Cloud Defense Logo

Products

Solutions

Company

CWE-701: Design Vulnerabilities Inventory

Inventory of vulnerabilities introduced during the design process. Explore weaknesses like 'Improper Input Validation' and 'External Control of File Name or Path'.

Objective

The following inventory identifies the vulnerabilities that may be introduced during the design process.

Is your System Free of Underlying Vulnerabilities?
Find Out Now