the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
119 Failure to Constrain Operations within the Bounds of a Memory Buffer 11246
79 Failure to Preserve Web Page Structure ('Cross-site Scripting') 9545
20 Improper Input Validation 6098
200 Information Exposure 5302
89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') 5082
284 Access Control (Authorization) Issues 2827
22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 2561
94 Failure to Control Generation of Code ('Code Injection') 2249
287 Improper Authentication 1364
125 Out-of-bounds Read 876
190 Integer Overflow or Wraparound 860
416 Use After Free 702
476 NULL Pointer Dereference 607
362 Race Condition 529
77 Improper Sanitization of Special Elements used in a Command ('Command Injection') 499
59 Improper Link Resolution Before File Access ('Link Following') 483
78 Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') 370
787 Out-of-bounds Write 351
400 Uncontrolled Resource Consumption ('Resource Exhaustion') 243
611 Information Leak Through XML External Entity File Disclosure 230
434 Unrestricted Upload of File with Dangerous Type 197
134 Uncontrolled Format String 196
798 Use of Hard-coded Credentials 175
601 URL Redirection to Untrusted Site ('Open Redirect') 158
502 Deserialization of Untrusted Data 147
74 Failure to Sanitize Data into a Different Plane ('Injection') 144
704 Incorrect Type Conversion or Cast 119
285 Improper Access Control (Authorization) 104
415 Double Free 98
369 Divide By Zero 73
326 Inadequate Encryption Strength 67
532 Information Leak Through Log Files 58
345 Insufficient Verification of Data Authenticity 45
306 Missing Authentication for Critical Function 39
640 Weak Password Recovery Mechanism for Forgotten Password 35
129 Improper Validation of Array Index 32
347 Improper Verification of Cryptographic Signature 30
191 Integer Underflow (Wrap or Wraparound) 29
428 Unquoted Search Path or Element 28
327 Use of a Broken or Risky Cryptographic Algorithm 27
427 Uncontrolled Search Path Element 26
346 Origin Validation Error 23
693 Protection Mechanism Failure 22
613 Insufficient Session Expiration 19
93 Failure to Sanitize CRLF Sequences ('CRLF Injection') 19
358 Improperly Implemented Security Check for Standard 17
113 Failure to Sanitize CRLF Sequences in HTTP Headers ('HTTP Response Splitting') 14
118 Improper Access of Indexable Resource ('Range Error') 12
444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') 12
754 Improper Check for Unusual or Exceptional Conditions 12
Total number of cwe definitions : 668   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.