Weaknesses Impacting Computing Security