the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
119 Failure to Constrain Operations within the Bounds of a Memory Buffer 12328
79 Failure to Preserve Web Page Structure ('Cross-site Scripting') 11807
20 Improper Input Validation 7669
200 Information Exposure 6316
89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') 5643
22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 2968
94 Failure to Control Generation of Code ('Code Injection') 2400
125 Out-of-bounds Read 2122
287 Improper Authentication 1746
284 Access Control (Authorization) Issues 1627
416 Use After Free 1256
190 Integer Overflow or Wraparound 1113
476 NULL Pointer Dereference 900
78 Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') 788
787 Out-of-bounds Write 737
362 Race Condition 615
59 Improper Link Resolution Before File Access ('Link Following') 518
77 Improper Sanitization of Special Elements used in a Command ('Command Injection') 489
400 Uncontrolled Resource Consumption ('Resource Exhaustion') 463
611 Information Leak Through XML External Entity File Disclosure 393
434 Unrestricted Upload of File with Dangerous Type 385
732 Incorrect Permission Assignment for Critical Resource 350
74 Failure to Sanitize Data into a Different Plane ('Injection') 327
798 Use of Hard-coded Credentials 319
772 Missing Release of Resource after Effective Lifetime 306
269 Improper Privilege Management 305
601 URL Redirection to Untrusted Site ('Open Redirect') 265
502 Deserialization of Untrusted Data 257
134 Uncontrolled Format String 216
704 Incorrect Type Conversion or Cast 180
415 Double Free 173
522 Insufficiently Protected Credentials 158
532 Information Leak Through Log Files 133
326 Inadequate Encryption Strength 111
369 Divide By Zero 111
285 Improper Access Control (Authorization) 110
306 Missing Authentication for Critical Function 90
120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 80
319 Cleartext Transmission of Sensitive Information 76
347 Improper Verification of Cryptographic Signature 76
770 Allocation of Resources Without Limits or Throttling 76
427 Uncontrolled Search Path Element 74
345 Insufficient Verification of Data Authenticity 68
617 Reachable Assertion 68
129 Improper Validation of Array Index 67
327 Use of a Broken or Risky Cryptographic Algorithm 65
668 Exposure of Resource to Wrong Sphere 63
276 Incorrect Default Permissions 60
404 Improper Resource Shutdown or Release 59
311 Missing Encryption of Sensitive Data 56
Total number of cwe definitions : 668   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.