Want the complete list of all weaknesses? Contact firstname.lastname@example.org
What is a CWE?
What is the difference between CWE and CVE?
How do you prevent Linux weaknesses?
Attribution and Disclaimer: The information from this page is taken from the open source tool created by David A. Wheeler called FlawFinder. We appreciate all his excellent work! To learn about any disclaimers and limitations to FlawFinder check out his website by clicking the link David A. Wheeler. Polyverse assumes no responsibility or liability for the content of FlawFinder and any errors or omissions in such content or website. Furthermore, this content, and the application of Polymorphing for Linux to FlawFinder’s content, is offered on a demonstrational basis for informational purposes only and is intended to illustrate classes of issues mitigated by Polymorphing for Linux. Results may vary depending on the application of Polymorphing for Linux in an actual operating environment. Polyverse hereby expressly disclaims any and all responsibility and liability to any third party in connection with the use of this weakness report tool.
There are commercial scanning tools available that can provide more in depth code analyses. We suggest MicroFocus's Fortify Static Code Analyzer and Semmle's Semmle QL in particular.
*This is a subset (100) of the full dataset, to learn more, please contact email@example.com