Enumerazione delle vulnerabilità comuni (CWE)
L'enumerazione delle vulnerabilità comuni (CWE™) è un elenco dei tipi di vulnerabilità che possono verificarsi nell'architettura, nella progettazione, nel codice o nell'implementazione di un software. Queste debolezze possono portare a vulnerabilità di sicurezza.
Polyspace può controllare il codice rispetto a sottoinsiemi dell'elenco CWE, inclusi sottoinsiemi o debolezze specifiche del codice C o C++. Per attivare i sottoinsiemi dell'elenco CWE, utilizzare l'opzione di analisi Controllo CWE (-cwe)
. Polyspace supporta la versione 4.12 dello standard CWE.
Risultati di Polyspace
CWE Rule
14 | Compiler Removal of Code to Clear Buffers (Da R2023a) |
CWE Rule
15 | External Control of System or Configuration Setting (Da R2024a) |
CWE Rule
20 | Improper Input Validation (Da R2024a) |
CWE Rule
22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (Da R2024a) |
CWE Rule
23 | Relative Path Traversal (Da R2024a) |
CWE Rule
36 | Absolute Path Traversal (Da R2024a) |
CWE Rule
67 | Improper Handling of Windows Device Names (Da R2024a) |
CWE Rule
77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') (Da R2024a) |
CWE Rule
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (Da R2024a) |
CWE Rule
88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (Da R2024a) |
CWE Rule
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Da R2023a) |
CWE Rule
90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') (Da R2023a) |
CWE Rule
99 | Improper Control of Resource Identifiers ('Resource Injection') (Da R2024b) |
CWE Rule
114 | Process Control (Da R2024a) |
CWE Rule
119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (Da R2023a) |
CWE Rule
120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (Da R2023a) |
CWE Rule
121 | Stack-based Buffer Overflow (Da R2023a) |
CWE Rule
122 | Heap-based Buffer Overflow (Da R2023a) |
CWE Rule
123 | Write-what-where Condition (Da R2023a) |
CWE Rule
124 | Buffer Underwrite ('Buffer Underflow') (Da R2023a) |
CWE Rule
125 | Out-of-bounds Read (Da R2023a) |
CWE Rule
126 | Buffer Over-read (Da R2023a) |
CWE Rule
127 | Buffer Under-read (Da R2023a) |
CWE Rule
128 | Wrap-around Error (Da R2023a) |
CWE Rule
129 | Improper Validation of Array Index (Da R2023a) |
CWE Rule
130 | Improper Handling of Length Parameter Inconsistency (Da R2023a) |
CWE Rule
131 | Incorrect Calculation of Buffer Size (Da R2023a) |
CWE Rule
134 | Use of Externally-Controlled Format String (Da R2023a) |
CWE Rule
135 | Incorrect Calculation of Multi-Byte String Length (Da R2023a) |
CWE Rule
170 | Improper Null Termination (Da R2023a) |
CWE Rule
188 | Reliance on Data/Memory Layout (Da R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (Da R2024b) |
CWE Rule
191 | Integer Underflow (Wrap or Wraparound) (Da R2023a) |
CWE Rule
192 | Integer Coercion Error (Da R2023a) |
CWE Rule
194 | Unexpected Sign Extension (Da R2023a) |
CWE Rule
195 | Signed to Unsigned Conversion Error (Da R2023a) |
CWE Rule
196 | Unsigned to Signed Conversion Error (Da R2023a) |
CWE Rule
197 | Numeric Truncation Error (Da R2023a) |
CWE Rule
198 | Use of Incorrect Byte Ordering (Da R2024a) |
CWE Rule
226 | Sensitive Information in Resource Not Removed Before Reuse (Da R2024a) |
CWE Rule
240 | Improper Handling of Inconsistent Structural Elements (Da R2024a) |
CWE Rule
242 | Use of Inherently Dangerous Function (Da R2023a) |
CWE Rule
243 | Creation of chroot Jail Without Changing Working Directory (Da R2023a) |
CWE Rule
244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (Da R2023a) |
CWE Rule
248 | Uncaught Exception (Da R2023a) |
CWE Rule
250 | Execution with Unnecessary Privileges (Da R2024a) |
CWE Rule
252 | Unchecked Return Value (Da R2023a) |
CWE Rule
253 | Incorrect Check of Function Return Value (Da R2023a) |
CWE Rule
256 | Plaintext storage of a password (Da R2023a) |
CWE Rule
273 | Improper Check for Dropped Privileges (Da R2024a) |
CWE Rule
287 | Improper Authentication (Da R2024a) |
CWE Rule
297 | Improper Validation of Certificate with Host Mismatch (Da R2024a) |
CWE Rule
304 | Missing Critical Step in Authentication (Da R2024a) |
CWE Rule
311 | Missing Encryption of Sensitive Data (Da R2023b) |
CWE Rule
312 | Cleartext Storage of Sensitive Information (Da R2023a) |
CWE Rule
316 | Cleartext Storage of Sensitive Information in Memory (Da R2024a) |
CWE Rule
319 | Cleartext Transmission of Sensitive Information (Da R2023b) |
CWE Rule
321 | Use of Hard-coded Cryptographic Key (Da R2023b) |
CWE Rule
322 | Key Exchange without Entity Authentication (Da R2024a) |
CWE Rule
325 | Missing Cryptographic Step (Da R2024a) |
CWE Rule
326 | Inadequate Encryption Strength (Da R2024a) |
CWE Rule
327 | Use of a Broken or Risky Cryptographic Algorithm (Da R2024a) |
CWE Rule
328 | Use of Weak Hash (Da R2024a) |
CWE Rule
329 | Generation of Predictable IV with CBC Mode (Da R2024a) |
CWE Rule
330 | Use of Insufficiently Random Values (Da R2024a) |
CWE Rule
335 | Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) (Da R2023a) |
CWE Rule
336 | Same Seed in Pseudo-Random Number Generator (PRNG) (Da R2024a) |
CWE Rule
337 | Predictable Seed in Pseudo-Random Number Generator (PRNG) (Da R2024a) |
CWE Rule
338 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (Da R2023a) |
CWE Rule
353 | Missing Support for Integrity Check (Da R2023a) |
CWE Rule
354 | Improper Validation of Integrity Check Value (Da R2024a) |
CWE Rule
362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (Da R2023a) |
CWE Rule
364 | Signal Handler Race Condition (Da R2023a) |
CWE Rule
366 | Race Condition within a Thread (Da R2023a) |
CWE Rule
367 | Time-of-check Time-of-use (TOCTOU) Race Condition (Da R2024a) |
CWE Rule
369 | Divide By Zero (Da R2023a) |
CWE Rule
372 | Incomplete Internal State Distinction (Da R2024a) |
CWE Rule
374 | Passing Mutable Objects to an Untrusted Method (Da R2023b) |
CWE Rule
375 | Returning a Mutable Object to an Untrusted Caller (Da R2023a) |
CWE Rule
377 | Insecure Temporary File (Da R2024a) |
CWE Rule
391 | Unchecked Error Condition (Da R2024a) |
CWE Rule
396 | Declaration of Catch for Generic Exception (Da R2023a) |
CWE Rule
397 | Declaration of Throws for Generic Exception (Da R2023a) |
CWE Rule
401 | Missing Release of Memory after Effective Lifetime (Da R2023a) |
CWE Rule
404 | Improper Resource Shutdown or Release (Da R2024a) |
CWE Rule
413 | Improper Resource Locking (Da R2023a) |
CWE Rule
415 | Double Free (Da R2023a) |
CWE Rule
416 | Use After Free (Da R2023a) |
CWE Rule
426 | Untrusted Search Path (Da R2024a) |
CWE Rule
427 | Uncontrolled Search Path Element (Da R2024a) |
CWE Rule
456 | Missing Initialization of a Variable (Da R2024a) |
CWE Rule
457 | Use of Uninitialized Variable (Da R2023a) |
CWE Rule
460 | Improper Cleanup on Thrown Exception (Da R2023a) |
CWE Rule
463 | Deletion of Data Structure Sentinel (Da R2023a) |
CWE Rule
466 | Return of Pointer Value Outside of Expected Range (Da R2023a) |
CWE Rule
467 | Use of sizeof() on a Pointer Type (Da R2023a) |
CWE Rule
468 | Incorrect Pointer Scaling (Da R2023a) |
CWE Rule
469 | Use of Pointer Subtraction to Determine Size (Da R2023a) |
CWE Rule
471 | Modification of Assumed-Immutable Data (MAID) (Da R2024a) |
CWE Rule
474 | Use of Function with Inconsistent Implementations (Da R2023a) |
CWE Rule
475 | Undefined Behavior for Input to API (Da R2024a) |
CWE Rule
476 | NULL Pointer Dereference (Da R2023a) |
CWE Rule
477 | Use of Obsolete Function (Da R2023a) |
CWE Rule
478 | Missing Default Case in Multiple Condition Expression (Da R2023a) |
CWE Rule
479 | Signal Handler Use of a Non-reentrant Function (Da R2023a) |
CWE Rule
480 | Use of Incorrect Operator (Da R2023a) |
CWE Rule
481 | Assigning instead of Comparing (Da R2023a) |
CWE Rule
482 | Comparing instead of Assigning (Da R2023a) |
CWE Rule
483 | Incorrect Block Delimitation (Da R2023a) |
CWE Rule
484 | Omitted Break Statement in Switch (Da R2023a) |
CWE Rule
489 | Active Debug Code (Da R2023a) |
CWE Rule
493 | Critical Public Variable Without Final Modifier (Da R2023b) |
CWE Rule
495 | Private Data Structure Returned From A Public Method (Da R2023a) |
CWE Rule
496 | Public Data Assigned to Private Array-Typed Field (Da R2023b) |
CWE Rule
498 | Cloneable class containing sensitive information (Da R2023b) |
CWE Rule
500 | Public Static Field Not Marked Final (Da R2023a) |
CWE Rule
522 | Insufficiently Protected Credentials (Da R2023a) |
CWE Rule
532 | Insertion of Sensitive Information into Log File (Da R2024a) |
CWE Rule
535 | Exposure of Information Through Shell Error Message (Da R2024a) |
CWE Rule
543 | Use of Singleton Pattern Without Synchronization in a Multithreaded Context (Da R2024a) |
CWE Rule
547 | Use of Hard-coded, Security-relevant Constants (Da R2023a) |
CWE Rule
558 | Use of getlogin() in Multithreaded Application (Da R2023a) |
CWE Rule
560 | Use of umask() with chmod-style Argument (Da R2023a) |
CWE Rule
561 | Dead Code (Da R2023a) |
CWE Rule
562 | Return of Stack Variable Address (Da R2023a) |
CWE Rule
563 | Assignment to Variable without Use (Da R2023a) |
CWE Rule
570 | Expression is Always False (Da R2023a) |
CWE Rule
571 | Expression is Always True (Da R2023a) |
CWE Rule
573 | Improper Following of Specification by Caller (Da R2024a) |
CWE Rule
587 | Assignment of a Fixed Address to a Pointer (Da R2023a) |
CWE Rule
590 | Free of Memory not on the Heap (Da R2024a) |
CWE Rule
606 | Unchecked Input for Loop Condition (Da R2023b) |
CWE Rule
617 | Reachable Assertion (Da R2023a) |
CWE Rule
628 | Function Call with Incorrectly Specified Arguments (Da R2024a) |
CWE Rule
663 | Use of a Non-reentrant Function in a Concurrent Context (Da R2024a) |
CWE Rule
664 | Improper Control of a Resource Through its Lifetime (Da R2024a) |
CWE Rule
665 | Improper Initialization (Da R2024a) |
CWE Rule
666 | Operation on Resource in Wrong Phase of Lifetime (Da R2024a) |
CWE Rule
667 | Improper Locking (Da R2024a) |
CWE Rule
672 | Operation on a Resource after Expiration or Release (Da R2024a) |
CWE Rule
674 | Uncontrolled Recursion (Da R2024a) |
CWE Rule
675 | Multiple Operations on Resource in Single-Operation Context (Da R2024a) |
CWE Rule
676 | Use of Potentially Dangerous Function (Da R2023a) |
CWE Rule
681 | Incorrect Conversion between Numeric Types (Da R2024a) |
CWE Rule
682 | Incorrect Calculation (Da R2024a) |
CWE Rule
683 | Function Call With Incorrect Order of Arguments (Da R2023b) |
CWE Rule
685 | Function Call With Incorrect Number of Arguments (Da R2023a) |
CWE Rule
686 | Function Call With Incorrect Argument Type (Da R2023b) |
CWE Rule
687 | Function Call With Incorrectly Specified Argument Value (Da R2023b) |
CWE Rule
688 | Function Call With Incorrect Variable or Reference as Argument (Da R2023b) |
CWE Rule
690 | Unchecked Return Value to NULL Pointer Dereference (Da R2023a) |
CWE Rule
691 | Insufficient Control Flow Management (Da R2024a) |
CWE Rule
693 | Protection Mechanism Failure (Da R2024a) |
CWE Rule
696 | Incorrect Behavior Order (Da R2024a) |
CWE Rule
703 | Improper Check or Handling of Exceptional Conditions (Da R2024a) |
CWE Rule
704 | Incorrect Type Conversion or Cast (Da R2023a) |
CWE Rule
705 | Incorrect Control Flow Scoping (Da R2024a) |
CWE Rule
710 | Improper Adherence to Coding Standards (Da R2024a) |
CWE Rule
732 | Incorrect Permission Assignment for Critical Resource (Da R2024a) |
CWE Rule
733 | Compiler Optimization Removal or Modification of Security-critical Code (Da R2023a) |
CWE Rule
754 | Improper Check for Unusual or Exceptional Conditions (Da R2024a) |
CWE Rule
755 | Improper Handling of Exceptional Conditions (Da R2024a) |
CWE Rule
758 | Reliance on Undefined, Unspecified, or Implementation-Defined Behavior (Da R2024a) |
CWE Rule
759 | Use of a One-Way Hash without a Salt (Da R2024a) |
CWE Rule
762 | Mismatched Memory Management Routines (Da R2023a) |
CWE Rule
763 | Release of Invalid Pointer or Reference (Da R2023a) |
CWE Rule
764 | Multiple Locks of a Critical Resource (Da R2024a) |
CWE Rule
765 | Multiple Unlocks of a Critical Resource (Da R2024a) |
CWE Rule
766 | Critical Data Element Declared Public (Da R2023a) |
CWE Rule
767 | Access to Critical Private Variable via Public Method (Da R2023a) |
CWE Rule
770 | Allocation of Resources Without Limits or Throttling (Da R2024a) |
CWE Rule
772 | Missing Release of Resource after Effective Lifetime (Da R2024a) |
CWE Rule
780 | Use of RSA Algorithm without OAEP (Da R2024a) |
CWE Rule
783 | Operator Precedence Logic Error (Da R2023a) |
CWE Rule
785 | Use of Path Manipulation Function without Maximum-sized Buffer (Da R2023a) |
CWE Rule
786 | Access of Memory Location Before Start of Buffer (Da R2024a) |
CWE Rule
787 | Out-of-bounds Write (Da R2023a) |
CWE Rule
789 | Memory Allocation with Excessive Size Value (Da R2023a) |
CWE Rule
798 | Use of Hard-coded Credentials (Da R2023a) |
CWE Rule
805 | Buffer Access with Incorrect Length Value (Da R2023a) |
CWE Rule
806 | Buffer Access Using Size of Source Buffer (Da R2023a) |
CWE Rule
822 | Untrusted Pointer Dereference (Da R2023b) |
CWE Rule
823 | Use of Out-of-range Pointer Offset (Da R2024a) |
CWE Rule
824 | Access of Uninitialized Pointer (Da R2023a) |
CWE Rule
825 | Expired Pointer Dereference (Da R2023a) |
CWE Rule
826 | Premature Release of Resource During Expected Lifetime (Da R2024a) |
CWE Rule
828 | Signal Handler with Functionality that is not Asynchronous-Safe (Da R2024a) |
CWE Rule
832 | Unlock of a Resource that is not Locked (Da R2024a) |
CWE Rule
833 | Deadlock (Da R2024a) |
CWE Rule
839 | Numeric Range Comparison Without Minimum Check (Da R2023a) |
CWE Rule
843 | Access of Resource Using Incompatible Type ('Type Confusion') (Da R2023a) |
CWE Rule
908 | Use of Uninitialized Resource (Da R2024a) |
CWE Rule
910 | Use of Expired File Descriptor (Da R2023a) |
CWE Rule
922 | Insecure Storage of Sensitive Information (Da R2023a) |
CWE Rule
1071 | Empty code block (Da R2023a) |
CWE Rule
1335 | Incorrect Bitwise Shift of Integer (Da R2023a) |
CWE Rule
1341 | Multiple Releases of Same Resource or Handle (Da R2023a) |
CWE-658
CWE Rule 14 | Compiler Removal of Code to Clear Buffers (Da R2023a) |
CWE Rule 119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (Da R2023a) |
CWE Rule 120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (Da R2023a) |
CWE Rule 121 | Stack-based Buffer Overflow (Da R2023a) |
CWE Rule 122 | Heap-based Buffer Overflow (Da R2023a) |
CWE Rule 123 | Write-what-where Condition (Da R2023a) |
CWE Rule 124 | Buffer Underwrite ('Buffer Underflow') (Da R2023a) |
CWE Rule 125 | Out-of-bounds Read (Da R2023a) |
CWE Rule 126 | Buffer Over-read (Da R2023a) |
CWE Rule 127 | Buffer Under-read (Da R2023a) |
CWE Rule 128 | Wrap-around Error (Da R2023a) |
CWE Rule 129 | Improper Validation of Array Index (Da R2023a) |
CWE Rule 130 | Improper Handling of Length Parameter Inconsistency (Da R2023a) |
CWE Rule 131 | Incorrect Calculation of Buffer Size (Da R2023a) |
CWE Rule 134 | Use of Externally-Controlled Format String (Da R2023a) |
CWE Rule 135 | Incorrect Calculation of Multi-Byte String Length (Da R2023a) |
CWE Rule 170 | Improper Null Termination (Da R2023a) |
CWE Rule 188 | Reliance on Data/Memory Layout (Da R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (Da R2024b) |
CWE Rule 191 | Integer Underflow (Wrap or Wraparound) (Da R2023a) |
CWE Rule 192 | Integer Coercion Error (Da R2023a) |
CWE Rule 194 | Unexpected Sign Extension (Da R2023a) |
CWE Rule 195 | Signed to Unsigned Conversion Error (Da R2023a) |
CWE Rule 196 | Unsigned to Signed Conversion Error (Da R2023a) |
CWE Rule 197 | Numeric Truncation Error (Da R2023a) |
CWE Rule 242 | Use of Inherently Dangerous Function (Da R2023a) |
CWE Rule 243 | Creation of chroot Jail Without Changing Working Directory (Da R2023a) |
CWE Rule 244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (Da R2023a) |
CWE Rule 362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (Da R2023a) |
CWE Rule 364 | Signal Handler Race Condition (Da R2023a) |
CWE Rule 366 | Race Condition within a Thread (Da R2023a) |
CWE Rule 374 | Passing Mutable Objects to an Untrusted Method (Da R2023b) |
CWE Rule 375 | Returning a Mutable Object to an Untrusted Caller (Da R2023a) |
CWE Rule 401 | Missing Release of Memory after Effective Lifetime (Da R2023a) |
CWE Rule 415 | Double Free (Da R2023a) |
CWE Rule 416 | Use After Free (Da R2023a) |
CWE Rule 457 | Use of Uninitialized Variable (Da R2023a) |
CWE Rule 460 | Improper Cleanup on Thrown Exception (Da R2023a) |
CWE Rule 463 | Deletion of Data Structure Sentinel (Da R2023a) |
CWE Rule 466 | Return of Pointer Value Outside of Expected Range (Da R2023a) |
CWE Rule 467 | Use of sizeof() on a Pointer Type (Da R2023a) |
CWE Rule 468 | Incorrect Pointer Scaling (Da R2023a) |
CWE Rule 469 | Use of Pointer Subtraction to Determine Size (Da R2023a) |
CWE Rule 474 | Use of Function with Inconsistent Implementations (Da R2023a) |
CWE Rule 476 | NULL Pointer Dereference (Da R2023a) |
CWE Rule 478 | Missing Default Case in Multiple Condition Expression (Da R2023a) |
CWE Rule 479 | Signal Handler Use of a Non-reentrant Function (Da R2023a) |
CWE Rule 480 | Use of Incorrect Operator (Da R2023a) |
CWE Rule 481 | Assigning instead of Comparing (Da R2023a) |
CWE Rule 482 | Comparing instead of Assigning (Da R2023a) |
CWE Rule 483 | Incorrect Block Delimitation (Da R2023a) |
CWE Rule 484 | Omitted Break Statement in Switch (Da R2023a) |
CWE Rule 495 | Private Data Structure Returned From A Public Method (Da R2023a) |
CWE Rule 496 | Public Data Assigned to Private Array-Typed Field (Da R2023b) |
CWE Rule 558 | Use of getlogin() in Multithreaded Application (Da R2023a) |
CWE Rule 560 | Use of umask() with chmod-style Argument (Da R2023a) |
CWE Rule 562 | Return of Stack Variable Address (Da R2023a) |
CWE Rule 587 | Assignment of a Fixed Address to a Pointer (Da R2023a) |
CWE Rule 676 | Use of Potentially Dangerous Function (Da R2023a) |
CWE Rule 685 | Function Call With Incorrect Number of Arguments (Da R2023a) |
CWE Rule 688 | Function Call With Incorrect Variable or Reference as Argument (Da R2023b) |
CWE Rule 690 | Unchecked Return Value to NULL Pointer Dereference (Da R2023a) |
CWE Rule 704 | Incorrect Type Conversion or Cast (Da R2023a) |
CWE Rule 733 | Compiler Optimization Removal or Modification of Security-critical Code (Da R2023a) |
CWE Rule 762 | Mismatched Memory Management Routines (Da R2023a) |
CWE Rule 783 | Operator Precedence Logic Error (Da R2023a) |
CWE Rule 785 | Use of Path Manipulation Function without Maximum-sized Buffer (Da R2023a) |
CWE Rule 787 | Out-of-bounds Write (Da R2023a) |
CWE Rule 789 | Memory Allocation with Excessive Size Value (Da R2023a) |
CWE Rule 805 | Buffer Access with Incorrect Length Value (Da R2023a) |
CWE Rule 806 | Buffer Access Using Size of Source Buffer (Da R2023a) |
CWE Rule 839 | Numeric Range Comparison Without Minimum Check (Da R2023a) |
CWE Rule 843 | Access of Resource Using Incompatible Type ('Type Confusion') (Da R2023a) |
CWE Rule 910 | Use of Expired File Descriptor (Da R2023a) |
CWE Rule 1335 | Incorrect Bitwise Shift of Integer (Da R2023a) |
CWE Rule 1341 | Multiple Releases of Same Resource or Handle (Da R2023a) |
CWE-659
CWE Rule 14 | Compiler Removal of Code to Clear Buffers (Da R2023a) |
CWE Rule 119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (Da R2023a) |
CWE Rule 120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (Da R2023a) |
CWE Rule 121 | Stack-based Buffer Overflow (Da R2023a) |
CWE Rule 122 | Heap-based Buffer Overflow (Da R2023a) |
CWE Rule 123 | Write-what-where Condition (Da R2023a) |
CWE Rule 124 | Buffer Underwrite ('Buffer Underflow') (Da R2023a) |
CWE Rule 125 | Out-of-bounds Read (Da R2023a) |
CWE Rule 126 | Buffer Over-read (Da R2023a) |
CWE Rule 127 | Buffer Under-read (Da R2023a) |
CWE Rule 128 | Wrap-around Error (Da R2023a) |
CWE Rule 129 | Improper Validation of Array Index (Da R2023a) |
CWE Rule 130 | Improper Handling of Length Parameter Inconsistency (Da R2023a) |
CWE Rule 131 | Incorrect Calculation of Buffer Size (Da R2023a) |
CWE Rule 134 | Use of Externally-Controlled Format String (Da R2023a) |
CWE Rule 135 | Incorrect Calculation of Multi-Byte String Length (Da R2023a) |
CWE Rule 170 | Improper Null Termination (Da R2023a) |
CWE Rule 188 | Reliance on Data/Memory Layout (Da R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (Da R2024b) |
CWE Rule 191 | Integer Underflow (Wrap or Wraparound) (Da R2023a) |
CWE Rule 192 | Integer Coercion Error (Da R2023a) |
CWE Rule 194 | Unexpected Sign Extension (Da R2023a) |
CWE Rule 195 | Signed to Unsigned Conversion Error (Da R2023a) |
CWE Rule 196 | Unsigned to Signed Conversion Error (Da R2023a) |
CWE Rule 197 | Numeric Truncation Error (Da R2023a) |
CWE Rule 242 | Use of Inherently Dangerous Function (Da R2023a) |
CWE Rule 243 | Creation of chroot Jail Without Changing Working Directory (Da R2023a) |
CWE Rule 244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (Da R2023a) |
CWE Rule 248 | Uncaught Exception (Da R2023a) |
CWE Rule 362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (Da R2023a) |
CWE Rule 364 | Signal Handler Race Condition (Da R2023a) |
CWE Rule 366 | Race Condition within a Thread (Da R2023a) |
CWE Rule 374 | Passing Mutable Objects to an Untrusted Method (Da R2023b) |
CWE Rule 375 | Returning a Mutable Object to an Untrusted Caller (Da R2023a) |
CWE Rule 396 | Declaration of Catch for Generic Exception (Da R2023a) |
CWE Rule 397 | Declaration of Throws for Generic Exception (Da R2023a) |
CWE Rule 401 | Missing Release of Memory after Effective Lifetime (Da R2023a) |
CWE Rule 415 | Double Free (Da R2023a) |
CWE Rule 416 | Use After Free (Da R2023a) |
CWE Rule 457 | Use of Uninitialized Variable (Da R2023a) |
CWE Rule 460 | Improper Cleanup on Thrown Exception (Da R2023a) |
CWE Rule 463 | Deletion of Data Structure Sentinel (Da R2023a) |
CWE Rule 466 | Return of Pointer Value Outside of Expected Range (Da R2023a) |
CWE Rule 467 | Use of sizeof() on a Pointer Type (Da R2023a) |
CWE Rule 468 | Incorrect Pointer Scaling (Da R2023a) |
CWE Rule 469 | Use of Pointer Subtraction to Determine Size (Da R2023a) |
CWE Rule 476 | NULL Pointer Dereference (Da R2023a) |
CWE Rule 478 | Missing Default Case in Multiple Condition Expression (Da R2023a) |
CWE Rule 479 | Signal Handler Use of a Non-reentrant Function (Da R2023a) |
CWE Rule 480 | Use of Incorrect Operator (Da R2023a) |
CWE Rule 481 | Assigning instead of Comparing (Da R2023a) |
CWE Rule 482 | Comparing instead of Assigning (Da R2023a) |
CWE Rule 483 | Incorrect Block Delimitation (Da R2023a) |
CWE Rule 484 | Omitted Break Statement in Switch (Da R2023a) |
CWE Rule 493 | Critical Public Variable Without Final Modifier (Da R2023b) |
CWE Rule 495 | Private Data Structure Returned From A Public Method (Da R2023a) |
CWE Rule 496 | Public Data Assigned to Private Array-Typed Field (Da R2023b) |
CWE Rule 498 | Cloneable class containing sensitive information (Da R2023b) |
CWE Rule 500 | Public Static Field Not Marked Final (Da R2023a) |
CWE Rule 543 | Use of Singleton Pattern Without Synchronization in a Multithreaded Context (Da R2024a) |
CWE Rule 558 | Use of getlogin() in Multithreaded Application (Da R2023a) |
CWE Rule 562 | Return of Stack Variable Address (Da R2023a) |
CWE Rule 587 | Assignment of a Fixed Address to a Pointer (Da R2023a) |
CWE Rule 676 | Use of Potentially Dangerous Function (Da R2023a) |
CWE Rule 690 | Unchecked Return Value to NULL Pointer Dereference (Da R2023a) |
CWE Rule 704 | Incorrect Type Conversion or Cast (Da R2023a) |
CWE Rule 733 | Compiler Optimization Removal or Modification of Security-critical Code (Da R2023a) |
CWE Rule 762 | Mismatched Memory Management Routines (Da R2023a) |
CWE Rule 766 | Critical Data Element Declared Public (Da R2023a) |
CWE Rule 767 | Access to Critical Private Variable via Public Method (Da R2023a) |
CWE Rule 783 | Operator Precedence Logic Error (Da R2023a) |
CWE Rule 785 | Use of Path Manipulation Function without Maximum-sized Buffer (Da R2023a) |
CWE Rule 787 | Out-of-bounds Write (Da R2023a) |
CWE Rule 789 | Memory Allocation with Excessive Size Value (Da R2023a) |
CWE Rule 805 | Buffer Access with Incorrect Length Value (Da R2023a) |
CWE Rule 806 | Buffer Access Using Size of Source Buffer (Da R2023a) |
CWE Rule 839 | Numeric Range Comparison Without Minimum Check (Da R2023a) |
CWE Rule 843 | Access of Resource Using Incompatible Type ('Type Confusion') (Da R2023a) |
CWE Rule 910 | Use of Expired File Descriptor (Da R2023a) |
CWE Rule 1335 | Incorrect Bitwise Shift of Integer (Da R2023a) |
CWE Rule 1341 | Multiple Releases of Same Resource or Handle (Da R2023a) |
Errori API/funzione
CWE Rule 242 | Use of Inherently Dangerous Function (Da R2023a) |
CWE Rule 474 | Use of Function with Inconsistent Implementations (Da R2023a) |
CWE Rule 475 | Undefined Behavior for Input to API (Da R2024a) |
CWE Rule 477 | Use of Obsolete Function (Da R2023a) |
CWE Rule 676 | Use of Potentially Dangerous Function (Da R2023a) |
Cattive pratiche di codifica
CWE Rule 478 | Missing Default Case in Multiple Condition Expression (Da R2023a) |
CWE Rule 489 | Active Debug Code (Da R2023a) |
CWE Rule 547 | Use of Hard-coded, Security-relevant Constants (Da R2023a) |
CWE Rule 561 | Dead Code (Da R2023a) |
CWE Rule 562 | Return of Stack Variable Address (Da R2023a) |
CWE Rule 563 | Assignment to Variable without Use (Da R2023a) |
CWE Rule 628 | Function Call with Incorrectly Specified Arguments (Da R2024a) |
CWE Rule 1071 | Empty code block (Da R2023a) |
Problemi comportamentali
CWE Rule 480 | Use of Incorrect Operator (Da R2023a) |
CWE Rule 483 | Incorrect Block Delimitation (Da R2023a) |
CWE Rule 484 | Omitted Break Statement in Switch (Da R2023a) |
CWE Rule 733 | Compiler Optimization Removal or Modification of Security-critical Code (Da R2023a) |
CWE Rule 783 | Operator Precedence Logic Error (Da R2023a) |
Problemi di concorrenza
CWE Rule 366 | Race Condition within a Thread (Da R2023a) |
CWE Rule 367 | Time-of-check Time-of-use (TOCTOU) Race Condition (Da R2024a) |
CWE Rule 663 | Use of a Non-reentrant Function in a Concurrent Context (Da R2024a) |
Errori di gestione delle credenziali
CWE Rule
798 | Use of Hard-coded Credentials (Da R2023a) |
CWE Rule
256 | Plaintext storage of a password (Da R2023a) |
Problemi crittografici
CWE Rule 325 | Missing Cryptographic Step (Da R2024a) |
CWE Rule 328 | Use of Weak Hash (Da R2024a) |
Problemi di integrità dei dati
CWE Rule 353 | Missing Support for Integrity Check (Da R2023a) |
CWE Rule 354 | Improper Validation of Integrity Check Value (Da R2024a) |
Problemi di neutralizzazione dei dati
CWE Rule
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (Da R2024a) |
CWE Rule
88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (Da R2024a) |
CWE Rule
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Da R2023a) |
CWE Rule
90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') (Da R2023a) |
CWE Rule
170 | Improper Null Termination (Da R2023a) |
CWE Rule
188 | Reliance on Data/Memory Layout (Da R2023a) |
CWE Rule
463 | Deletion of Data Structure Sentinel (Da R2023a) |
Errori di elaborazione dei dati
CWE Rule 130 | Improper Handling of Length Parameter Inconsistency (Da R2023a) |
Problemi di validazione dei dati
CWE Rule 129 | Improper Validation of Array Index (Da R2023a) |
CWE Rule 606 | Unchecked Input for Loop Condition (Da R2023b) |
Condizioni di errore, valori di ritorno, codici di stato
CWE Rule 248 | Uncaught Exception (Da R2023a) |
CWE Rule 252 | Unchecked Return Value (Da R2023a) |
CWE Rule 253 | Incorrect Check of Function Return Value (Da R2023a) |
CWE Rule 391 | Unchecked Error Condition (Da R2024a) |
CWE Rule 396 | Declaration of Catch for Generic Exception (Da R2023a) |
CWE Rule 397 | Declaration of Throws for Generic Exception (Da R2023a) |
CWE Rule 617 | Reachable Assertion (Da R2023a) |
Problemi di espressione
CWE Rule 570 | Expression is Always False (Da R2023a) |
CWE Rule 571 | Expression is Always True (Da R2023a) |
Problemi di gestione dei file
CWE Rule 22 | Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') (Da R2024a) |
CWE Rule 426 | Untrusted Search Path (Da R2024a) |
CWE Rule 427 | Uncontrolled Search Path Element (Da R2024a) |
Errori del gestore
CWE Rule 479 | Signal Handler Use of a Non-reentrant Function (Da R2023a) |
Errori nella gestione delle informazioni
CWE Rule 312 | Cleartext Storage of Sensitive Information (Da R2023a) |
CWE Rule 319 | Cleartext Transmission of Sensitive Information (Da R2023b) |
CWE Rule 321 | Use of Hard-coded Cryptographic Key (Da R2023b) |
Errori di inizializzazione e pulizia
CWE Rule 460 | Improper Cleanup on Thrown Exception (Da R2023a) |
Errori di gestione delle chiavi
CWE Rule 322 | Key Exchange without Entity Authentication (Da R2024a) |
Errori del buffer di memoria
CWE Rule 120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') (Da R2023a) |
CWE Rule 123 | Write-what-where Condition (Da R2023a) |
CWE Rule 124 | Buffer Underwrite ('Buffer Underflow') (Da R2023a) |
CWE Rule 125 | Out-of-bounds Read (Da R2023a) |
CWE Rule 131 | Incorrect Calculation of Buffer Size (Da R2023a) |
CWE Rule 786 | Access of Memory Location Before Start of Buffer (Da R2024a) |
CWE Rule 787 | Out-of-bounds Write (Da R2023a) |
CWE Rule 805 | Buffer Access with Incorrect Length Value (Da R2023a) |
Errori numerici
CWE Rule 128 | Wrap-around Error (Da R2023a) |
CWE Rule 191 | Integer Underflow (Wrap or Wraparound) (Da R2023a) |
CWE Rule 192 | Integer Coercion Error (Da R2023a) |
CWE Rule 197 | Numeric Truncation Error (Da R2023a) |
CWE Rule 369 | Divide By Zero (Da R2023a) |
CWE Rule 681 | Incorrect Conversion between Numeric Types (Da R2024a) |
CWE Rule 839 | Numeric Range Comparison Without Minimum Check (Da R2023a) |
Validazione input
CWE Rule
20 | Improper Input Validation (Da R2024a) |
CWE Rule
77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') (Da R2024a) |
CWE Rule
78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') (Da R2024a) |
CWE Rule
88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (Da R2024a) |
CWE Rule
89 | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') (Da R2023a) |
CWE Rule
90 | Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') (Da R2023a) |
CWE Rule
99 | Improper Control of Resource Identifiers ('Resource Injection') (Da R2024b) |
Altri
CWE Rule 14 | Compiler Removal of Code to Clear Buffers (Da R2023a) |
CWE Rule 20 | Improper Input Validation (Da R2024a) |
CWE Rule 23 | Relative Path Traversal (Da R2024a) |
CWE Rule 36 | Absolute Path Traversal (Da R2024a) |
CWE Rule 67 | Improper Handling of Windows Device Names (Da R2024a) |
CWE Rule 77 | Improper Neutralization of Special Elements used in a Command ('Command Injection') (Da R2024a) |
CWE Rule 88 | Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') (Da R2024a) |
CWE Rule 114 | Process Control (Da R2024a) |
CWE Rule 119 | Improper Restriction of Operations within the Bounds of a Memory Buffer (Da R2023a) |
CWE Rule 121 | Stack-based Buffer Overflow (Da R2023a) |
CWE Rule 122 | Heap-based Buffer Overflow (Da R2023a) |
CWE Rule 126 | Buffer Over-read (Da R2023a) |
CWE Rule 127 | Buffer Under-read (Da R2023a) |
CWE Rule
190 | Integer Overflow or Wraparound (Da R2024b) |
CWE Rule 194 | Unexpected Sign Extension (Da R2023a) |
CWE Rule 195 | Signed to Unsigned Conversion Error (Da R2023a) |
CWE Rule 196 | Unsigned to Signed Conversion Error (Da R2023a) |
CWE Rule 198 | Use of Incorrect Byte Ordering (Da R2024a) |
CWE Rule 226 | Sensitive Information in Resource Not Removed Before Reuse (Da R2024a) |
CWE Rule 240 | Improper Handling of Inconsistent Structural Elements (Da R2024a) |
CWE Rule 244 | Improper Clearing of Heap Memory Before Release ('Heap Inspection') (Da R2023a) |
CWE Rule 287 | Improper Authentication (Da R2024a) |
CWE Rule 297 | Improper Validation of Certificate with Host Mismatch (Da R2024a) |
CWE Rule 304 | Missing Critical Step in Authentication (Da R2024a) |
CWE Rule 311 | Missing Encryption of Sensitive Data (Da R2023b) |
CWE Rule 316 | Cleartext Storage of Sensitive Information in Memory (Da R2024a) |
CWE Rule 326 | Inadequate Encryption Strength (Da R2024a) |
CWE Rule 327 | Use of a Broken or Risky Cryptographic Algorithm (Da R2024a) |
CWE Rule 329 | Generation of Predictable IV with CBC Mode (Da R2024a) |
CWE Rule 330 | Use of Insufficiently Random Values (Da R2024a) |
CWE Rule 336 | Same Seed in Pseudo-Random Number Generator (PRNG) (Da R2024a) |
CWE Rule 337 | Predictable Seed in Pseudo-Random Number Generator (PRNG) (Da R2024a) |
CWE Rule 362 | Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (Da R2023a) |
CWE Rule 377 | Insecure Temporary File (Da R2024a) |
CWE Rule 401 | Missing Release of Memory after Effective Lifetime (Da R2023a) |
CWE Rule 404 | Improper Resource Shutdown or Release (Da R2024a) |
CWE Rule 415 | Double Free (Da R2023a) |
CWE Rule 416 | Use After Free (Da R2023a) |
CWE Rule 456 | Missing Initialization of a Variable (Da R2024a) |
CWE Rule 457 | Use of Uninitialized Variable (Da R2023a) |
CWE Rule 471 | Modification of Assumed-Immutable Data (MAID) (Da R2024a) |
CWE Rule 481 | Assigning instead of Comparing (Da R2023a) |
CWE Rule 482 | Comparing instead of Assigning (Da R2023a) |
CWE Rule 493 | Critical Public Variable Without Final Modifier (Da R2023b) |
CWE Rule 495 | Private Data Structure Returned From A Public Method (Da R2023a) |
CWE Rule 496 | Public Data Assigned to Private Array-Typed Field (Da R2023b) |
CWE Rule 498 | Cloneable class containing sensitive information (Da R2023b) |
CWE Rule 500 | Public Static Field Not Marked Final (Da R2023a) |
CWE Rule 522 | Insufficiently Protected Credentials (Da R2023a) |
CWE Rule 532 | Insertion of Sensitive Information into Log File (Da R2024a) |
CWE Rule 535 | Exposure of Information Through Shell Error Message (Da R2024a) |
CWE Rule 543 | Use of Singleton Pattern Without Synchronization in a Multithreaded Context (Da R2024a) |
CWE Rule 558 | Use of getlogin() in Multithreaded Application (Da R2023a) |
CWE Rule 560 | Use of umask() with chmod-style Argument (Da R2023a) |
CWE Rule 573 | Improper Following of Specification by Caller (Da R2024a) |
CWE Rule 590 | Free of Memory not on the Heap (Da R2024a) |
CWE Rule 664 | Improper Control of a Resource Through its Lifetime (Da R2024a) |
CWE Rule 665 | Improper Initialization (Da R2024a) |
CWE Rule 666 | Operation on Resource in Wrong Phase of Lifetime (Da R2024a) |
CWE Rule 667 | Improper Locking (Da R2024a) |
CWE Rule 672 | Operation on a Resource after Expiration or Release (Da R2024a) |
CWE Rule 674 | Uncontrolled Recursion (Da R2024a) |
CWE Rule 675 | Multiple Operations on Resource in Single-Operation Context (Da R2024a) |
CWE Rule 682 | Incorrect Calculation (Da R2024a) |
CWE Rule 683 | Function Call With Incorrect Order of Arguments (Da R2023b) |
CWE Rule 685 | Function Call With Incorrect Number of Arguments (Da R2023a) |
CWE Rule 686 | Function Call With Incorrect Argument Type (Da R2023b) |
CWE Rule 687 | Function Call With Incorrectly Specified Argument Value (Da R2023b) |
CWE Rule 688 | Function Call With Incorrect Variable or Reference as Argument (Da R2023b) |
CWE Rule 690 | Unchecked Return Value to NULL Pointer Dereference (Da R2023a) |
CWE Rule 691 | Insufficient Control Flow Management (Da R2024a) |
CWE Rule 693 | Protection Mechanism Failure (Da R2024a) |
CWE Rule 696 | Incorrect Behavior Order (Da R2024a) |
CWE Rule 703 | Improper Check or Handling of Exceptional Conditions (Da R2024a) |
CWE Rule 704 | Incorrect Type Conversion or Cast (Da R2023a) |
CWE Rule 705 | Incorrect Control Flow Scoping (Da R2024a) |
CWE Rule 710 | Improper Adherence to Coding Standards (Da R2024a) |
CWE Rule 732 | Incorrect Permission Assignment for Critical Resource (Da R2024a) |
CWE Rule 754 | Improper Check for Unusual or Exceptional Conditions (Da R2024a) |
CWE Rule 755 | Improper Handling of Exceptional Conditions (Da R2024a) |
CWE Rule 758 | Reliance on Undefined, Unspecified, or Implementation-Defined Behavior (Da R2024a) |
CWE Rule 759 | Use of a One-Way Hash without a Salt (Da R2024a) |
CWE Rule 762 | Mismatched Memory Management Routines (Da R2023a) |
CWE Rule 780 | Use of RSA Algorithm without OAEP (Da R2024a) |
CWE Rule 785 | Use of Path Manipulation Function without Maximum-sized Buffer (Da R2023a) |
CWE Rule 789 | Memory Allocation with Excessive Size Value (Da R2023a) |
CWE Rule 806 | Buffer Access Using Size of Source Buffer (Da R2023a) |
CWE Rule 828 | Signal Handler with Functionality that is not Asynchronous-Safe (Da R2024a) |
CWE Rule 922 | Insecure Storage of Sensitive Information (Da R2023a) |
CWE Rule 1335 | Incorrect Bitwise Shift of Integer (Da R2023a) |
CWE Rule 1341 | Multiple Releases of Same Resource or Handle (Da R2023a) |
Problemi di autorizzazione
CWE Rule 766 | Critical Data Element Declared Public (Da R2023a) |
CWE Rule 767 | Access to Critical Private Variable via Public Method (Da R2023a) |
Problemi di puntatore
CWE Rule 466 | Return of Pointer Value Outside of Expected Range (Da R2023a) |
CWE Rule 467 | Use of sizeof() on a Pointer Type (Da R2023a) |
CWE Rule 468 | Incorrect Pointer Scaling (Da R2023a) |
CWE Rule 469 | Use of Pointer Subtraction to Determine Size (Da R2023a) |
CWE Rule 476 | NULL Pointer Dereference (Da R2023a) |
CWE Rule 587 | Assignment of a Fixed Address to a Pointer (Da R2023a) |
CWE Rule 763 | Release of Invalid Pointer or Reference (Da R2023a) |
CWE Rule 822 | Untrusted Pointer Dereference (Da R2023b) |
CWE Rule 823 | Use of Out-of-range Pointer Offset (Da R2024a) |
CWE Rule 824 | Access of Uninitialized Pointer (Da R2023a) |
CWE Rule 825 | Expired Pointer Dereference (Da R2023a) |
Problemi di privilegi
CWE Rule 243 | Creation of chroot Jail Without Changing Working Directory (Da R2023a) |
CWE Rule 250 | Execution with Unnecessary Privileges (Da R2024a) |
CWE Rule 273 | Improper Check for Dropped Privileges (Da R2024a) |
Problemi di numeri casuali
CWE Rule 335 | Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) (Da R2023a) |
CWE Rule 338 | Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) (Da R2023a) |
Problemi di blocco delle risorse
CWE Rule 413 | Improper Resource Locking (Da R2023a) |
CWE Rule 764 | Multiple Locks of a Critical Resource (Da R2024a) |
CWE Rule 765 | Multiple Unlocks of a Critical Resource (Da R2024a) |
CWE Rule 832 | Unlock of a Resource that is not Locked (Da R2024a) |
CWE Rule 833 | Deadlock (Da R2024a) |
Errori di gestione delle risorse
CWE Rule 770 | Allocation of Resources Without Limits or Throttling (Da R2024a) |
CWE Rule 772 | Missing Release of Resource after Effective Lifetime (Da R2024a) |
CWE Rule 826 | Premature Release of Resource During Expected Lifetime (Da R2024a) |
CWE Rule 908 | Use of Uninitialized Resource (Da R2024a) |
CWE Rule 910 | Use of Expired File Descriptor (Da R2023a) |
Errori di segnale
CWE Rule 364 | Signal Handler Race Condition (Da R2023a) |
Problemi di stato
CWE Rule 15 | External Control of System or Configuration Setting (Da R2024a) |
CWE Rule 372 | Incomplete Internal State Distinction (Da R2024a) |
CWE Rule 374 | Passing Mutable Objects to an Untrusted Method (Da R2023b) |
CWE Rule 375 | Returning a Mutable Object to an Untrusted Caller (Da R2023a) |
Errori di stringa
CWE Rule 134 | Use of Externally-Controlled Format String (Da R2023a) |
CWE Rule 135 | Incorrect Calculation of Multi-Byte String Length (Da R2023a) |
Errori di tipo
CWE Rule 843 | Access of Resource Using Incompatible Type ('Type Confusion') (Da R2023a) |
Argomenti
- CWE Coding Standard Coverage Using Polyspace
Group CWE results by category and view list of
all-exact-checkers
. - Polyspace Support for Coding Standards
Check the Polyspace support for different coding standards.
- Check for and Review Coding Standard Violations
Check for violations of AUTOSAR C++14, CERT® C, CERT C++, CWE, MISRA C™, MISRA™ C++, JSF AV C++, or ISO-17961 standards with Polyspace Bug Finder.
MATLAB Command
You clicked a link that corresponds to this MATLAB command:
Run the command by entering it in the MATLAB Command Window. Web browsers do not support MATLAB commands.
Seleziona un sito web
Seleziona un sito web per visualizzare contenuto tradotto dove disponibile e vedere eventi e offerte locali. In base alla tua area geografica, ti consigliamo di selezionare: .
Puoi anche selezionare un sito web dal seguente elenco:
Come ottenere le migliori prestazioni del sito
Per ottenere le migliori prestazioni del sito, seleziona il sito cinese (in cinese o in inglese). I siti MathWorks per gli altri paesi non sono ottimizzati per essere visitati dalla tua area geografica.
Americhe
- América Latina (Español)
- Canada (English)
- United States (English)
Europa
- Belgium (English)
- Denmark (English)
- Deutschland (Deutsch)
- España (Español)
- Finland (English)
- France (Français)
- Ireland (English)
- Italia (Italiano)
- Luxembourg (English)
- Netherlands (English)
- Norway (English)
- Österreich (Deutsch)
- Portugal (English)
- Sweden (English)
- Switzerland
- United Kingdom (English)