the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
496 Public Data Assigned to Private Array-Typed Field
498 Information Leak through Class Cloning
499 Serializable Class Containing Sensitive Data
5 J2EE Misconfiguration: Data Transmission Without Encryption
50 Path Equivalence: '//multiple/leading/slash'
500 Public Static Field Not Marked Final
501 Trust Boundary Violation
508 Non-Replicating Malicious Code
509 Replicating Malicious Code (Virus or Worm)
51 Path Equivalence: '/multiple//internal/slash'
510 Trapdoor
511 Logic/Time Bomb
512 Spyware
514 Covert Channel
515 Covert Storage Channel
516 DEPRECATED (Duplicate): Covert Timing Channel
52 Path Equivalence: '/multiple/trailing/slash//'
520 .NET Misconfiguration: Use of Impersonation
526 Information Leak Through Environmental Variables
528 Exposure of Core Dump File to an Unauthorized Control Sphere
529 Exposure of Access Control List Files to an Unauthorized Control Sphere
53 Path Equivalence: '\multiple\\internal\backslash'
530 Exposure of Backup File to an Unauthorized Control Sphere
531 Information Leak Through Test Code
533 Information Leak Through Server Log Files
535 Information Leak Through Shell Error Message
536 Information Leak Through Servlet Runtime Error Message
537 Information Leak Through Java Runtime Error Message
54 Path Equivalence: 'filedir\' (Trailing Backslash)
541 Information Leak Through Include Source Code
542 Information Leak Through Cleanup Log Files
543 Use of Singleton Pattern in a Non-thread-safe Manner
544 Failure to Use a Standardized Error Handling Mechanism
545 Use of Dynamic Class Loading
546 Suspicious Comment
547 Use of Hard-coded, Security-relevant Constants
55 Path Equivalence: '/./' (Single Dot Directory)
550 Information Leak Through Server Error Message
553 Command Shell in Externally Accessible Directory
554 ASP.NET Misconfiguration: Not Using Input Validation Framework
555 J2EE Misconfiguration: Plaintext Password in Configuration File
556 ASP.NET Misconfiguration: Use of Identity Impersonation
558 Use of getlogin() in Multithreaded Application
56 Path Equivalence: 'filedir*' (Wildcard)
560 Use of umask() with chmod-style Argument
561 Dead Code
563 Unused Variable
564 SQL Injection: Hibernate
566 Access Control Bypass Through User-Controlled SQL Primary Key
568 finalize() Method Without super.finalize()
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 7 8 9 10 11 (This Page)12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.