<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=CWEs</id>
	<title>CWEs - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ixheim.de/index.php?action=history&amp;feed=atom&amp;title=CWEs"/>
	<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=CWEs&amp;action=history"/>
	<updated>2026-05-15T06:42:41Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in Xinux Wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://wiki.ixheim.de/index.php?title=CWEs&amp;diff=37767&amp;oldid=prev</id>
		<title>Thomas.will: Die Seite wurde neu angelegt: „*Die Common Weakness Enumeration (CWE)  =Basics= *Das Common Weakness Enumeration-Projekt hat die Liste für das Jahr 2022 der 25 gefährlichsten Softwares…“</title>
		<link rel="alternate" type="text/html" href="https://wiki.ixheim.de/index.php?title=CWEs&amp;diff=37767&amp;oldid=prev"/>
		<updated>2022-11-06T18:15:02Z</updated>

		<summary type="html">&lt;p&gt;Die Seite wurde neu angelegt: „*&lt;a href=&quot;/index.php/Die_Common_Weakness_Enumeration_(CWE)&quot; title=&quot;Die Common Weakness Enumeration (CWE)&quot;&gt;Die Common Weakness Enumeration (CWE)&lt;/a&gt;  =Basics= *Das Common Weakness Enumeration-Projekt hat die Liste für das Jahr 2022 der 25 gefährlichsten Softwares…“&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;*[[Die Common Weakness Enumeration (CWE)]]&lt;br /&gt;
&lt;br /&gt;
=Basics=&lt;br /&gt;
*Das Common Weakness Enumeration-Projekt hat die Liste für das Jahr 2022 der 25 gefährlichsten Softwareschwachstellen zusammengestellt.&lt;br /&gt;
*Die Liste soll die derzeit am meisten vorkommenden Lücken mit den gravierendsten Auswirkungen aufführen. &lt;br /&gt;
*Sie soll helfen Risiken einzudämmen. &lt;br /&gt;
*Sie wendet sich an Softwarearchitekte, Designer, Entwickler, Tester, Nutzer, Projektmanager, Sicherheitsforscher, Ausbilder.&lt;br /&gt;
=Schwachstellen=&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Platz&lt;br /&gt;
! ID&lt;br /&gt;
! Beschreibung&lt;br /&gt;
|-&lt;br /&gt;
| 1&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/787.html CWE-787]&lt;br /&gt;
| [[Out-of-bounds Write]] ([[Buffer-Overflow]])&lt;br /&gt;
|-&lt;br /&gt;
| 2&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/79.html CWE-79]&lt;br /&gt;
| Improper Neutralization of Input During Web Page Generation ([[Cross-Site-Scripting]])&lt;br /&gt;
|-&lt;br /&gt;
| 3&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/89.html CWE-89]&lt;br /&gt;
| Improper Neutralization of Special Elements used in an SQL Command ([[SQL Injection]])&lt;br /&gt;
|-&lt;br /&gt;
| 4&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/20.html CWE-20]&lt;br /&gt;
| Improper Input Validation ([[Command Execution]])&lt;br /&gt;
|-&lt;br /&gt;
| 5&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/125.html CWE-125]&lt;br /&gt;
| [[Out-of-bounds Read]]&lt;br /&gt;
|-&lt;br /&gt;
| 6&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/78.html CWE-78]&lt;br /&gt;
| Improper Neutralization of Special Elements used in an OS Command ('OS [[Command Execution]]')&lt;br /&gt;
|-&lt;br /&gt;
| 7&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/416.html CWE-416]&lt;br /&gt;
| Use After Free&lt;br /&gt;
|-&lt;br /&gt;
| 8&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/22.html CWE-22]&lt;br /&gt;
| Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')&lt;br /&gt;
|-&lt;br /&gt;
| 9&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/352.html CWE-352]&lt;br /&gt;
| Cross-Site Request Forgery (CSRF)&lt;br /&gt;
|-&lt;br /&gt;
| 10&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/434.html CWE-434]&lt;br /&gt;
| Unrestricted Upload of File with Dangerous Type ([[File Inclusion]])&lt;br /&gt;
|-&lt;br /&gt;
| 11&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/476.html CWE-476]&lt;br /&gt;
| [[NULL Pointer Dereference]]&lt;br /&gt;
|-&lt;br /&gt;
| 12&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/502.html CWE-502]&lt;br /&gt;
| Deserialization of Untrusted Data&lt;br /&gt;
|-&lt;br /&gt;
| 13&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/190.html CWE-190]&lt;br /&gt;
| Integer Overflow or Wraparound&lt;br /&gt;
|-&lt;br /&gt;
| 14&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/287.html CWE-287]&lt;br /&gt;
| [[Improper Authentication]]&lt;br /&gt;
|-&lt;br /&gt;
| 15&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/798.html CWE-798]&lt;br /&gt;
| Use of Hard-coded Credentials&lt;br /&gt;
|-&lt;br /&gt;
| 16&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/862.html CWE-862]&lt;br /&gt;
| [[Missing Authorization]]&lt;br /&gt;
|-&lt;br /&gt;
| 17&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/77.html CWE-77]&lt;br /&gt;
| Improper Neutralization of Special Elements used in a Command ('Command Injection')&lt;br /&gt;
|-&lt;br /&gt;
| 18&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/306.html CWE-306]&lt;br /&gt;
| Missing Authentication for Critical Function&lt;br /&gt;
|-&lt;br /&gt;
| 19&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/119.html CWE-119]&lt;br /&gt;
| Improper Restriction of Operations within the Bounds of a Memory Buffer&lt;br /&gt;
|-&lt;br /&gt;
| 20&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/276.html CWE-276]&lt;br /&gt;
| Incorrect Default Permissions&lt;br /&gt;
|-&lt;br /&gt;
| 21&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/918.html CWE-918]&lt;br /&gt;
| Server-Side Request Forgery (SSRF)&lt;br /&gt;
|-&lt;br /&gt;
| 22&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/362.html CWE-362]&lt;br /&gt;
| Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')&lt;br /&gt;
|-&lt;br /&gt;
| 23&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/400.html CWE-400]&lt;br /&gt;
| Uncontrolled Resource Consumption&lt;br /&gt;
|-&lt;br /&gt;
| 24&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/611.html CWE-611]&lt;br /&gt;
| Improper Restriction of XML External Entity Reference&lt;br /&gt;
|-&lt;br /&gt;
| 25&lt;br /&gt;
| [https://cwe.mitre.org/data/definitions/94.html CWE-94]&lt;br /&gt;
| Improper Control of Generation of Code ('Code Injection')&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Quellen=&lt;br /&gt;
*https://cwe.mitre.org/index.html&lt;br /&gt;
*https://www.heise.de/news/Top-25-der-gefaehrlichsten-Software-Schwachstellen-2022-7158261.html&lt;/div&gt;</summary>
		<author><name>Thomas.will</name></author>
	</entry>
</feed>