plaintext storage of a password (depuis R2023a) |
Problèmes de cryptographie
CWE Rule 325 | Missing Cryptographic Step (depuis R2024a) |
CWE Rule 328 | Use of Weak Hash (depuis R2024a) |
Problèmes d’intégrité des données
CWE Rule 353 | Missing Support for Integrity Check (depuis R2023a) |
CWE Rule 354 | Improper Validation of Integrity Check Value (depuis R2024a) |
Problèmes de neutralisation des données
CWE Rule
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (depuis R2024a) |
CWE Rule
88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (depuis R2024a) |
CWE Rule
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (depuis R2023a) |
CWE Rule
90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') (depuis R2023a) |
CWE Rule
170 | Improper Null Termination (depuis R2023a) |
CWE Rule
188 | Reliance on Data/Memory Layout (depuis R2023a) |
CWE Rule
463 | Deletion of Data Structure Sentinel (depuis R2023a) |
Erreurs de traitement des données
CWE Rule 130 | Improper Handling of Length Parameter Inconsistency (depuis R2023a) |
Problèmes de validation des données
CWE Rule 129 | Improper Validation of Array Index (depuis R2023a) |
CWE Rule 606 | Unchecked Input for Loop Condition (depuis R2023b) |
Conditions d’erreur, valeurs de retour, codes de statut
CWE Rule 248 | Uncaught Exception (depuis R2023a) |
CWE Rule 252 | Unchecked Return Value (depuis R2023a) |
CWE Rule 253 | Incorrect Check of Function Return Value (depuis R2023a) |
CWE Rule 391 | Unchecked Error Condition (depuis R2024a) |
CWE Rule 396 | Declaration of Catch for Generic Exception (depuis R2023a) |
CWE Rule 397 | Declaration of Throws for Generic Exception (depuis R2023a) |
CWE Rule 617 | Reachable Assertion (depuis R2023a) |
Problèmes d’expression
CWE Rule 570 | Expression is Always False (depuis R2023a) |
CWE Rule 571 | Expression is Always True (depuis R2023a) |
Problèmes de gestion des fichiers
CWE Rule 22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (depuis R2024a) |
CWE Rule 426 | Untrusted Search Path (depuis R2024a) |
CWE Rule 427 | Uncontrolled Search Path Element (depuis R2024a) |
Erreurs de gestionnaire
CWE Rule 479 | Signal Handler Use of a Non-reentrant Function (depuis R2023a) |
Erreurs de gestion des informations
CWE Rule 312 | Cleartext Storage of Sensitive Information (depuis R2023a) |
CWE Rule 319 | Cleartext Transmission of Sensitive Information (depuis R2023b) |
CWE Rule 321 | Use of Hard-coded Cryptographic Key (depuis R2023b) |
Erreurs d’initialisation et de nettoyage
CWE Rule 460 | Improper Cleanup on Thrown Exception (depuis R2023a) |
Erreurs de gestion des clés
CWE Rule 322 | Key Exchange without Entity Authentication (depuis R2024a) |
Erreurs de la mémoire tampon
CWE Rule 120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (depuis R2023a) |
CWE Rule 123 | Write-what-where Condition (depuis R2023a) |
CWE Rule 124 | Buffer Underwrite ('Buffer Underflow') (depuis R2023a) |
CWE Rule 125 | Out-of-bounds Read (depuis R2023a) |
CWE Rule 131 | Incorrect Calculation of Buffer Size (depuis R2023a) |
CWE Rule 786 | Access of Memory Location Before Start of Buffer (depuis R2024a) |
CWE Rule 787 | Out-of-bounds Write (depuis R2023a) |
CWE Rule 805 | Buffer Access with Incorrect Length Value (depuis R2023a) |
Erreurs numériques
CWE Rule 128 | Wrap-around Error (depuis R2023a) |
CWE Rule 191 | Integer Underflow (Wrap or Wraparound) (depuis R2023a) |
CWE Rule 192 | Integer Coercion Error (depuis R2023a) |
CWE Rule 197 | Numeric Truncation Error (depuis R2023a) |
CWE Rule 369 | Divide By Zero (depuis R2023a) |
CWE Rule 681 | Incorrect Conversion between Numeric Types (depuis R2024a) |
CWE Rule 839 | Numeric Range Comparison Without Minimum Check (depuis R2023a) |
Validez l‘entrée
CWE Rule
20 | Improper Input Validation (depuis R2024a) |
CWE Rule
77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') (depuis R2024a) |
CWE Rule
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (depuis R2024a) |
CWE Rule
88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (depuis R2024a) |
CWE Rule
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (depuis R2023a) |
CWE Rule
90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') (depuis R2023a) |
CWE Rule
99 | Improper Control of Resource Identifiers ('Resource Injection') (depuis R2024b) |
Autres
CWE Rule 14 | Compiler Removal of Code to Clear Buffers (depuis R2023a) |
CWE Rule 20 | Improper Input Validation (depuis R2024a) |
CWE Rule 23 | Relative Path Traversal (depuis R2024a) |
CWE Rule 36 | Absolute Path Traversal (depuis R2024a) |
CWE Rule 67 | Improper Handling of Windows Device Names (depuis R2024a) |
CWE Rule 77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') (depuis R2024a) |
CWE Rule 88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (depuis R2024a) |
CWE Rule 114 | Process Control (depuis R2024a) |
CWE Rule 119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (depuis R2023a) |
CWE Rule 121 | Stack-based Buffer Overflow (depuis R2023a) |
CWE Rule 122 | Heap-based Buffer Overflow (depuis R2023a) |
CWE Rule 126 | Buffer Over-read (depuis R2023a) |
CWE Rule 127 | Buffer Under-read (depuis R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (depuis R2024b) |
CWE Rule 194 | Unexpected Sign Extension (depuis R2023a) |
CWE Rule 195 | Signed to Unsigned Conversion Error (depuis R2023a) |
CWE Rule 196 | Unsigned to Signed Conversion Error (depuis R2023a) |
CWE Rule 198 | Use of Incorrect Byte Ordering (depuis R2024a) |
CWE Rule 226 | Sensitive Information in Resource Not Removed Before Reuse (depuis R2024a) |
CWE Rule 240 | Improper Handling of Inconsistent Structural Elements (depuis R2024a) |
CWE Rule 244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (depuis R2023a) |
CWE Rule 287 | Improper Authentication (depuis R2024a) |
CWE Rule 297 | Improper Validation of Certificate with Host Mismatch (depuis R2024a) |
CWE Rule 304 | Missing Critical Step in Authentication (depuis R2024a) |
CWE Rule 311 | Missing Encryption of Sensitive Data (depuis R2023b) |
CWE Rule 316 | Cleartext Storage of Sensitive Information in Memory (depuis R2024a) |
CWE Rule 326 | Inadequate Encryption Strength (depuis R2024a) |
CWE Rule 327 | Use of a Broken or Risky Cryptographic Algorithm (depuis R2024a) |
CWE Rule 329 | Generation of Predictable IV with CBC Mode (depuis R2024a) |
CWE Rule 330 | Use of Insufficiently Random Values (depuis R2024a) |
CWE Rule 336 | Same Seed in Pseudo-Random Number Generator (PRNG) (depuis R2024a) |
CWE Rule 337 | Predictable Seed in Pseudo-Random Number Generator (PRNG) (depuis R2024a) |
CWE Rule 362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (depuis R2023a) |
CWE Rule 377 | Insecure Temporary File (depuis R2024a) |
CWE Rule 401 | Missing Release of Memory after Effective Lifetime (depuis R2023a) |
CWE Rule 404 | Improper Resource Shutdown or Release (depuis R2024a) |
CWE Rule 415 | Double Free (depuis R2023a) |
CWE Rule 416 | Use After Free (depuis R2023a) |
CWE Rule 456 | Missing Initialization of a Variable (depuis R2024a) |
CWE Rule 457 | Use of Uninitialized Variable (depuis R2023a) |
CWE Rule 471 | Modification of Assumed-Immutable Data (MAID) (depuis R2024a) |
CWE Rule 481 | Assigning instead of Comparing (depuis R2023a) |
CWE Rule 482 | Comparing instead of Assigning (depuis R2023a) |
CWE Rule 493 | Critical Public Variable Without Final Modifier (depuis R2023b) |
CWE Rule 495 | Private Data Structure Returned From A Public Method (depuis R2023a) |
CWE Rule 496 | Public Data Assigned to Private Array-Typed Field (depuis R2023b) |
CWE Rule 498 | Cloneable class containing sensitive information (depuis R2023b) |
CWE Rule 500 | Public Static Field Not Marked Final (depuis R2023a) |
CWE Rule 522 | Insufficiently Protected Credentials (depuis R2023a) |
CWE Rule 532 | Insertion of Sensitive Information into Log File (depuis R2024a) |
CWE Rule 535 | Exposure of Information Through Shell Error Message (depuis R2024a) |
CWE Rule 543 | Use of Singleton Pattern Without Synchronization in a Multithreaded Context (depuis R2024a) |
CWE Rule 558 | Use of getlogin() in Multithreaded Application (depuis R2023a) |
CWE Rule 560 | Use of umask() with chmod-style Argument (depuis R2023a) |
CWE Rule 573 | Improper Following of Specification by Caller (depuis R2024a) |
CWE Rule 590 | Free of Memory not on the Heap (depuis R2024a) |
CWE Rule 664 | Improper Control of a Resource Through its Lifetime (depuis R2024a) |
CWE Rule 665 | Improper Initialization (depuis R2024a) |
CWE Rule 666 | Operation on Resource in Wrong Phase of Lifetime (depuis R2024a) |
CWE Rule 667 | Improper Locking (depuis R2024a) |
CWE Rule 672 | Operation on a Resource after Expiration or Release (depuis R2024a) |
CWE Rule 674 | Uncontrolled Recursion (depuis R2024a) |
CWE Rule 675 | Multiple Operations on Resource in Single-Operation Context (depuis R2024a) |
CWE Rule 682 | Incorrect Calculation (depuis R2024a) |
CWE Rule 683 | Function Call With Incorrect Order of Arguments (depuis R2023b) |
CWE Rule 685 | Function Call With Incorrect Number of Arguments (depuis R2023a) |
CWE Rule 686 | Function Call With Incorrect Argument Type (depuis R2023b) |
CWE Rule 687 | Function Call With Incorrectly Specified Argument Value (depuis R2023b) |
CWE Rule 688 | Function Call With Incorrect Variable or Reference as Argument (depuis R2023b) |
CWE Rule 690 | Unchecked Return Value to NULL Pointer Dereference (depuis R2023a) |
CWE Rule 691 | Insufficient Control Flow Management (depuis R2024a) |
CWE Rule 693 | Protection Mechanism Failure (depuis R2024a) |
CWE Rule 696 | Incorrect Behavior Order (depuis R2024a) |
CWE Rule 703 | Improper Check or Handling of Exceptional Conditions (depuis R2024a) |
CWE Rule 704 | Incorrect Type Conversion or Cast (depuis R2023a) |
CWE Rule 705 | Incorrect Control Flow Scoping (depuis R2024a) |
CWE Rule 710 | Improper Adherence to Coding Standards (depuis R2024a) |
CWE Rule 732 | Incorrect Permission Assignment for Critical Resource (depuis R2024a) |
CWE Rule 754 | Improper Check for Unusual or Exceptional Conditions (depuis R2024a) |
CWE Rule 755 | Improper Handling of Exceptional Conditions (depuis R2024a) |
CWE Rule 758 | Reliance on Undefined, Unspecified, or Implementation-Defined Behavior (depuis R2024a) |
CWE Rule 759 | Use of a One-Way Hash without a Salt (depuis R2024a) |
CWE Rule 762 | Mismatched Memory Management Routines (depuis R2023a) |
CWE Rule 780 | Use of RSA Algorithm without OAEP (depuis R2024a) |
CWE Rule 785 | Use of Path Manipulation Function without Maximum-sized Buffer (depuis R2023a) |
CWE Rule 789 | Memory Allocation with Excessive Size Value (depuis R2023a) |
CWE Rule 806 | Buffer Access Using Size of Source Buffer (depuis R2023a) |
CWE Rule 828 | Signal Handler with Functionality that is not Asynchronous-Safe (depuis R2024a) |
CWE Rule 922 | Insecure Storage of Sensitive Information (depuis R2023a) |
CWE Rule 1335 | Incorrect Bitwise Shift of Integer (depuis R2023a) |
CWE Rule 1341 | Multiple Releases of Same Resource or Handle (depuis R2023a) |
Problèmes d’autorisations
CWE Rule 766 | Critical Data Element Declared Public (depuis R2023a) |
CWE Rule 767 | Access to Critical Private Variable via Public Method (depuis R2023a) |
Problèmes de pointeurs
CWE Rule 466 | Return of Pointer Value Outside of Expected Range (depuis R2023a) |
CWE Rule 467 | Use of sizeof() on a Pointer Type (depuis R2023a) |
CWE Rule 468 | Incorrect Pointer Scaling (depuis R2023a) |
CWE Rule 469 | Use of Pointer Subtraction to Determine Size (depuis R2023a) |
CWE Rule 476 | NULL Pointer Dereference (depuis R2023a) |
CWE Rule 587 | Assignment of a Fixed Address to a Pointer (depuis R2023a) |
CWE Rule 763 | Release of Invalid Pointer or Reference (depuis R2023a) |
CWE Rule 822 | Untrusted Pointer Dereference (depuis R2023b) |
CWE Rule 823 | Use of Out-of-range Pointer Offset (depuis R2024a) |
CWE Rule 824 | Access of Uninitialized Pointer (depuis R2023a) |
CWE Rule 825 | Expired Pointer Dereference (depuis R2023a) |
Problèmes de privilèges
CWE Rule 243 | Creation of chroot Jail Without Changing Working Directory (depuis R2023a) |
CWE Rule 250 | Execution with Unnecessary Privileges (depuis R2024a) |
CWE Rule 273 | Improper Check for Dropped Privileges (depuis R2024a) |
Problèmes de nombres aléatoires
CWE Rule 335 | Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) (depuis R2023a) |
CWE Rule 338 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (depuis R2023a) |
Problèmes de verrouillage des ressources
CWE Rule 413 | Improper Resource Locking (depuis R2023a) |
CWE Rule 764 | Multiple Locks of a Critical Resource (depuis R2024a) |
CWE Rule 765 | Multiple Unlocks of a Critical Resource (depuis R2024a) |
CWE Rule 832 | Unlock of a Resource that is not Locked (depuis R2024a) |
CWE Rule 833 | Deadlock (depuis R2024a) |
Erreurs de gestion des ressources
CWE Rule 770 | Allocation of Resources Without Limits or Throttling (depuis R2024a) |
CWE Rule 772 | Missing Release of Resource after Effective Lifetime (depuis R2024a) |
CWE Rule 826 | Premature Release of Resource During Expected Lifetime (depuis R2024a) |
CWE Rule 908 | Use of Uninitialized Resource (depuis R2024a) |
CWE Rule 910 | Use of Expired File Descriptor (depuis R2023a) |
Erreurs de signaux
CWE Rule 364 | Signal Handler Race Condition (depuis R2023a) |
Problèmes d’état
CWE Rule 15 | External Control of System or Configuration Setting (depuis R2024a) |
CWE Rule 372 | Incomplete Internal State Distinction (depuis R2024a) |
CWE Rule 374 | Passing Mutable Objects to an Untrusted Method (depuis R2023b) |
CWE Rule 375 | Returning a Mutable Object to an Untrusted Caller (depuis R2023a) |
Erreurs de chaînes de caractères
CWE Rule 134 | Use of Externally-Controlled Format String (depuis R2023a) |
CWE Rule 135 | Incorrect Calculation of Multi-Byte String Length (depuis R2023a) |
Erreurs de type
CWE Rule 843 | Access of Resource Using Incompatible Type ('Type Confusion') (depuis R2023a) |
Rubriques
- CWE Coding Standard Coverage Using Polyspace
Group CWE results by category and view list of
all-exact-checkers
. - Polyspace Support for Coding Standards
Check the Polyspace support for different coding standards.
- Check for and Review Coding Standard Violations
Check for violations of AUTOSAR C++14, CERT® C, CERT C++, CWE, MISRA C™, MISRA™ C++, JSF AV C++, or ISO-17961 standards with Polyspace Bug Finder.
MATLAB Command
You clicked a link that corresponds to this MATLAB command:
Run the command by entering it in the MATLAB Command Window. Web browsers do not support MATLAB commands.
Sélectionner un site web
Choisissez un site web pour accéder au contenu traduit dans votre langue (lorsqu'il est disponible) et voir les événements et les offres locales. D’après votre position, nous vous recommandons de sélectionner la région suivante : .
Vous pouvez également sélectionner un site web dans la liste suivante :
Comment optimiser les performances du site
Pour optimiser les performances du site, sélectionnez la région Chine (en chinois ou en anglais). Les sites de MathWorks pour les autres pays ne sont pas optimisés pour les visites provenant de votre région.
Amériques
- América Latina (Español)
- Canada (English)
- United States (English)
Europe
- Belgium (English)
- Denmark (English)
- Deutschland (Deutsch)
- España (Español)
- Finland (English)
- France (Français)
- Ireland (English)
- Italia (Italiano)
- Luxembourg (English)
- Netherlands (English)
- Norway (English)
- Österreich (Deutsch)
- Portugal (English)
- Sweden (English)
- Switzerland
- United Kingdom (English)