CWE-733: Compiler Optimization Removal or Modification of Security-critical Code

ID CWE-733
Abstraction Base
Structure Simple
Status Incomplete
Number of CVEs 1
The developer builds a security-critical protection mechanism into the software, but the compiler optimizes the program such that the mechanism is removed or modified.

Applicable Platforms

Type Class Name Prevalence
Language C
Language C++
Language Compiled

Relationships

View Weakness
# ID View Status # ID Name Abstraction Structure Status
CWE-1000 Research Concepts Draft CWE-1038 Insecure Automated Optimizations Class Simple Draft

Common Attack Pattern Enumeration and Classification (CAPEC)

The Common Attack Pattern Enumeration and Classification (CAPECâ„¢) effort provides a publicly available catalog of common attack patterns that helps users understand how adversaries exploit weaknesses in applications and other cyber-enabled capabilities.

CAPEC at Mitre.org
# ID Name Weaknesses
CAPEC-8 Buffer Overflow in an API Call CWE-733
CAPEC-9 Buffer Overflow in Local Command-Line Utilities CWE-733
CAPEC-10 Buffer Overflow via Environment Variables CWE-733
CAPEC-24 Filter Failure through Buffer Overflow CWE-733
CAPEC-46 Overflow Variables and Tags CWE-733

CVEs Published

CVSS Severity

CVSS Severity - By Year

CVSS Base Score

# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories Exploits PoC Pubblication Date Modification Date
# CVE Description CVSS EPSS EPSS Trend (30 days) Affected Products Weaknesses Security Advisories PoC Pubblication Date Modification Date
Loading...
Loading...