CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
119 Failure to Constrain Operations within the Bounds of a Memory Buffer 7229
79 Failure to Preserve Web Page Structure ('Cross-site Scripting') 6612
89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') 4178
20 Improper Input Validation 3967
200 Information Exposure 2815
94 Failure to Control Generation of Code ('Code Injection') 2056
22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 1887
287 Improper Authentication 1005
59 Improper Link Resolution Before File Access ('Link Following') 418
284 Access Control (Authorization) Issues 414
362 Race Condition 375
78 Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') 207
134 Uncontrolled Format String 157
77 Improper Sanitization of Special Elements used in a Command ('Command Injection') 69
416 Use After Free 57
125 Out-of-bounds Read 38
190 Integer Overflow or Wraparound 27
345 Insufficient Verification of Data Authenticity 25
74 Failure to Sanitize Data into a Different Plane ('Injection') 24
476 NULL Pointer Dereference 24
787 Out-of-bounds Write 16
285 Improper Access Control (Authorization) 11
415 Double Free 6
798 Use of Hard-coded Credentials 5
704 Incorrect Type Conversion or Cast 4
601 URL Redirection to Untrusted Site ('Open Redirect') 4
611 Information Leak Through XML External Entity File Disclosure 3
172 Encoding Error 3
640 Weak Password Recovery Mechanism for Forgotten Password 2
434 Unrestricted Upload of File with Dangerous Type 2
400 Uncontrolled Resource Consumption ('Resource Exhaustion') 2
297 Improper Validation of Host-specific Certificate Data 2
113 Failure to Sanitize CRLF Sequences in HTTP Headers ('HTTP Response Splitting') 2
93 Failure to Sanitize CRLF Sequences ('CRLF Injection') 1
693 Protection Mechanism Failure 1
502 Deserialization of Untrusted Data 1
428 Unquoted Search Path or Element 1
427 Uncontrolled Search Path Element 1
369 Divide By Zero 1
327 Use of a Broken or Risky Cryptographic Algorithm 1
191 Integer Underflow (Wrap or Wraparound) 1
99 Improper Control of Resource Identifiers ('Resource Injection')
98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP File Inclusion')
97 Failure to Sanitize Server-Side Includes (SSI) Within a Web Page
96 Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
95 Improper Sanitization of Directives in Dynamically Evaluated Code ('Eval Injection')
92 DEPRECATED: Improper Sanitization of Custom Special Characters
91 XML Injection (aka Blind XPath Injection)
90 Failure to Sanitize Data into LDAP Queries ('LDAP Injection')
9 J2EE Misconfiguration: Weak Access Permissions for EJB Methods
Total number of cwe definitions : 668   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit http://cwe.mitre.org/ for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.