CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
79 Failure to Preserve Web Page Structure ('Cross-site Scripting') 5276
119 Failure to Constrain Operations within the Bounds of a Memory Buffer 5151
89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') 3834
20 Improper Input Validation 2992
94 Failure to Control Generation of Code ('Code Injection') 1906
22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 1643
200 Information Exposure 1627
287 Improper Authentication 897
59 Improper Link Resolution Before File Access ('Link Following') 386
362 Race Condition 286
134 Uncontrolled Format String 151
78 Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') 134
102 Struts: Duplicate Validation Forms
103 Struts: Incomplete validate() Method Definition
104 Struts: Form Bean Does Not Extend Validation Class
105 Struts: Form Field Without Validator
106 Struts: Plug-in Framework not in Use
107 Struts: Unused Validation Form
108 Struts: Unvalidated Action Form
109 Struts: Validator Turned Off
11 ASP.NET Misconfiguration: Creating Debug Binary
110 Struts: Validator Without Form Field
111 Direct Use of Unsafe JNI
112 Missing XML Validation
113 Failure to Sanitize CRLF Sequences in HTTP Headers ('HTTP Response Splitting')
114 Process Control
115 Misinterpretation of Input
116 Improper Encoding or Escaping of Output
117 Improper Output Sanitization for Logs
118 Improper Access of Indexable Resource ('Range Error')
12 ASP.NET Misconfiguration: Missing Custom Error Page
120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
121 Stack-based Buffer Overflow
122 Heap-based Buffer Overflow
123 Write-what-where Condition
124 Buffer Underwrite ('Buffer Underflow')
125 Out-of-bounds Read
126 Buffer Over-read
127 Buffer Under-read
128 Wrap-around Error
129 Improper Validation of Array Index
13 ASP.NET Misconfiguration: Password in Configuration File
130 Improper Handling of Length Parameter Inconsistency
131 Incorrect Calculation of Buffer Size
132 DEPRECATED (Duplicate): Miscalculated Null Termination
135 Incorrect Calculation of Multi-Byte String Length
138 Improper Neutralization of Special Elements
14 Compiler Removal of Code to Clear Buffers
140 Failure to Sanitize Delimiters
141 Improper Neutralization of Parameter/Argument Delimiters
Total number of cwe definitions : 668   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit http://cwe.mitre.org/ for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.