CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
182 Collapse of Data Into Unsafe Value
186 Overly Restrictive Regular Expression
188 Reliance on Data/Memory Layout
197 Numeric Truncation Error
198 Use of Incorrect Byte Ordering
205 Information Exposure Through Behavioral Discrepancy
206 Internal Behavioral Inconsistency Information Leak
207 Information Exposure Through an External Behavioral Inconsistency
210 Product-Generated Error Message Information Leak
211 Product-External Error Message Information Leak
215 Information Leak Through Debug Information
217 DEPRECATED: Failure to Protect Stored Data from Modification
218 DEPRECATED (Duplicate): Failure to provide confidentiality for stored data
219 Sensitive Data Under Web Root
220 Sensitive Data Under FTP Root
221 Information Loss or Omission
222 Truncation of Security-relevant Information
223 Omission of Security-relevant Information
224 Obscured Security-relevant Information by Alternate Name
225 DEPRECATED (Duplicate): General Information Management Problems
226 Sensitive Information Uncleared Before Release
227 Failure to Fulfill API Contract ('API Abuse')
230 Improper Handling of Missing Values
231 Improper Handling of Extra Values
232 Improper Handling of Undefined Values
234 Failure to Handle Missing Parameter
236 Improper Handling of Undefined Parameters
237 Improper Handling of Structural Elements
238 Improper Handling of Incomplete Structural Elements
239 Failure to Handle Incomplete Element
243 Failure to Change Working Directory in chroot Jail
244 Failure to Clear Heap Memory Before Release ('Heap Inspection')
245 J2EE Bad Practices: Direct Management of Connections
246 J2EE Bad Practices: Direct Use of Sockets
247 Reliance on DNS Lookups in a Security Decision
249 DEPRECATED: Often Misused: Path Manipulation
25 Path Traversal: '/../filedir'
253 Incorrect Check of Function Return Value
258 Empty Password in Configuration File
260 Password in Configuration File
262 Not Using Password Aging
263 Password Aging with Long Expiration
27 Path Traversal: 'dir/../../filename'
272 Least Privilege Violation
278 Insecure Preserved Inherited Permissions
28 Path Traversal: '..\filedir'
282 Improper Ownership Management
289 Authentication Bypass by Alternate Name
292 Trusting Self-reported DNS Name
293 Using Referer Field for Authentication
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 7 8 (This Page)9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit http://cwe.mitre.org/ for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.