CWE-657: Violation of Secure Design Principles
low-riskThe product violates well-established principles for secure design.
Abstraction: Class
Common Consequences
Other
→
Other
Real-World Examples (10)
| CVE | CVSS | EPSS | KEV |
|---|---|---|---|
| CVE-2022-28244 | 6.3 | 1.4% | — |
| CVE-2021-36061 | 5.4 | 1.0% | — |
| CVE-2019-15611 | 4.9 | 0.7% | — |
| CVE-2021-28583 | 7.5 | 0.5% | — |
| CVE-2021-44714 | 2.5 | 0.5% | — |
| CVE-2022-30683 | 5.3 | 0.3% | — |
| CVE-2025-24887 | 6.3 | 0.2% | — |
| CVE-2020-8133 | 5.3 | 0.2% | — |
| CVE-2024-26139 | 8.3 | 0.2% | — |
| CVE-2017-6032 | 5.3 | 0.2% | — |
0
/ 100
low-risk
Active Threat
0/50 · Minimal
Exploit Availability
0/50 · Minimal