CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
549 Missing Password Field Masking
55 Path Equivalence: '/./' (Single Dot Directory)
550 Information Leak Through Server Error Message
551 Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
552 Files or Directories Accessible to External Parties
553 Command Shell in Externally Accessible Directory
554 ASP.NET Misconfiguration: Not Using Input Validation Framework
555 J2EE Misconfiguration: Plaintext Password in Configuration File
556 ASP.NET Misconfiguration: Use of Identity Impersonation
558 Use of getlogin() in Multithreaded Application
56 Path Equivalence: 'filedir*' (Wildcard)
560 Use of umask() with chmod-style Argument
561 Dead Code
562 Return of Stack Variable Address
563 Unused Variable
564 SQL Injection: Hibernate
565 Reliance on Cookies without Validation and Integrity Checking
566 Access Control Bypass Through User-Controlled SQL Primary Key
567 Unsynchronized Access to Shared Data
568 finalize() Method Without super.finalize()
57 Path Equivalence: 'fakedir/../realdir/filename'
570 Expression is Always False
571 Expression is Always True
572 Call to Thread run() instead of start()
573 Failure to Follow Specification
574 EJB Bad Practices: Use of Synchronization Primitives
575 EJB Bad Practices: Use of AWT Swing
576 EJB Bad Practices: Use of Java I/O
577 EJB Bad Practices: Use of Sockets
578 EJB Bad Practices: Use of Class Loader
579 J2EE Bad Practices: Non-serializable Object Stored in Session
58 Path Equivalence: Windows 8.3 Filename
580 clone() Method Without super.clone()
581 Object Model Violation: Just One of Equals and Hashcode Defined
582 Array Declared Public, Final, and Static
583 finalize() Method Declared Public
584 Return Inside Finally Block
585 Empty Synchronized Block
586 Explicit Call to Finalize()
587 Assignment of a Fixed Address to a Pointer
588 Attempt to Access Child of a Non-structure Pointer
589 Call to Non-ubiquitous API
590 Free of Memory not on the Heap
591 Sensitive Data Storage in Improperly Locked Memory
592 Authentication Bypass Issues
593 Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created
594 J2EE Framework: Saving Unserializable Objects to Disk
595 Comparison of Object References Instead of Object Contents
596 Incorrect Semantic Object Comparison
597 Use of Wrong Operator in String Comparison
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 7 8 9 10 (This Page)11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit http://cwe.mitre.org/ for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.