CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
539 Information Leak Through Persistent Cookies
538 File and Directory Information Exposure
537 Information Leak Through Java Runtime Error Message
536 Information Leak Through Servlet Runtime Error Message
535 Information Leak Through Shell Error Message
534 Information Leak Through Debug Log Files
533 Information Leak Through Server Log Files
532 Information Leak Through Log Files
531 Information Leak Through Test Code
530 Exposure of Backup File to an Unauthorized Control Sphere
53 Path Equivalence: '\multiple\\internal\backslash'
529 Exposure of Access Control List Files to an Unauthorized Control Sphere
528 Exposure of Core Dump File to an Unauthorized Control Sphere
527 Exposure of CVS Repository to an Unauthorized Control Sphere
526 Information Leak Through Environmental Variables
525 Information Leak Through Browser Caching
524 Information Leak Through Caching
523 Unprotected Transport of Credentials
522 Insufficiently Protected Credentials
521 Weak Password Requirements
520 .NET Misconfiguration: Use of Impersonation
52 Path Equivalence: '/multiple/trailing/slash//'
516 DEPRECATED (Duplicate): Covert Timing Channel
515 Covert Storage Channel
514 Covert Channel
512 Spyware
511 Logic/Time Bomb
510 Trapdoor
51 Path Equivalence: '/multiple//internal/slash'
509 Replicating Malicious Code (Virus or Worm)
508 Non-Replicating Malicious Code
507 Trojan Horse
506 Embedded Malicious Code
502 Deserialization of Untrusted Data
501 Trust Boundary Violation
500 Public Static Field Not Marked Final
50 Path Equivalence: '//multiple/leading/slash'
5 J2EE Misconfiguration: Data Transmission Without Encryption
499 Serializable Class Containing Sensitive Data
498 Information Leak through Class Cloning
497 Exposure of System Data to an Unauthorized Control Sphere
496 Public Data Assigned to Private Array-Typed Field
495 Private Array-Typed Field Returned From A Public Method
494 Download of Code Without Integrity Check
493 Critical Public Variable Without Final Modifier
492 Use of Inner Class Containing Sensitive Data
491 Public cloneable() Method Without Final ('Object Hijack')
49 Path Equivalence: 'filename/' (Trailing Slash)
489 Leftover Debug Code
488 Data Leak Between Sessions
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 (This Page)7 8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit http://cwe.mitre.org/ for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.