the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
487 Reliance on Package-level Scope
486 Comparison of Classes by Name
485 Insufficient Encapsulation
484 Omitted Break Statement in Switch
483 Incorrect Block Delimitation
482 Comparing instead of Assigning
481 Assigning instead of Comparing
480 Use of Incorrect Operator
48 Path Equivalence: 'file name' (Internal Whitespace)
479 Unsafe Function Call from a Signal Handler
478 Missing Default Case in Switch Statement
477 Use of Obsolete Functions
476 NULL Pointer Dereference
475 Undefined Behavior for Input to API
474 Use of Function with Inconsistent Implementations
473 PHP External Variable Modification
472 External Control of Assumed-Immutable Web Parameter
471 Modification of Assumed-Immutable Data (MAID)
470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
47 Path Equivalence: ' filename (Leading Space)
469 Use of Pointer Subtraction to Determine Size
468 Incorrect Pointer Scaling
467 Use of sizeof() on a Pointer Type
466 Return of Pointer Value Outside of Expected Range
464 Addition of Data Structure Sentinel
463 Deletion of Data Structure Sentinel
462 Duplicate Key in Associative List (Alist)
460 Improper Cleanup on Thrown Exception
46 Path Equivalence: 'filename ' (Trailing Space)
459 Incomplete Cleanup
458 DEPRECATED: Incorrect Initialization
457 Use of Uninitialized Variable
456 Missing Initialization
455 Non-exit on Failed Initialization
454 External Initialization of Trusted Variables or Data Stores
453 Insecure Default Variable Initialization
451 UI Misrepresentation of Critical Information
450 Multiple Interpretations of UI Input
45 Path Equivalence: '' (Multiple Internal Dot)
449 The UI Performs the Wrong Action
448 Obsolete Feature in UI
447 Unimplemented or Unsupported Feature in UI
446 UI Discrepancy for Security Feature
444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
443 DEPRECATED (Duplicate): HTTP response splitting
441 Unintended Proxy/Intermediary
440 Expected Behavior Violation
44 Path Equivalence: '' (Internal Dot)
439 Behavioral Change in New Version or Environment
437 Incomplete Model of Endpoint Features
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 7 (This Page)8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.