Incorrect Behavior Order: Early Amplification
The software allows an entity to perform a legitimate but expensive operation before authentication or authorization has taken place.
This data prints the contents of a specified file requested by a user.
This code first reads a specified file into memory, then prints the file if the user is authorized to see its contents. The read of the file into memory may be resource intensive and is unnecessary if the user is not allowed to see the file anyway.
This category identifies Software Fault Patterns (SFPs) within the Design cluster.
Weaknesses in this category are related to unexpected behaviors from code that an application uses.
This view (slice) covers all the elements in CWE.
This view contains a selection of weaknesses that represent the variety of weaknesses that are captured in CWE, at a level of abstraction that is likely to be useful t...