CWE Weaknesses

592 weakness types across all published CVEs

CWE ID Weakness Name CVEs
CWE-79 Cross-site Scripting (XSS) 9101
CWE-862 Missing Authorization 2777
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') 2501
CWE-89 SQL Injection 2307
CWE-352 Cross-Site Request Forgery (CSRF) 1978
CWE-22 Path Traversal 1458
CWE-119 Buffer Overflow 1168
CWE-284 Improper Access Control 1107
CWE-416 Use After Free 1015
CWE-125 Out-of-bounds Read 1011
CWE-476 NULL Pointer Dereference 962
CWE-78 OS Command Injection 948
CWE-200 Information Exposure 947
CWE-787 Out-of-bounds Write 894
CWE-20 Improper Input Validation 885
CWE-918 Server-Side Request Forgery (SSRF) 840
CWE-98 PHP Remote File Inclusion 783
CWE-94 Code Injection 733
CWE-502 Deserialization of Untrusted Data 696
CWE-77 Command Injection 679
CWE-863 Incorrect Authorization 664
CWE-121 Stack-based Buffer Overflow 653
CWE-434 Unrestricted Upload of File with Dangerous Type 624
CWE-122 Heap-based Buffer Overflow 615
CWE-639 Authorization Bypass Through User-Controlled Key 536
CWE-120 Classic Buffer Overflow 535
CWE-400 Uncontrolled Resource Consumption 530
CWE-306 Missing Authentication for Critical Function 504
CWE-266 Incorrect Privilege Assignment 494
CWE-770 Allocation of Resources Without Limits or Throttling 478
CWE-287 Improper Authentication 434
CWE-269 Improper Privilege Management 375
CWE-362 Race Condition 339
CWE-401 Memory Leak 314
CWE-601 URL Redirection to Untrusted Site (Open Redirect) 287
CWE-190 Integer Overflow or Wraparound 285
CWE-285 Improper Authorization 243
CWE-276 Incorrect Default Permissions 233
CWE-288 Authentication Bypass Using an Alternate Path or Channel 225
CWE-427 Uncontrolled Search Path Element 217
CWE-295 Improper Certificate Validation 206
CWE-732 Incorrect Permission Assignment for Critical Resource 203
CWE-798 Use of Hard-coded Credentials 188
CWE-428 Unquoted Search Path or Element 187
CWE-404 Improper Resource Shutdown or Release 185
CWE-532 Insertion of Sensitive Information into Log File 183
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere 176
CWE-201 Insertion of Sensitive Information Into Sent Data 169
CWE-59 Improper Link Resolution Before File Access 162
CWE-73 External Control of File Name or Path 159
CWE-667 Improper Locking 148
CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition 134
CWE-80 Basic XSS 132
CWE-522 Insufficiently Protected Credentials 130
CWE-290 Authentication Bypass by Spoofing 130
CWE-843 Access of Resource Using Incompatible Type (Type Confusion) 125
CWE-908 Use of Uninitialized Resource 124
CWE-307 Improper Restriction of Excessive Authentication Attempts 124
CWE-754 Improper Check for Unusual or Exceptional Conditions 122
CWE-693 Protection Mechanism Failure 121
CWE-126 Buffer Over-read 120
CWE-617 Reachable Assertion 120
CWE-347 Improper Verification of Cryptographic Signature 119
CWE-23 Relative Path Traversal 118
CWE-319 Cleartext Transmission of Sensitive Information 117
CWE-209 Error Message Information Leak 115
CWE-611 Improper Restriction of XML External Entity Reference 106
CWE-613 Insufficient Session Expiration 105
CWE-312 Cleartext Storage of Sensitive Information 103
CWE-835 Loop with Unreachable Exit Condition (Infinite Loop) 100
CWE-415 Double Free 99
CWE-346 Origin Validation Error 98
CWE-426 Untrusted Search Path 96
CWE-1321 Improperly Controlled Modification of Object Prototype Attributes (Prototype Pollution) 93
CWE-327 Use of a Broken or Risky Cryptographic Algorithm 92
CWE-321 Use of Hard-coded Cryptographic Key 92
CWE-1333 Inefficient Regular Expression Complexity (ReDoS) 89
CWE-451 User Interface (UI) Misrepresentation of Critical Information 87
CWE-250 Execution with Unnecessary Privileges 87
CWE-345 Insufficient Verification of Data Authenticity 84
CWE-1284 Improper Validation of Specified Quantity in Input 80
CWE-191 Integer Underflow 77
CWE-129 Improper Validation of Array Index 76
CWE-674 Uncontrolled Recursion 75
CWE-35 Path Traversal: '.../...//' 75
CWE-248 Uncaught Exception 73
CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') 73
CWE-203 Observable Discrepancy 66
CWE-359 Exposure of Private Personal Information to an Unauthorized Actor 64
CWE-552 Files or Directories Accessible to External Parties 64
CWE-116 Improper Encoding or Escaping of Output 63
CWE-369 Divide By Zero 61
CWE-256 Plaintext Storage of a Password 61
CWE-204 Observable Response Discrepancy 60
CWE-444 HTTP Request/Response Smuggling 60
CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine 58
CWE-1287 Improper Validation of Specified Type of Input 57
CWE-822 Untrusted Pointer Dereference 57
CWE-1021 Improper Restriction of Rendered UI Layers or Frames 55
CWE-384 Session Fixation 52
CWE-36 Absolute Path Traversal 51
CWE-281 Improper Preservation of Permissions 50
CWE-1188 Initialization of a Resource with an Insecure Default 50
CWE-259 Use of Hard-coded Password 50
CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection') 46
CWE-1392 Use of Default Credentials 45
CWE-280 Improper Handling of Insufficient Permissions or Privileges 45
CWE-61 UNIX Symbolic Link (Symlink) Following 45
CWE-922 Insecure Storage of Sensitive Information 44
CWE-472 External Control of Assumed-Immutable Web Parameter 44
CWE-829 Inclusion of Functionality from Untrusted Control Sphere 43
CWE-305 Authentication Bypass by Primary Weakness 43
CWE-640 Weak Password Recovery Mechanism for Forgotten Password 41
CWE-602 Client-Side Enforcement of Server-Side Security 41
CWE-494 Download of Code Without Integrity Check 41
CWE-1390 Weak Authentication 41
CWE-521 Weak Password Requirements 40
CWE-441 Unintended Proxy or Intermediary ('Confused Deputy') 40
CWE-457 Use of Uninitialized Variable 40
CWE-208 Observable Timing Discrepancy 39
CWE-598 Use of GET Request Method With Sensitive Query Strings 36
CWE-620 Unverified Password Change 36
CWE-789 Memory Allocation with Excessive Size Value 35
CWE-926 Improper Export of Android Application Components 35
CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) 34
CWE-95 Eval Injection 34
CWE-755 Improper Handling of Exceptional Conditions 33
CWE-264 Permissions, Privileges, and Access Controls 33
CWE-1220 Insufficient Granularity of Access Control 33
CWE-294 Authentication Bypass by Capture-replay 32
CWE-653 Improper Isolation or Compartmentalization 32
CWE-407 Inefficient Algorithmic Complexity 32
CWE-824 Access of Uninitialized Pointer 32
CWE-610 Externally Controlled Reference to a Resource in Another Sphere 31
CWE-942 Permissive Cross-domain Security Policy with Untrusted Domains 31
CWE-15 External Control of System or Configuration Setting 31
CWE-668 Exposure of Resource to Wrong Sphere 30
CWE-749 Exposed Dangerous Method or Function 30
CWE-117 Improper Output Neutralization for Logs 30
CWE-1286 Improper Validation of Syntactic Correctness of Input 29
CWE-326 Inadequate Encryption Strength 29
CWE-330 Use of Insufficiently Random Values 29
CWE-24 Path Traversal: '../filedir' 29
CWE-538 Insertion of Sensitive Information into Externally-Accessible File 28
CWE-331 Insufficient Entropy 28
CWE-311 Missing Encryption of Sensitive Data 28
CWE-459 Incomplete Cleanup 28
CWE-193 Off-by-one Error 27
CWE-703 Improper Check or Handling of Exceptional Conditions 27
CWE-807 Reliance on Untrusted Inputs in a Security Decision 27
CWE-425 Direct Request ('Forced Browsing') 26
CWE-409 Improper Handling of Highly Compressed Data (Data Amplification) 26
CWE-823 Use of Out-of-range Pointer Offset 26
CWE-184 Incomplete List of Disallowed Inputs 26
CWE-310 Cryptographic Issues 25
CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax 24
CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes 24
CWE-840 Business Logic Errors 23
CWE-354 Improper Validation of Integrity Check Value 23
CWE-303 Incorrect Implementation of Authentication Algorithm 23
CWE-99 Improper Control of Resource Identifiers ('Resource Injection') 22
CWE-506 Embedded Malicious Code 22
CWE-669 Incorrect Resource Transfer Between Spheres 22
CWE-805 Buffer Access with Incorrect Length Value 22
CWE-348 Use of Less Trusted Source 22
CWE-1236 Improper Neutralization of Formula Elements in a CSV File 22
CWE-923 Improper Restriction of Communication Channel to Intended Endpoints 21
CWE-328 Use of Weak Hash 21
CWE-131 Incorrect Calculation of Buffer Size 21
CWE-134 Use of Externally-Controlled Format String 21
CWE-665 Improper Initialization 21
CWE-943 Improper Neutralization of Special Elements in Data Query Logic 21
CWE-912 Hidden Functionality 21
CWE-704 Incorrect Type Conversion or Cast 20
CWE-113 HTTP Response Splitting 20
CWE-90 LDAP Injection 20
CWE-1393 Use of Default Password 20
CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences 19
CWE-277 Insecure Inherited Permissions 19
CWE-1391 Use of Weak Credentials 18
CWE-358 Improperly Implemented Security Check for Standard 18
CWE-680 Integer Overflow to Buffer Overflow 18
CWE-670 Always-Incorrect Control Flow Implementation 18
CWE-405 Asymmetric Resource Consumption (Amplification) 18
CWE-257 Storing Passwords in a Recoverable Format 18
CWE-29 Path Traversal: '\\..\\filename' 17
CWE-913 Improper Control of Dynamically-Managed Code Resources 17
CWE-267 Privilege Defined With Unsafe Actions 16
CWE-41 Improper Resolution of Path Equivalence 16
CWE-252 Unchecked Return Value 16
CWE-178 Improper Handling of Case Sensitivity 16
CWE-841 Improper Enforcement of Behavioral Workflow 16
CWE-130 Improper Handling of Length Parameter Inconsistency 16
CWE-548 Exposure of Information Through Directory Listing 16
CWE-320 Key Management Errors 16
CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer 16
CWE-772 Missing Release of Resource after Effective Lifetime 16
CWE-940 Improper Verification of Source of a Communication Channel 15
CWE-1230 Exposure of Sensitive Information Through Metadata 15
CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input 15
CWE-799 Improper Control of Interaction Frequency 15
CWE-255 Credentials Management Errors 14
CWE-489 Active Debug Code 14
CWE-696 Incorrect Behavior Order 14
CWE-706 Use of Incorrectly-Resolved Name or Reference 14
CWE-791 Incomplete Filtering of Special Elements 14
CWE-591 Sensitive Data Storage in Improperly Locked Memory 14
CWE-525 Use of Web Browser Cache Containing Sensitive Information 13
CWE-289 Authentication Bypass by Alternate Name 13
CWE-524 Use of Cache Containing Sensitive Information 13
CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') 13
CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute 13
CWE-325 Missing Cryptographic Step 13
CWE-91 XML Injection (aka Blind XPath Injection) 13
CWE-297 Improper Validation of Certificate with Host Mismatch 13
CWE-124 Buffer Underwrite ('Buffer Underflow') 13
CWE-189 Numeric Errors 13
CWE-825 Expired Pointer Dereference 13
CWE-420 Unprotected Alternate Channel 13
CWE-1385 Missing Origin Validation in WebSockets 13
CWE-697 Incorrect Comparison 12
CWE-300 Channel Accessible by Non-Endpoint 12
CWE-377 Insecure Temporary File 12
CWE-672 Operation on a Resource after Expiration or Release 12
CWE-378 Creation of Temporary File With Insecure Permissions 12
CWE-648 Incorrect Use of Privileged APIs 12
CWE-304 Missing Critical Step in Authentication 12
CWE-84 Improper Neutralization of Encoded URI Schemes in a Web Page 11
CWE-440 Expected Behavior Violation 11
CWE-283 Unverified Ownership 11
CWE-436 Interpretation Conflict 11
CWE-282 Improper Ownership Management 11
CWE-244 Improper Clearing of Heap Memory Before Release ('Heap Inspection') 11
CWE-424 Improper Protection of Alternate Path 10
CWE-691 Insufficient Control Flow Management 10
CWE-540 Inclusion of Sensitive Information in Source Code 10
CWE-353 Missing Support for Integrity Check 10
CWE-340 Generation of Predictable Numbers or Identifiers 10
CWE-226 Sensitive Information in Resource Not Removed Before Reuse 10
CWE-260 Password in Configuration File 10
CWE-279 Incorrect Execution-Assigned Permissions 10
CWE-488 Exposure of Data Element to Wrong Session 10
CWE-402 Transmission of Private Resources into a New Sphere ('Resource Leak') 10
CWE-316 Cleartext Storage of Sensitive Information in Memory 10
CWE-758 Reliance on Undefined, Unspecified, or Implementation-Defined Behavior 9
CWE-1394 Use of Default Cryptographic Key 9
CWE-202 Exposure of Sensitive Information Through Data Queries 9
CWE-140 Improper Neutralization of Delimiters 9
CWE-681 Incorrect Conversion between Numeric Types 9
CWE-1295 Debug Messages Revealing Unnecessary Information 9
CWE-1240 Use of a Cryptographic Primitive with a Risky Implementation 9
CWE-114 Process Control 9
CWE-1191 On-Chip Debug and Test Interface With Improper Access Control 9
CWE-526 Cleartext Storage of Sensitive Information in an Environment Variable 9
CWE-763 Release of Invalid Pointer or Reference 9
CWE-776 Improper Restriction of Recursive Entity References in DTDs 9
CWE-96 Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') 9
CWE-261 Weak Encoding for Password 9
CWE-123 Write-what-where Condition 8
CWE-682 Incorrect Calculation 8
CWE-636 Not Failing Securely ('Failing Open') 8
CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data 8
CWE-477 Use of Obsolete Function 8
CWE-180 Incorrect Behavior Order: Validate Before Canonicalize 8
CWE-606 Unchecked Input for Loop Condition 8
CWE-778 Insufficient Logging 8
CWE-302 Authentication Bypass by Assumed-Immutable Data 8
CWE-286 Incorrect User Management 8
CWE-323 Reusing a Nonce, Key Pair in Encryption 8
CWE-158 Improper Neutralization of Null Byte or NUL Character 8
CWE-268 Privilege Chaining 8
CWE-1050 Excessive Platform Resource Consumption within a Loop 7
CWE-270 Privilege Context Switching Error 7
CWE-215 Insertion of Sensitive Information Into Debugging Code 7
CWE-1004 Sensitive Cookie Without 'HttpOnly' Flag 7
CWE-64 Windows Shortcut Following (.LNK) 7
CWE-183 Permissive List of Allowed Inputs 7
CWE-565 Reliance on Cookies without Validation and Integrity Checking 7
CWE-185 Incorrect Regular Expression 7
CWE-603 Use of Client-Side Authentication 7
CWE-356 Product UI does not Warn User of Unsafe Actions 7
CWE-1289 Improper Validation of Unsafe Equivalence in Input 7
CWE-590 Free of Memory not on the Heap 7
CWE-564 SQL Injection: Hibernate 7
CWE-379 Creation of Temporary File in Directory with Insecure Permissions 7
CWE-782 Exposed IOCTL with Insufficient Access Control 7
CWE-410 Insufficient Resource Pool 7
CWE-1300 Improper Protection of Physical Side Channels 7
CWE-664 Improper Control of a Resource Through its Lifetime 7
CWE-272 Least Privilege Violation 6
CWE-115 Misinterpretation of Input 6
CWE-708 Incorrect Ownership Assignment 6
CWE-87 Improper Neutralization of Alternate XSS Syntax 6
CWE-213 Exposure of Sensitive Information Due to Incompatible Policies 6
CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement 6
CWE-460 Improper Cleanup on Thrown Exception 6
CWE-830 Inclusion of Web Functionality from an Untrusted Source 6
CWE-27 Path Traversal: 'dir/../../filename' 6
CWE-366 Race Condition within a Thread 6
CWE-1244 Internal Asset Exposed to Unsafe Debug Access Level or State 6
CWE-641 Improper Restriction of Names for Files and Other Resources 6
CWE-322 Key Exchange without Entity Authentication 6
CWE-698 Execution After Redirect (EAR) 6
CWE-83 Improper Neutralization of Script in Attributes in a Web Page 6
CWE-390 Detection of Error Condition Without Action 6
CWE-228 Improper Handling of Syntactically Invalid Structure 6
CWE-176 Improper Handling of Unicode Encoding 6
CWE-1104 Use of Unmaintained Third Party Components 6
CWE-1259 Improper Restriction of Security Token Assignment 6
CWE-549 Missing Password Field Masking 6
CWE-939 Improper Authorization in Handler for Custom URL Scheme 6
CWE-1242 Inclusion of Undocumented Features or Chicken Bits 6
CWE-155 Improper Neutralization of Wildcards or Matching Symbols 5
CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action 5
CWE-820 Missing Synchronization 5
CWE-547 Use of Hard-coded, Security-relevant Constants 5
CWE-1327 Binding to an Unrestricted IP Address 5
CWE-156 Improper Neutralization of Whitespace 5
CWE-837 Improper Enforcement of a Single, Unique Action 5
CWE-916 Use of Password Hash With Insufficient Computational Effort 5
CWE-1262 Improper Access Control for Register Interface 5
CWE-471 Modification of Assumed-Immutable Data (MAID) 5
CWE-1275 Sensitive Cookie with Improper SameSite Attribute 5
CWE-197 Numeric Truncation Error 5
CWE-449 The UI Performs the Wrong Action 5
CWE-501 Trust Boundary Violation 5
CWE-385 Covert Timing Channel 5
CWE-296 Improper Following of a Certificate's Chain of Trust 5
CWE-523 Unprotected Transport of Credentials 5
CWE-337 Predictable Seed in Pseudo-Random Number Generator (PRNG) 5
CWE-1384 Improper Handling of Physical or Environmental Conditions 5
CWE-599 Missing Validation of OpenSSL Certificate 5
CWE-1258 Exposure of Sensitive System Information Due to Uncleared Debug Information 5
CWE-357 Insufficient UI Warning of Dangerous Operations 5
CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) 5
CWE-291 Reliance on IP Address for Authentication 5
CWE-241 Improper Handling of Unexpected Data Type 5
CWE-86 Improper Neutralization of Invalid Characters in Identifiers in Web Pages 5
CWE-1025 Comparison Using Wrong Factors 5
CWE-392 Missing Report of Error Condition 5
CWE-909 Missing Initialization of Resource 5
CWE-684 Incorrect Provision of Specified Functionality 4
CWE-19 Data Processing Errors 4
CWE-821 Incorrect Synchronization 4
CWE-271 Privilege Dropping / Lowering Errors 4
CWE-834 Excessive Iteration 4
CWE-177 Improper Handling of URL Encoding (Hex Encoding) 4
CWE-229 Improper Handling of Values 4
CWE-351 Insufficient Type Distinction 4
CWE-759 Use of a One-Way Hash without a Salt 4
CWE-833 Deadlock 4
CWE-1274 Improper Access Control for Volatile Memory Containing Boot Code 4
CWE-625 Permissive Regular Expression 4
CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') 4
CWE-170 Improper Null Termination 4
CWE-153 Improper Neutralization of Substitution Characters 4
CWE-647 Use of Non-Canonical URL Paths for Authorization Decisions 4
CWE-1325 Improperly Controlled Sequential Memory Allocation 4
CWE-788 Access of Memory Location After End of Buffer 4
CWE-230 Improper Handling of Missing Values 4
CWE-1088 Synchronous Access of Remote Resource without Timeout 4
CWE-566 Authorization Bypass Through User-Controlled SQL Primary Key 4
CWE-214 Invocation of Process Using Visible Sensitive Information 4
CWE-324 Use of a Key Past its Expiration Date 4
CWE-762 Mismatched Memory Management Routines 4
CWE-1260 Improper Handling of Overlap Between Protected Memory Ranges 4
CWE-783 Operator Precedence Logic Error 4
CWE-707 Improper Neutralization 4
CWE-656 Reliance on Security Through Obscurity 4
CWE-274 Improper Handling of Insufficient Privileges 4
CWE-627 Dynamic Variable Evaluation 4
CWE-394 Unexpected Status Code or Return Value 4
CWE-195 Signed to Unsigned Conversion Error 4
CWE-804 Guessable CAPTCHA 4
CWE-233 Improper Handling of Parameters 4
CWE-657 Violation of Secure Design Principles 4
CWE-223 Omission of Security-relevant Information 3
CWE-308 Use of Single-factor Authentication 3
CWE-646 Reliance on File Name or Extension of Externally-Supplied File 3
CWE-299 Improper Check for Certificate Revocation 3
CWE-242 Use of Inherently Dangerous Function 3
CWE-97 Improper Neutralization of Server-Side Includes (SSI) Within a Web Page 3
CWE-146 Improper Neutralization of Expression/Command Delimiters 3
CWE-67 Improper Handling of Windows Device Names 3
CWE-612 Improper Authorization of Index Containing Sensitive Information 3
CWE-733 Compiler Optimization Removal or Modification of Security-critical Code 3
CWE-187 Partial String Comparison 3
CWE-1326 Missing Immutable Root of Trust in Hardware 3
CWE-790 Improper Filtering of Special Elements 3
CWE-75 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) 3
CWE-253 Incorrect Check of Function Return Value 3
CWE-1023 Incomplete Comparison with Missing Factors 3
CWE-573 Improper Following of Specification by Caller 3
CWE-275 Permission Issues 3
CWE-551 Incorrect Behavior Order: Authorization Before Parsing and Canonicalization 3
CWE-616 Incomplete Identification of Uploaded File Variables (PHP) 3
CWE-1288 Improper Validation of Consistency within Input 3
CWE-1037 Processor Optimization Removal or Modification of Security-critical Code 3
CWE-645 Overly Restrictive Account Lockout Mechanism 3
CWE-475 Undefined Behavior for Input to API 3
CWE-393 Return of Wrong Status Code 3
CWE-159 Improper Handling of Invalid Use of Special Elements 3
CWE-1281 Sequence of Processor Instructions Leads to Unexpected Behavior 3
CWE-395 Use of NullPointerException Catch to Detect NULL Pointer Dereference 3
CWE-232 Improper Handling of Undefined Values 3
CWE-779 Logging of Excessive Data 3
CWE-771 Missing Reference to Active Allocated Resource 3
CWE-921 Storage of Sensitive Data in a Mechanism without Access Control 3
CWE-1328 Security Version Number Mutable to Older Versions 3
CWE-1257 Improper Access Control Applied to Mirrored or Aliased Memory Regions 2
CWE-138 Improper Neutralization of Special Elements 2
CWE-127 Buffer Under-read 2
CWE-1256 Improper Restriction of Software Interfaces to Hardware Features 2
CWE-1173 Improper Use of Validation Framework 2
CWE-683 Function Call With Incorrect Order of Arguments 2
CWE-826 Premature Release of Resource During Expected Lifetime 2
CWE-480 Use of Incorrect Operator 2
CWE-662 Improper Synchronization 2
CWE-562 Return of Stack Variable Address 2
CWE-453 Insecure Default Variable Initialization 2
CWE-531 Inclusion of Sensitive Information in Test Code 2
CWE-298 Improper Validation of Certificate Expiration 2
CWE-1100 Insufficient Isolation of System-Dependent Functions 2
CWE-167 Improper Handling of Additional Special Element 2
CWE-341 Predictable from Observable State 2
CWE-692 Incomplete Denylist to Cross-Site Scripting 2
CWE-1245 Improper Finite State Machines (FSMs) in Hardware Logic 2
CWE-422 Unprotected Windows Messaging Channel ('Shatter') 2
CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface 2
CWE-643 Improper Neutralization of Data within XPath Expressions ('XPath Injection') 2
CWE-396 Declaration of Catch for Generic Exception 2
CWE-650 Trusting HTTP Permission Methods on the Server Side 2
CWE-1022 Use of Web Link to Untrusted Target with window.opener Access 2
CWE-40 Path Traversal: '\\UNC\share\name\' (Windows UNC Share) 2
CWE-1233 Security-Sensitive Hardware Controls with Missing Lock Bit Protection 2
CWE-1250 Improper Preservation of Consistency Between Independent Representations of Shared State 2
CWE-454 External Initialization of Trusted Variables or Data Stores 2
CWE-924 Improper Enforcement of Message Integrity During Transmission 2
CWE-62 UNIX Hard Link 2
CWE-334 Small Space of Random Values 2
CWE-1234 Hardware Internal or Debug Modes Allow Override of Locks 2
CWE-447 Unimplemented or Unsupported Feature in UI 2
CWE-142 Improper Neutralization of Value Delimiters 2
CWE-1231 Improper Prevention of Lock Bit Modification 2
CWE-1241 Use of Predictable Algorithm in Random Number Generator 2
CWE-780 Use of RSA Algorithm without OAEP 2
CWE-16 Configuration 2
CWE-141 Improper Neutralization of Parameter/Argument Delimiters 2
CWE-730 OWASP Top Ten 2004 Category A9 - Denial of Service 2
CWE-329 Generation of Predictable IV with CBC Mode 2
CWE-836 Use of Password Hash Instead of Password for Authentication 2
CWE-760 Use of a One-Way Hash with a Predictable Salt 2
CWE-118 Incorrect Access of Indexable Resource ('Range Error') 2
CWE-413 Improper Resource Locking 2
CWE-437 Incomplete Model of Endpoint Features 2
CWE-705 Incorrect Control Flow Scoping 2
CWE-605 Multiple Binds to the Same Port 2
CWE-149 Improper Neutralization of Quoting Syntax 2
CWE-1007 Insufficient Visual Distinction of Homoglyphs Presented to User 2
CWE-313 Cleartext Storage in a File or on Disk 2
CWE-399 Resource Management Errors 2
CWE-530 Exposure of Backup File to an Unauthorized Control Sphere 2
CWE-1039 Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism 2
CWE-258 Empty Password in Configuration File 2
CWE-1323 Improper Management of Sensitive Trace Data 2
CWE-81 Improper Neutralization of Script in an Error Message Web Page 2
CWE-491 Public cloneable() Method Without Final ('Object Hijack') 2
CWE-273 Improper Check for Dropped Privileges 2
CWE-539 Use of Persistent Cookies Containing Sensitive Information 2
CWE-164 Improper Neutralization of Internal Special Elements 2
CWE-317 Cleartext Storage of Sensitive Information in GUI 2
CWE-941 Incorrectly Specified Destination in a Communication Channel 2
CWE-1032 OWASP Top Ten 2017 Category A6 - Security Misconfiguration 1
CWE-333 Improper Handling of Insufficient Entropy in TRNG 1
CWE-1038 Insecure Automated Optimizations 1
CWE-1263 Improper Physical Access Control 1
CWE-1395 Dependency on Vulnerable Third-Party Component 1
CWE-1116 Inaccurate Source Code Comments 1
CWE-911 Improper Update of Reference Count 1
CWE-1419 Incorrect Initialization of Resource 1
CWE-690 Unchecked Return Value to NULL Pointer Dereference 1
CWE-414 Missing Lock Check 1
CWE-624 Executable Regular Expression Error 1
CWE-673 External Influence of Sphere Definition 1
CWE-69 Improper Handling of Windows ::DATA Alternate Data Stream 1
CWE-235 Improper Handling of Extra Parameters 1
CWE-838 Inappropriate Encoding for Output Context 1
CWE-412 Unrestricted Externally Accessible Lock 1
CWE-240 Improper Handling of Inconsistent Structural Elements 1
CWE-1189 Improper Isolation of Shared Resources on System-on-a-Chip (SoC) 1
CWE-474 Use of Function with Inconsistent Implementations 1
CWE-1427 Improper Neutralization of Input Used for LLM Prompting 1
CWE-1164 Irrelevant Code 1
CWE-694 Use of Multiple Resources with Duplicate Identifier 1
CWE-166 Improper Handling of Missing Special Element 1
CWE-1329 Reliance on Component That is Not Updateable 1
CWE-544 Missing Standardized Error Handling Mechanism 1
CWE-363 Race Condition Enabling Link Following 1
CWE-85 Doubled Character XSS Manipulations 1
CWE-927 Use of Implicit Intent for Sensitive Communication 1
CWE-144 Improper Neutralization of Line Delimiters 1
CWE-5 J2EE Misconfiguration: Data Transmission Without Encryption 1
CWE-701 Weaknesses Introduced During Design 1
CWE-37 Path Traversal: '/absolute/pathname/here' 1
CWE-186 Overly Restrictive Regular Expression 1
CWE-388 7PK - Errors 1
CWE-618 Exposed Unsafe ActiveX Method 1
CWE-688 Function Call With Incorrect Variable or Reference as Argument 1
CWE-786 Access of Memory Location Before Start of Buffer 1
CWE-1386 Insecure Operation on Windows Junction / Mount Point 1
CWE-1125 Excessive Attack Surface 1
CWE-557 Concurrency Issues 1
CWE-774 Allocation of File Descriptors or Handles Without Limits or Throttling 1
CWE-1254 Incorrect Comparison Logic Granularity 1
CWE-1282 Assumed-Immutable Data is Stored in Writable Memory 1
CWE-550 Server-generated Error Message Containing Sensitive Information 1
CWE-1204 Generation of Weak Initialization Vector (IV) 1
CWE-561 Dead Code 1
CWE-567 Unsynchronized Access to Shared Data in a Multithreaded Context 1
CWE-689 Permission Race Condition During Resource Copy 1
CWE-194 Unexpected Sign Extension 1
CWE-265 Privilege Issues 1
CWE-649 Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking 1
CWE-642 External Control of Critical State Data 1
CWE-1046 Creation of Immutable Text Using String Concatenation 1
CWE-172 Encoding Error 1
CWE-1335 Incorrect Bitwise Shift of Integer 1
CWE-336 Same Seed in Pseudo-Random Number Generator (PRNG) 1
CWE-25 Path Traversal: '/../filedir' 1
CWE-231 Improper Handling of Extra Values 1
CWE-343 Predictable Value Range from Previous Values 1
CWE-1314 Missing Write Protection for Parametric Data Values 1
CWE-207 Observable Behavioral Discrepancy With Equivalent Products 1
CWE-179 Incorrect Behavior Order: Early Validation 1
CWE-792 Incomplete Filtering of One or More Instances of Special Elements 1
CWE-462 Duplicate Key in Associative List (Alist) 1
CWE-1112 Incomplete Documentation of Program Execution 1
CWE-76 Improper Neutralization of Equivalent Special Elements 1
CWE-315 Cleartext Storage of Sensitive Information in a Cookie 1
CWE-1174 ASP.NET Misconfiguration: Improper Model Validation 1
CWE-1357 Reliance on Insufficiently Trustworthy Component 1
CWE-1319 Improper Protection against Electromagnetic Fault Injection (EM-FI) 1
CWE-278 Insecure Preserved Inherited Permissions 1
CWE-262 Not Using Password Aging 1
CWE-44 Path Equivalence: 'file.name' (Internal Dot) 1
CWE-1366 ICS Communications: Frail Security in Protocols 1
CWE-364 Signal Handler Race Condition 1
CWE-761 Free of Pointer not at Start of Buffer 1
CWE-112 Missing XML Validation 1
CWE-1176 Inefficient CPU Computation 1
CWE-553 Command Shell in Externally Accessible Directory 1
CWE-403 Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak') 1
CWE-495 Private Data Structure Returned From A Public Method 1
CWE-468 Incorrect Pointer Scaling 1
CWE-1247 Improper Protection Against Voltage and Clock Glitches 1
CWE-430 Deployment of Wrong Handler 1
CWE-1334 Unauthorized Error Injection Can Degrade Hardware Redundancy 1
CWE-188 Reliance on Data/Memory Layout 1
CWE-309 Use of Password System for Primary Authentication 1
CWE-406 Insufficient Control of Network Message Volume (Network Amplification) 1
CWE-528 Exposure of Core Dump File to an Unauthorized Control Sphere 1
CWE-775 Missing Release of File Descriptor or Handle after Effective Lifetime 1
CWE-1102 Reliance on Machine-Dependent Data Representation 1
CWE-1113 Inappropriate Comment Style 1
CWE-794 Incomplete Filtering of Multiple Instances of Special Elements 1
CWE-1270 Generation of Incorrect Security Tokens 1
CWE-1301 Insufficient or Incomplete Data Removal within Hardware Component 1
CWE-1049 Excessive Data Query Operations in a Large Data Table 1
CWE-14 Compiler Removal of Code to Clear Buffers 1
CWE-686 Function Call With Incorrect Argument Type 1
CWE-676 Use of Potentially Dangerous Function 1
CWE-925 Improper Verification of Intent by Broadcast Receiver 1
CWE-227 7PK - API Abuse 1
CWE-419 Unprotected Primary Channel 1
CWE-1108 Excessive Reliance on Global Variables 1
CWE-1223 Race Condition for Write-Once Attributes 1
CWE-628 Function Call with Incorrectly Specified Arguments 1
CWE-237 Improper Handling of Structural Elements 1
CWE-1222 Insufficient Granularity of Address Regions Protected by Register Locks 1
CWE-1091 Use of Object without Invoking Destructor Method 1
CWE-135 Incorrect Calculation of Multi-Byte String Length 1
CWE-198 Use of Incorrect Byte Ordering 1
CWE-446 UI Discrepancy for Security Feature 1
CWE-1068 Inconsistency Between Implementation and Documented Design 1
CWE-1255 Comparison Logic is Vulnerable to Power Side-Channel Attacks 1
CWE-710 Improper Adherence to Coding Standards 1
CWE-463 Deletion of Data Structure Sentinel 1
CWE-196 Unsigned to Signed Conversion Error 1
CWE-671 Lack of Administrator Control over Security 1
CWE-199 Information Management Errors 1
CWE-433 Unparsed Raw Web Content Delivery 1
CWE-962 SFP Secondary Cluster: Unchecked Status Condition 1

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy