the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
79 Failure to Preserve Web Page Structure ('Cross-site Scripting') 5822
119 Failure to Constrain Operations within the Bounds of a Memory Buffer 5425
89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') 4016
20 Improper Input Validation 3208
94 Failure to Control Generation of Code ('Code Injection') 2011
200 Information Exposure 1881
22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 1737
287 Improper Authentication 946
59 Improper Link Resolution Before File Access ('Link Following') 400
362 Race Condition 315
134 Uncontrolled Format String 154
78 Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') 153
284 Access Control (Authorization) Issues 38
77 Improper Sanitization of Special Elements used in a Command ('Command Injection') 23
74 Failure to Sanitize Data into a Different Plane ('Injection') 6
345 Insufficient Verification of Data Authenticity 5
99 Improper Control of Resource Identifiers ('Resource Injection')
98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP File Inclusion')
97 Failure to Sanitize Server-Side Includes (SSI) Within a Web Page
96 Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
95 Improper Sanitization of Directives in Dynamically Evaluated Code ('Eval Injection')
93 Failure to Sanitize CRLF Sequences ('CRLF Injection')
92 DEPRECATED: Improper Sanitization of Custom Special Characters
91 XML Injection (aka Blind XPath Injection)
90 Failure to Sanitize Data into LDAP Queries ('LDAP Injection')
9 J2EE Misconfiguration: Weak Access Permissions for EJB Methods
88 Argument Injection or Modification
87 Failure to Sanitize Alternate XSS Syntax
86 Improper Neutralization of Invalid Characters in Identifiers in Web Pages
85 Doubled Character XSS Manipulations
84 Failure to Resolve Encoded URI Schemes in a Web Page
83 Improper Neutralization of Script in Attributes in a Web Page
82 Improper Sanitization of Script in Attributes of IMG Tags in a Web Page
81 Improper Sanitization of Script in an Error Message Web Page
807 Reliance on Untrusted Inputs in a Security Decision
806 Buffer Access Using Size of Source Buffer
805 Buffer Access with Incorrect Length Value
804 Guessable CAPTCHA
80 Improper Sanitization of Script-Related HTML Tags in a Web Page (Basic XSS)
8 J2EE Misconfiguration: Entity Bean Declared Remote
799 Improper Control of Interaction Frequency
798 Use of Hard-coded Credentials
797 Only Filtering Special Elements at an Absolute Position
796 Only Filtering Special Elements Relative to a Marker
795 Only Filtering Special Elements at a Specified Location
794 Incomplete Filtering of Multiple Instances of Special Elements
793 Only Filtering One Instance of a Special Element
792 Incomplete Filtering of One or More Instances of Special Elements
791 Incomplete Filtering of Special Elements
790 Improper Filtering of Special Elements
Total number of cwe definitions : 668   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.