CWE

CWE ID Name Type Status
CWE-1004 Sensitive Cookie Without 'HttpOnly' Flag Variant Incomplete
CWE-1007 Insufficient Visual Distinction of Homoglyphs Presented to User Base Incomplete
CWE-102 Struts: Duplicate Validation Forms Variant Incomplete
CWE-1021 Improper Restriction of Rendered UI Layers or Frames Base Incomplete
CWE-1022 Use of Web Link to Untrusted Target with window.opener Access Variant Incomplete
CWE-1023 Incomplete Comparison with Missing Factors Class Incomplete
CWE-1024 Comparison of Incompatible Types Base Incomplete
CWE-1025 Comparison Using Wrong Factors Base Incomplete
CWE-103 Struts: Incomplete validate() Method Definition Variant Draft
CWE-1037 Processor Optimization Removal or Modification of Security-critical Code Base Incomplete
CWE-1038 Insecure Automated Optimizations Class Draft
CWE-1039 Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism Class Incomplete
CWE-104 Struts: Form Bean Does Not Extend Validation Class Variant Draft
CWE-1041 Use of Redundant Code Base Incomplete
CWE-1042 Static Member Data Element outside of a Singleton Class Element Variant Incomplete
CWE-1043 Data Element Aggregating an Excessively Large Number of Non-Primitive Elements Base Incomplete
CWE-1044 Architecture with Number of Horizontal Layers Outside of Expected Range Base Incomplete
CWE-1045 Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor Base Incomplete
CWE-1046 Creation of Immutable Text Using String Concatenation Base Incomplete
CWE-1047 Modules with Circular Dependencies Base Incomplete
CWE-1048 Invokable Control Element with Large Number of Outward Calls Base Incomplete
CWE-1049 Excessive Data Query Operations in a Large Data Table Base Incomplete
CWE-105 Struts: Form Field Without Validator Variant Draft
CWE-1050 Excessive Platform Resource Consumption within a Loop Base Incomplete
CWE-1051 Initialization with Hard-Coded Network Resource Configuration Data Base Incomplete
CWE-1052 Excessive Use of Hard-Coded Literals in Initialization Base Incomplete
CWE-1053 Missing Documentation for Design Base Incomplete
CWE-1054 Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer Base Incomplete
CWE-1055 Multiple Inheritance from Concrete Classes Base Incomplete
CWE-1056 Invokable Control Element with Variadic Parameters Base Incomplete
CWE-1057 Data Access Operations Outside of Expected Data Manager Component Base Incomplete
CWE-1058 Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element Base Incomplete
CWE-1059 Insufficient Technical Documentation Class Incomplete
CWE-106 Struts: Plug-in Framework not in Use Variant Draft
CWE-1060 Excessive Number of Inefficient Server-Side Data Accesses Base Incomplete
CWE-1061 Insufficient Encapsulation Class Incomplete
CWE-1062 Parent Class with References to Child Class Base Incomplete
CWE-1063 Creation of Class Instance within a Static Code Block Base Incomplete
CWE-1064 Invokable Control Element with Signature Containing an Excessive Number of Parameters Base Incomplete
CWE-1065 Runtime Resource Management Control Element in a Component Built to Run on Application Servers Base Incomplete
CWE-1066 Missing Serialization Control Element Base Incomplete
CWE-1067 Excessive Execution of Sequential Searches of Data Resource Base Incomplete
CWE-1068 Inconsistency Between Implementation and Documented Design Base Incomplete
CWE-1069 Empty Exception Block Variant Incomplete
CWE-107 Struts: Unused Validation Form Variant Draft
CWE-1070 Serializable Data Element Containing non-Serializable Item Elements Base Incomplete
CWE-1071 Empty Code Block Base Incomplete
CWE-1072 Data Resource Access without Use of Connection Pooling Base Incomplete
CWE-1073 Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses Base Incomplete
CWE-1074 Class with Excessively Deep Inheritance Base Incomplete
CWE-1075 Unconditional Control Flow Transfer outside of Switch Block Base Incomplete
CWE-1076 Insufficient Adherence to Expected Conventions Class Incomplete
CWE-1077 Floating Point Comparison with Incorrect Operator Variant Incomplete
CWE-1078 Inappropriate Source Code Style or Formatting Class Incomplete
CWE-1079 Parent Class without Virtual Destructor Method Base Incomplete
CWE-108 Struts: Unvalidated Action Form Variant Incomplete
CWE-1080 Source Code File with Excessive Number of Lines of Code Base Incomplete
CWE-1082 Class Instance Self Destruction Control Element Base Incomplete
CWE-1083 Data Access from Outside Expected Data Manager Component Base Incomplete
CWE-1084 Invokable Control Element with Excessive File or Data Access Operations Base Incomplete
CWE-1085 Invokable Control Element with Excessive Volume of Commented-out Code Base Incomplete
CWE-1086 Class with Excessive Number of Child Classes Base Incomplete
CWE-1087 Class with Virtual Method without a Virtual Destructor Base Incomplete
CWE-1088 Synchronous Access of Remote Resource without Timeout Base Incomplete
CWE-1089 Large Data Table with Excessive Number of Indices Base Incomplete
CWE-109 Struts: Validator Turned Off Variant Draft
CWE-1090 Method Containing Access of a Member Element from Another Class Base Incomplete
CWE-1091 Use of Object without Invoking Destructor Method Base Incomplete
CWE-1092 Use of Same Invokable Control Element in Multiple Architectural Layers Base Incomplete
CWE-1093 Excessively Complex Data Representation Class Incomplete
CWE-1094 Excessive Index Range Scan for a Data Resource Base Incomplete
CWE-1095 Loop Condition Value Update within the Loop Base Incomplete
CWE-1096 Singleton Class Instance Creation without Proper Locking or Synchronization Variant Incomplete
CWE-1097 Persistent Storable Data Element without Associated Comparison Control Element Base Incomplete
CWE-1098 Data Element containing Pointer Item without Proper Copy Control Element Base Incomplete
CWE-1099 Inconsistent Naming Conventions for Identifiers Base Incomplete
CWE-11 ASP.NET Misconfiguration: Creating Debug Binary Variant Draft
CWE-110 Struts: Validator Without Form Field Variant Draft
CWE-1100 Insufficient Isolation of System-Dependent Functions Base Incomplete
CWE-1101 Reliance on Runtime Component in Generated Code Base Incomplete
CWE-1102 Reliance on Machine-Dependent Data Representation Base Incomplete
CWE-1103 Use of Platform-Dependent Third Party Components Base Incomplete
CWE-1104 Use of Unmaintained Third Party Components Base Incomplete
CWE-1105 Insufficient Encapsulation of Machine-Dependent Functionality Base Incomplete
CWE-1106 Insufficient Use of Symbolic Constants Base Incomplete
CWE-1107 Insufficient Isolation of Symbolic Constant Definitions Base Incomplete
CWE-1108 Excessive Reliance on Global Variables Base Incomplete
CWE-1109 Use of Same Variable for Multiple Purposes Base Incomplete
CWE-111 Direct Use of Unsafe JNI Variant Draft
CWE-1110 Incomplete Design Documentation Base Incomplete
CWE-1111 Incomplete I/O Documentation Base Incomplete
CWE-1112 Incomplete Documentation of Program Execution Base Incomplete
CWE-1113 Inappropriate Comment Style Base Incomplete
CWE-1114 Inappropriate Whitespace Style Base Incomplete
CWE-1115 Source Code Element without Standard Prologue Base Incomplete
CWE-1116 Inaccurate Source Code Comments Base Incomplete
CWE-1117 Callable with Insufficient Behavioral Summary Base Incomplete
CWE-1118 Insufficient Documentation of Error Handling Techniques Base Incomplete
CWE-1119 Excessive Use of Unconditional Branching Base Incomplete
CWE-112 Missing XML Validation Base Draft
CWE-1120 Excessive Code Complexity Class Incomplete
CWE-1121 Excessive McCabe Cyclomatic Complexity Base Incomplete
CWE-1122 Excessive Halstead Complexity Base Incomplete
CWE-1123 Excessive Use of Self-Modifying Code Base Incomplete
CWE-1124 Excessively Deep Nesting Base Incomplete
CWE-1125 Excessive Attack Surface Base Incomplete
CWE-1126 Declaration of Variable with Unnecessarily Wide Scope Base Incomplete
CWE-1127 Compilation with Insufficient Warnings or Errors Base Incomplete
CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') Variant Incomplete
CWE-114 Process Control Class Incomplete
CWE-115 Misinterpretation of Input Base Incomplete
CWE-116 Improper Encoding or Escaping of Output Class Draft
CWE-1164 Irrelevant Code Class Incomplete
CWE-117 Improper Output Neutralization for Logs Base Draft
CWE-1173 Improper Use of Validation Framework Base Draft
CWE-1174 ASP.NET Misconfiguration: Improper Model Validation Variant Draft
CWE-1176 Inefficient CPU Computation Class Incomplete
CWE-1177 Use of Prohibited Code Class Incomplete
CWE-118 Incorrect Access of Indexable Resource ('Range Error') Class Incomplete
CWE-1187 DEPRECATED: Use of Uninitialized Resource Base Deprecated
CWE-1188 Initialization of a Resource with an Insecure Default Base Incomplete
CWE-1189 Improper Isolation of Shared Resources on System-on-a-Chip (SoC) Base Stable
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer Class Stable
CWE-1190 DMA Device Enabled Too Early in Boot Phase Base Draft
CWE-1191 On-Chip Debug and Test Interface With Improper Access Control Base Stable
CWE-1192 Improper Identifier for IP Block used in System-On-Chip (SOC) Base Draft
CWE-1193 Power-On of Untrusted Execution Core Before Enabling Fabric Access Control Base Draft
CWE-12 ASP.NET Misconfiguration: Missing Custom Error Page Variant Draft
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') Base Incomplete
CWE-1204 Generation of Weak Initialization Vector (IV) Base Incomplete
CWE-1209 Failure to Disable Reserved Bits Base Incomplete
CWE-121 Stack-based Buffer Overflow Variant Draft
CWE-122 Heap-based Buffer Overflow Variant Draft
CWE-1220 Insufficient Granularity of Access Control Base Incomplete
CWE-1221 Incorrect Register Defaults or Module Parameters Base Incomplete
CWE-1222 Insufficient Granularity of Address Regions Protected by Register Locks Variant Incomplete
CWE-1223 Race Condition for Write-Once Attributes Base Incomplete
CWE-1224 Improper Restriction of Write-Once Bit Fields Base Incomplete
CWE-1229 Creation of Emergent Resource Class Incomplete
CWE-123 Write-what-where Condition Base Draft
CWE-1230 Exposure of Sensitive Information Through Metadata Base Incomplete
CWE-1231 Improper Prevention of Lock Bit Modification Base Stable
CWE-1232 Improper Lock Behavior After Power State Transition Base Incomplete
CWE-1233 Security-Sensitive Hardware Controls with Missing Lock Bit Protection Base Stable
CWE-1234 Hardware Internal or Debug Modes Allow Override of Locks Base Incomplete
CWE-1235 Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations Base Incomplete
CWE-1236 Improper Neutralization of Formula Elements in a CSV File Base Incomplete
CWE-1239 Improper Zeroization of Hardware Register Variant Draft
CWE-124 Buffer Underwrite ('Buffer Underflow') Base Incomplete
CWE-1240 Use of a Cryptographic Primitive with a Risky Implementation Base Draft
CWE-1241 Use of Predictable Algorithm in Random Number Generator Base Draft
CWE-1242 Inclusion of Undocumented Features or Chicken Bits Base Incomplete
CWE-1243 Sensitive Non-Volatile Information Not Protected During Debug Base Incomplete
CWE-1244 Internal Asset Exposed to Unsafe Debug Access Level or State Base Stable
CWE-1245 Improper Finite State Machines (FSMs) in Hardware Logic Base Incomplete
CWE-1246 Improper Write Handling in Limited-write Non-Volatile Memories Base Incomplete
CWE-1247 Improper Protection Against Voltage and Clock Glitches Base Stable
CWE-1248 Semiconductor Defects in Hardware Logic with Security-Sensitive Implications Base Incomplete
CWE-1249 Application-Level Admin Tool with Inconsistent View of Underlying Operating System Base Incomplete
CWE-125 Out-of-bounds Read Base Draft
CWE-1250 Improper Preservation of Consistency Between Independent Representations of Shared State Base Incomplete
CWE-1251 Mirrored Regions with Different Values Base Incomplete
CWE-1252 CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations Base Incomplete
CWE-1253 Incorrect Selection of Fuse Values Base Draft
CWE-1254 Incorrect Comparison Logic Granularity Base Draft
CWE-1255 Comparison Logic is Vulnerable to Power Side-Channel Attacks Variant Draft
CWE-1256 Improper Restriction of Software Interfaces to Hardware Features Base Stable
CWE-1257 Improper Access Control Applied to Mirrored or Aliased Memory Regions Base Incomplete
CWE-1258 Exposure of Sensitive System Information Due to Uncleared Debug Information Base Draft
CWE-1259 Improper Restriction of Security Token Assignment Base Incomplete
CWE-126 Buffer Over-read Variant Draft
CWE-1260 Improper Handling of Overlap Between Protected Memory Ranges Base Stable
CWE-1261 Improper Handling of Single Event Upsets Base Draft
CWE-1262 Improper Access Control for Register Interface Base Stable
CWE-1263 Improper Physical Access Control Class Incomplete
CWE-1264 Hardware Logic with Insecure De-Synchronization between Control and Data Channels Base Incomplete
CWE-1265 Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls Base Draft
CWE-1266 Improper Scrubbing of Sensitive Data from Decommissioned Device Base Incomplete
CWE-1267 Policy Uses Obsolete Encoding Base Draft
CWE-1268 Policy Privileges are not Assigned Consistently Between Control and Data Agents Base Draft
CWE-1269 Product Released in Non-Release Configuration Base Incomplete
CWE-127 Buffer Under-read Variant Draft
CWE-1270 Generation of Incorrect Security Tokens Base Incomplete
CWE-1271 Uninitialized Value on Reset for Registers Holding Security Settings Base Incomplete
CWE-1272 Sensitive Information Uncleared Before Debug/Power State Transition Base Stable
CWE-1273 Device Unlock Credential Sharing Base Incomplete
CWE-1274 Improper Access Control for Volatile Memory Containing Boot Code Base Stable
CWE-1275 Sensitive Cookie with Improper SameSite Attribute Variant Incomplete
CWE-1276 Hardware Child Block Incorrectly Connected to Parent System Base Incomplete
CWE-1277 Firmware Not Updateable Base Draft
CWE-1278 Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques Base Incomplete
CWE-1279 Cryptographic Operations are run Before Supporting Units are Ready Base Incomplete
CWE-128 Wrap-around Error Base Incomplete
CWE-1280 Access Control Check Implemented After Asset is Accessed Base Incomplete
CWE-1281 Sequence of Processor Instructions Leads to Unexpected Behavior Base Incomplete
CWE-1282 Assumed-Immutable Data is Stored in Writable Memory Base Incomplete
CWE-1283 Mutable Attestation or Measurement Reporting Data Base Incomplete
CWE-1284 Improper Validation of Specified Quantity in Input Base Incomplete
CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input Base Incomplete
CWE-1286 Improper Validation of Syntactic Correctness of Input Base Incomplete
CWE-1287 Improper Validation of Specified Type of Input Base Incomplete
CWE-1288 Improper Validation of Consistency within Input Base Incomplete
CWE-1289 Improper Validation of Unsafe Equivalence in Input Base Incomplete
CWE-129 Improper Validation of Array Index Variant Draft
CWE-1290 Incorrect Decoding of Security Identifiers Base Incomplete
CWE-1291 Public Key Re-Use for Signing both Debug and Production Code Base Draft
CWE-1292 Incorrect Conversion of Security Identifiers Base Draft
CWE-1293 Missing Source Correlation of Multiple Independent Data Base Draft
CWE-1294 Insecure Security Identifier Mechanism Class Incomplete
CWE-1295 Debug Messages Revealing Unnecessary Information Base Incomplete
CWE-1296 Incorrect Chaining or Granularity of Debug Components Base Incomplete
CWE-1297 Unprotected Confidential Information on Device is Accessible by OSAT Vendors Base Incomplete
CWE-1298 Hardware Logic Contains Race Conditions Base Draft
CWE-1299 Missing Protection Mechanism for Alternate Hardware Interface Base Draft
CWE-13 ASP.NET Misconfiguration: Password in Configuration File Variant Draft
CWE-130 Improper Handling of Length Parameter Inconsistency Base Incomplete
CWE-1300 Improper Protection of Physical Side Channels Base Stable
CWE-1301 Insufficient or Incomplete Data Removal within Hardware Component Base Incomplete
CWE-1302 Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC) Base Incomplete
CWE-1303 Non-Transparent Sharing of Microarchitectural Resources Base Draft
CWE-1304 Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation Base Draft
CWE-131 Incorrect Calculation of Buffer Size Base Draft
CWE-1310 Missing Ability to Patch ROM Code Base Draft
CWE-1311 Improper Translation of Security Attributes by Fabric Bridge Base Draft
CWE-1312 Missing Protection for Mirrored Regions in On-Chip Fabric Firewall Base Draft
CWE-1313 Hardware Allows Activation of Test or Debug Logic at Runtime Base Draft
CWE-1314 Missing Write Protection for Parametric Data Values Base Draft
CWE-1315 Improper Setting of Bus Controlling Capability in Fabric End-point Base Incomplete
CWE-1316 Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges Base Draft
CWE-1317 Improper Access Control in Fabric Bridge Base Draft
CWE-1318 Missing Support for Security Features in On-chip Fabrics or Buses Base Incomplete
CWE-1319 Improper Protection against Electromagnetic Fault Injection (EM-FI) Base Incomplete
CWE-132 DEPRECATED: Miscalculated Null Termination Base Deprecated
CWE-1320 Improper Protection for Outbound Error Messages and Alert Signals Base Draft
CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') Variant Incomplete
CWE-1322 Use of Blocking Code in Single-threaded, Non-blocking Context Base Incomplete
CWE-1323 Improper Management of Sensitive Trace Data Base Draft
CWE-1324 DEPRECATED: Sensitive Information Accessible by Physical Probing of JTAG Interface Base Deprecated
CWE-1325 Improperly Controlled Sequential Memory Allocation Base Incomplete
CWE-1326 Missing Immutable Root of Trust in Hardware Base Draft
CWE-1327 Binding to an Unrestricted IP Address Base Incomplete
CWE-1328 Security Version Number Mutable to Older Versions Base Draft
CWE-1329 Reliance on Component That is Not Updateable Base Incomplete
CWE-1330 Remanent Data Readable after Memory Erase Variant Draft
CWE-1331 Improper Isolation of Shared Resources in Network On Chip (NoC) Base Stable
CWE-1332 Improper Handling of Faults that Lead to Instruction Skips Base Stable
CWE-1333 Inefficient Regular Expression Complexity Base Draft
CWE-1334 Unauthorized Error Injection Can Degrade Hardware Redundancy Base Draft
CWE-1335 Incorrect Bitwise Shift of Integer Base Draft
CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine Base Incomplete
CWE-1338 Improper Protections Against Hardware Overheating Base Draft
CWE-1339 Insufficient Precision or Accuracy of a Real Number Base Draft
CWE-134 Use of Externally-Controlled Format String Base Draft
CWE-1341 Multiple Releases of Same Resource or Handle Base Incomplete
CWE-1342 Information Exposure through Microarchitectural State after Transient Execution Base Incomplete
CWE-135 Incorrect Calculation of Multi-Byte String Length Base Draft
CWE-1351 Improper Handling of Hardware Behavior in Exceptionally Cold Environments Base Incomplete
CWE-1357 Reliance on Insufficiently Trustworthy Component Class Incomplete
CWE-138 Improper Neutralization of Special Elements Class Draft
CWE-1384 Improper Handling of Physical or Environmental Conditions Class Incomplete
CWE-1385 Missing Origin Validation in WebSockets Variant Incomplete
CWE-1386 Insecure Operation on Windows Junction / Mount Point Base Incomplete
CWE-1389 Incorrect Parsing of Numbers with Different Radices Base Incomplete
CWE-1390 Weak Authentication Class Incomplete
CWE-1391 Use of Weak Credentials Class Incomplete
CWE-1392 Use of Default Credentials Base Incomplete
CWE-1393 Use of Default Password Base Incomplete
CWE-1394 Use of Default Cryptographic Key Base Incomplete
CWE-1395 Dependency on Vulnerable Third-Party Component Class Incomplete
CWE-14 Compiler Removal of Code to Clear Buffers Variant Draft
CWE-140 Improper Neutralization of Delimiters Base Draft
CWE-141 Improper Neutralization of Parameter/Argument Delimiters Variant Draft
CWE-1419 Incorrect Initialization of Resource Class Incomplete
CWE-142 Improper Neutralization of Value Delimiters Variant Draft
CWE-1420 Exposure of Sensitive Information during Transient Execution Base Incomplete
CWE-1421 Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution Base Incomplete
CWE-1422 Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution Base Incomplete
CWE-1423 Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution Base Incomplete
CWE-1426 Improper Validation of Generative AI Output Base Incomplete
CWE-1427 Improper Neutralization of Input Used for LLM Prompting Base Incomplete
CWE-1428 Reliance on HTTP instead of HTTPS Base Incomplete
CWE-1429 Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface Base Incomplete
CWE-143 Improper Neutralization of Record Delimiters Variant Draft
CWE-1431 Driving Intermediate Cryptographic State/Results to Hardware Module Outputs Base Incomplete
CWE-1434 Insecure Setting of Generative AI/ML Model Inference Parameters Base Draft
CWE-144 Improper Neutralization of Line Delimiters Variant Draft
CWE-145 Improper Neutralization of Section Delimiters Variant Incomplete
CWE-146 Improper Neutralization of Expression/Command Delimiters Variant Incomplete
CWE-147 Improper Neutralization of Input Terminators Variant Draft
CWE-148 Improper Neutralization of Input Leaders Variant Draft
CWE-149 Improper Neutralization of Quoting Syntax Variant Draft
CWE-15 External Control of System or Configuration Setting Base Incomplete
CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences Variant Incomplete
CWE-151 Improper Neutralization of Comment Delimiters Variant Draft
CWE-152 Improper Neutralization of Macro Symbols Variant Draft
CWE-153 Improper Neutralization of Substitution Characters Variant Draft
CWE-154 Improper Neutralization of Variable Name Delimiters Variant Incomplete
CWE-155 Improper Neutralization of Wildcards or Matching Symbols Variant Draft
CWE-156 Improper Neutralization of Whitespace Variant Draft
CWE-157 Failure to Sanitize Paired Delimiters Variant Draft
CWE-158 Improper Neutralization of Null Byte or NUL Character Variant Incomplete
CWE-159 Improper Handling of Invalid Use of Special Elements Class Draft
CWE-160 Improper Neutralization of Leading Special Elements Variant Incomplete
CWE-161 Improper Neutralization of Multiple Leading Special Elements Variant Incomplete
CWE-162 Improper Neutralization of Trailing Special Elements Variant Incomplete
CWE-163 Improper Neutralization of Multiple Trailing Special Elements Variant Incomplete
CWE-164 Improper Neutralization of Internal Special Elements Variant Incomplete
CWE-165 Improper Neutralization of Multiple Internal Special Elements Variant Incomplete
CWE-166 Improper Handling of Missing Special Element Base Draft
CWE-167 Improper Handling of Additional Special Element Base Draft
CWE-168 Improper Handling of Inconsistent Special Elements Base Draft
CWE-170 Improper Null Termination Base Incomplete
CWE-172 Encoding Error Class Draft
CWE-173 Improper Handling of Alternate Encoding Variant Draft
CWE-174 Double Decoding of the Same Data Variant Draft
CWE-175 Improper Handling of Mixed Encoding Variant Draft
CWE-176 Improper Handling of Unicode Encoding Variant Draft
CWE-177 Improper Handling of URL Encoding (Hex Encoding) Variant Draft
CWE-178 Improper Handling of Case Sensitivity Base Incomplete
CWE-179 Incorrect Behavior Order: Early Validation Base Incomplete
CWE-180 Incorrect Behavior Order: Validate Before Canonicalize Variant Draft
CWE-181 Incorrect Behavior Order: Validate Before Filter Variant Draft
CWE-182 Collapse of Data into Unsafe Value Base Draft
CWE-183 Permissive List of Allowed Inputs Base Draft
CWE-184 Incomplete List of Disallowed Inputs Base Draft
CWE-185 Incorrect Regular Expression Class Draft
CWE-186 Overly Restrictive Regular Expression Base Draft
CWE-187 Partial String Comparison Variant Incomplete
CWE-188 Reliance on Data/Memory Layout Base Draft
CWE-190 Integer Overflow or Wraparound Base Stable
CWE-191 Integer Underflow (Wrap or Wraparound) Base Draft
CWE-192 Integer Coercion Error Variant Incomplete
CWE-193 Off-by-one Error Base Draft
CWE-194 Unexpected Sign Extension Variant Incomplete
CWE-195 Signed to Unsigned Conversion Error Variant Draft
CWE-196 Unsigned to Signed Conversion Error Variant Draft
CWE-197 Numeric Truncation Error Base Incomplete
CWE-198 Use of Incorrect Byte Ordering Variant Draft
CWE-20 Improper Input Validation Class Stable
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor Class Draft
CWE-201 Insertion of Sensitive Information Into Sent Data Base Draft
CWE-202 Exposure of Sensitive Information Through Data Queries Base Draft
CWE-203 Observable Discrepancy Base Incomplete
CWE-204 Observable Response Discrepancy Base Incomplete
CWE-205 Observable Behavioral Discrepancy Base Incomplete
CWE-206 Observable Internal Behavioral Discrepancy Variant Incomplete
CWE-207 Observable Behavioral Discrepancy With Equivalent Products Variant Draft
CWE-208 Observable Timing Discrepancy Base Incomplete
CWE-209 Generation of Error Message Containing Sensitive Information Base Draft
CWE-210 Self-generated Error Message Containing Sensitive Information Base Draft
CWE-211 Externally-Generated Error Message Containing Sensitive Information Base Incomplete
CWE-212 Improper Removal of Sensitive Information Before Storage or Transfer Base Incomplete
CWE-213 Exposure of Sensitive Information Due to Incompatible Policies Base Draft
CWE-214 Invocation of Process Using Visible Sensitive Information Base Incomplete
CWE-215 Insertion of Sensitive Information Into Debugging Code Base Draft
CWE-216 DEPRECATED: Containment Errors (Container Errors) Class Deprecated
CWE-217 DEPRECATED: Failure to Protect Stored Data from Modification Base Deprecated
CWE-218 DEPRECATED: Failure to provide confidentiality for stored data Base Deprecated
CWE-219 Storage of File with Sensitive Data Under Web Root Variant Draft
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') Base Stable
CWE-220 Storage of File With Sensitive Data Under FTP Root Variant Draft
CWE-221 Information Loss or Omission Class Incomplete
CWE-222 Truncation of Security-relevant Information Base Draft
CWE-223 Omission of Security-relevant Information Base Draft
CWE-224 Obscured Security-relevant Information by Alternate Name Base Incomplete
CWE-225 DEPRECATED: General Information Management Problems Base Deprecated
CWE-226 Sensitive Information in Resource Not Removed Before Reuse Base Draft
CWE-228 Improper Handling of Syntactically Invalid Structure Class Incomplete
CWE-229 Improper Handling of Values Base Incomplete
CWE-23 Relative Path Traversal Base Draft
CWE-230 Improper Handling of Missing Values Variant Draft
CWE-231 Improper Handling of Extra Values Variant Draft
CWE-232 Improper Handling of Undefined Values Variant Draft
CWE-233 Improper Handling of Parameters Base Incomplete
CWE-234 Failure to Handle Missing Parameter Variant Incomplete
CWE-235 Improper Handling of Extra Parameters Variant Draft
CWE-236 Improper Handling of Undefined Parameters Variant Draft
CWE-237 Improper Handling of Structural Elements Base Incomplete
CWE-238 Improper Handling of Incomplete Structural Elements Variant Draft
CWE-239 Failure to Handle Incomplete Element Variant Draft
CWE-24 Path Traversal: '../filedir' Variant Incomplete
CWE-240 Improper Handling of Inconsistent Structural Elements Base Draft
CWE-241 Improper Handling of Unexpected Data Type Base Draft
CWE-242 Use of Inherently Dangerous Function Base Draft
CWE-243 Creation of chroot Jail Without Changing Working Directory Variant Draft
CWE-244 Improper Clearing of Heap Memory Before Release ('Heap Inspection') Variant Draft
CWE-245 J2EE Bad Practices: Direct Management of Connections Variant Draft
CWE-246 J2EE Bad Practices: Direct Use of Sockets Variant Draft
CWE-247 DEPRECATED: Reliance on DNS Lookups in a Security Decision Base Deprecated
CWE-248 Uncaught Exception Base Draft
CWE-249 DEPRECATED: Often Misused: Path Manipulation Variant Deprecated
CWE-25 Path Traversal: '/../filedir' Variant Incomplete
CWE-250 Execution with Unnecessary Privileges Base Draft
CWE-252 Unchecked Return Value Base Draft
CWE-253 Incorrect Check of Function Return Value Base Incomplete
CWE-256 Plaintext Storage of a Password Base Incomplete
CWE-257 Storing Passwords in a Recoverable Format Base Incomplete
CWE-258 Empty Password in Configuration File Variant Incomplete
CWE-259 Use of Hard-coded Password Variant Draft
CWE-26 Path Traversal: '/dir/../filename' Variant Draft
CWE-260 Password in Configuration File Base Incomplete
CWE-261 Weak Encoding for Password Base Incomplete
CWE-262 Not Using Password Aging Base Draft
CWE-263 Password Aging with Long Expiration Base Draft
CWE-266 Incorrect Privilege Assignment Base Draft
CWE-267 Privilege Defined With Unsafe Actions Base Incomplete
CWE-268 Privilege Chaining Base Draft
CWE-269 Improper Privilege Management Class Draft
CWE-27 Path Traversal: 'dir/../../filename' Variant Draft
CWE-270 Privilege Context Switching Error Base Draft
CWE-271 Privilege Dropping / Lowering Errors Class Incomplete
CWE-272 Least Privilege Violation Base Incomplete
CWE-273 Improper Check for Dropped Privileges Base Incomplete
CWE-274 Improper Handling of Insufficient Privileges Base Draft
CWE-276 Incorrect Default Permissions Base Draft
CWE-277 Insecure Inherited Permissions Variant Draft
CWE-278 Insecure Preserved Inherited Permissions Variant Incomplete
CWE-279 Incorrect Execution-Assigned Permissions Variant Draft
CWE-28 Path Traversal: '..\filedir' Variant Incomplete
CWE-280 Improper Handling of Insufficient Permissions or Privileges Base Draft
CWE-281 Improper Preservation of Permissions Base Draft
CWE-282 Improper Ownership Management Class Draft
CWE-283 Unverified Ownership Base Draft
CWE-284 Improper Access Control Pillar Incomplete
CWE-285 Improper Authorization Class Draft
CWE-286 Incorrect User Management Class Incomplete
CWE-287 Improper Authentication Class Draft
CWE-288 Authentication Bypass Using an Alternate Path or Channel Base Incomplete
CWE-289 Authentication Bypass by Alternate Name Base Incomplete
CWE-29 Path Traversal: '\..\filename' Variant Incomplete
CWE-290 Authentication Bypass by Spoofing Base Incomplete
CWE-291 Reliance on IP Address for Authentication Variant Incomplete
CWE-292 DEPRECATED: Trusting Self-reported DNS Name Variant Deprecated
CWE-293 Using Referer Field for Authentication Variant Draft
CWE-294 Authentication Bypass by Capture-replay Base Incomplete
CWE-295 Improper Certificate Validation Base Draft
CWE-296 Improper Following of a Certificate's Chain of Trust Base Draft
CWE-297 Improper Validation of Certificate with Host Mismatch Variant Incomplete
CWE-298 Improper Validation of Certificate Expiration Variant Draft
CWE-299 Improper Check for Certificate Revocation Base Draft
CWE-30 Path Traversal: '\dir\..\filename' Variant Draft
CWE-300 Channel Accessible by Non-Endpoint Class Draft
CWE-301 Reflection Attack in an Authentication Protocol Base Draft
CWE-302 Authentication Bypass by Assumed-Immutable Data Base Incomplete
CWE-303 Incorrect Implementation of Authentication Algorithm Base Draft
CWE-304 Missing Critical Step in Authentication Base Draft
CWE-305 Authentication Bypass by Primary Weakness Base Draft
CWE-306 Missing Authentication for Critical Function Base Draft
CWE-307 Improper Restriction of Excessive Authentication Attempts Base Draft
CWE-308 Use of Single-factor Authentication Base Draft
CWE-309 Use of Password System for Primary Authentication Base Draft
CWE-31 Path Traversal: 'dir\..\..\filename' Variant Draft
CWE-311 Missing Encryption of Sensitive Data Class Draft
CWE-312 Cleartext Storage of Sensitive Information Base Draft
CWE-313 Cleartext Storage in a File or on Disk Variant Draft
CWE-314 Cleartext Storage in the Registry Variant Draft
CWE-315 Cleartext Storage of Sensitive Information in a Cookie Variant Draft
CWE-316 Cleartext Storage of Sensitive Information in Memory Variant Draft
CWE-317 Cleartext Storage of Sensitive Information in GUI Variant Draft
CWE-318 Cleartext Storage of Sensitive Information in Executable Variant Draft
CWE-319 Cleartext Transmission of Sensitive Information Base Draft
CWE-32 Path Traversal: '...' (Triple Dot) Variant Incomplete
CWE-321 Use of Hard-coded Cryptographic Key Variant Draft
CWE-322 Key Exchange without Entity Authentication Base Draft
CWE-323 Reusing a Nonce, Key Pair in Encryption Base Incomplete
CWE-324 Use of a Key Past its Expiration Date Base Draft
CWE-325 Missing Cryptographic Step Base Draft
CWE-326 Inadequate Encryption Strength Class Draft
CWE-327 Use of a Broken or Risky Cryptographic Algorithm Class Draft
CWE-328 Use of Weak Hash Base Draft
CWE-329 Generation of Predictable IV with CBC Mode Variant Draft
CWE-33 Path Traversal: '....' (Multiple Dot) Variant Incomplete
CWE-330 Use of Insufficiently Random Values Class Stable
CWE-331 Insufficient Entropy Base Draft
CWE-332 Insufficient Entropy in PRNG Variant Draft
CWE-333 Improper Handling of Insufficient Entropy in TRNG Variant Draft
CWE-334 Small Space of Random Values Base Draft
CWE-335 Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG) Base Draft
CWE-336 Same Seed in Pseudo-Random Number Generator (PRNG) Variant Draft
CWE-337 Predictable Seed in Pseudo-Random Number Generator (PRNG) Variant Draft
CWE-338 Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) Base Draft
CWE-339 Small Seed Space in PRNG Variant Draft
CWE-34 Path Traversal: '....//' Variant Incomplete
CWE-340 Generation of Predictable Numbers or Identifiers Class Incomplete
CWE-341 Predictable from Observable State Base Draft
CWE-342 Predictable Exact Value from Previous Values Base Draft
CWE-343 Predictable Value Range from Previous Values Base Draft
CWE-344 Use of Invariant Value in Dynamically Changing Context Base Draft
CWE-345 Insufficient Verification of Data Authenticity Class Draft
CWE-346 Origin Validation Error Class Draft
CWE-347 Improper Verification of Cryptographic Signature Base Draft
CWE-348 Use of Less Trusted Source Base Draft
CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data Base Draft
CWE-35 Path Traversal: '.../...//' Variant Incomplete
CWE-350 Reliance on Reverse DNS Resolution for a Security-Critical Action Variant Draft
CWE-351 Insufficient Type Distinction Base Draft
CWE-352 Cross-Site Request Forgery (CSRF) Compound Stable
CWE-353 Missing Support for Integrity Check Base Draft
CWE-354 Improper Validation of Integrity Check Value Base Draft
CWE-356 Product UI does not Warn User of Unsafe Actions Base Incomplete
CWE-357 Insufficient UI Warning of Dangerous Operations Base Draft
CWE-358 Improperly Implemented Security Check for Standard Base Draft
CWE-359 Exposure of Private Personal Information to an Unauthorized Actor Base Incomplete
CWE-36 Absolute Path Traversal Base Draft
CWE-360 Trust of System Event Data Base Incomplete
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') Class Draft
CWE-363 Race Condition Enabling Link Following Base Draft
CWE-364 Signal Handler Race Condition Base Incomplete
CWE-365 DEPRECATED: Race Condition in Switch Base Deprecated
CWE-366 Race Condition within a Thread Base Draft
CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition Base Incomplete
CWE-368 Context Switching Race Condition Base Draft
CWE-369 Divide By Zero Base Draft
CWE-37 Path Traversal: '/absolute/pathname/here' Variant Draft
CWE-370 Missing Check for Certificate Revocation after Initial Check Variant Draft
CWE-372 Incomplete Internal State Distinction Base Draft
CWE-373 DEPRECATED: State Synchronization Error Base Deprecated
CWE-374 Passing Mutable Objects to an Untrusted Method Base Draft
CWE-375 Returning a Mutable Object to an Untrusted Caller Base Draft
CWE-377 Insecure Temporary File Class Incomplete
CWE-378 Creation of Temporary File With Insecure Permissions Base Draft
CWE-379 Creation of Temporary File in Directory with Insecure Permissions Base Incomplete
CWE-38 Path Traversal: '\absolute\pathname\here' Variant Draft
CWE-382 J2EE Bad Practices: Use of System.exit() Variant Draft
CWE-383 J2EE Bad Practices: Direct Use of Threads Variant Draft
CWE-384 Session Fixation Compound Incomplete
CWE-385 Covert Timing Channel Base Incomplete
CWE-386 Symbolic Name not Mapping to Correct Object Base Draft
CWE-39 Path Traversal: 'C:dirname' Variant Draft
CWE-390 Detection of Error Condition Without Action Base Draft
CWE-391 Unchecked Error Condition Base Incomplete
CWE-392 Missing Report of Error Condition Base Draft
CWE-393 Return of Wrong Status Code Base Draft
CWE-394 Unexpected Status Code or Return Value Base Draft
CWE-395 Use of NullPointerException Catch to Detect NULL Pointer Dereference Base Draft
CWE-396 Declaration of Catch for Generic Exception Base Draft
CWE-397 Declaration of Throws for Generic Exception Base Draft
CWE-40 Path Traversal: '\\UNC\share\name\' (Windows UNC Share) Variant Draft
CWE-400 Uncontrolled Resource Consumption Class Draft
CWE-401 Missing Release of Memory after Effective Lifetime Variant Draft
CWE-402 Transmission of Private Resources into a New Sphere ('Resource Leak') Class Draft
CWE-403 Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak') Base Draft
CWE-404 Improper Resource Shutdown or Release Class Draft
CWE-405 Asymmetric Resource Consumption (Amplification) Class Incomplete
CWE-406 Insufficient Control of Network Message Volume (Network Amplification) Class Incomplete
CWE-407 Inefficient Algorithmic Complexity Class Incomplete
CWE-408 Incorrect Behavior Order: Early Amplification Base Draft
CWE-409 Improper Handling of Highly Compressed Data (Data Amplification) Base Incomplete
CWE-41 Improper Resolution of Path Equivalence Base Incomplete
CWE-410 Insufficient Resource Pool Class Incomplete
CWE-412 Unrestricted Externally Accessible Lock Base Incomplete
CWE-413 Improper Resource Locking Base Draft
CWE-414 Missing Lock Check Base Draft
CWE-415 Double Free Variant Draft
CWE-416 Use After Free Variant Stable
CWE-419 Unprotected Primary Channel Base Draft
CWE-42 Path Equivalence: 'filename.' (Trailing Dot) Variant Incomplete
CWE-420 Unprotected Alternate Channel Base Draft
CWE-421 Race Condition During Access to Alternate Channel Base Draft
CWE-422 Unprotected Windows Messaging Channel ('Shatter') Variant Draft
CWE-423 DEPRECATED: Proxied Trusted Channel Base Deprecated
CWE-424 Improper Protection of Alternate Path Class Draft
CWE-425 Direct Request ('Forced Browsing') Base Incomplete
CWE-426 Untrusted Search Path Base Stable
CWE-427 Uncontrolled Search Path Element Base Draft
CWE-428 Unquoted Search Path or Element Base Draft
CWE-43 Path Equivalence: 'filename....' (Multiple Trailing Dot) Variant Incomplete
CWE-430 Deployment of Wrong Handler Base Incomplete
CWE-431 Missing Handler Base Draft
CWE-432 Dangerous Signal Handler not Disabled During Sensitive Operations Base Draft
CWE-433 Unparsed Raw Web Content Delivery Variant Incomplete
CWE-434 Unrestricted Upload of File with Dangerous Type Base Draft
CWE-435 Improper Interaction Between Multiple Correctly-Behaving Entities Pillar Draft
CWE-436 Interpretation Conflict Class Incomplete
CWE-437 Incomplete Model of Endpoint Features Base Incomplete
CWE-439 Behavioral Change in New Version or Environment Base Draft
CWE-44 Path Equivalence: 'file.name' (Internal Dot) Variant Incomplete
CWE-440 Expected Behavior Violation Base Draft
CWE-441 Unintended Proxy or Intermediary ('Confused Deputy') Class Draft
CWE-443 DEPRECATED: HTTP response splitting Base Deprecated
CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') Base Incomplete
CWE-446 UI Discrepancy for Security Feature Class Incomplete
CWE-447 Unimplemented or Unsupported Feature in UI Base Draft
CWE-448 Obsolete Feature in UI Base Draft
CWE-449 The UI Performs the Wrong Action Base Incomplete
CWE-45 Path Equivalence: 'file...name' (Multiple Internal Dot) Variant Incomplete
CWE-450 Multiple Interpretations of UI Input Base Draft
CWE-451 User Interface (UI) Misrepresentation of Critical Information Class Draft
CWE-453 Insecure Default Variable Initialization Variant Draft
CWE-454 External Initialization of Trusted Variables or Data Stores Base Draft
CWE-455 Non-exit on Failed Initialization Base Draft
CWE-456 Missing Initialization of a Variable Variant Draft
CWE-457 Use of Uninitialized Variable Variant Draft
CWE-458 DEPRECATED: Incorrect Initialization Base Deprecated
CWE-459 Incomplete Cleanup Base Draft
CWE-46 Path Equivalence: 'filename ' (Trailing Space) Variant Incomplete
CWE-460 Improper Cleanup on Thrown Exception Base Draft
CWE-462 Duplicate Key in Associative List (Alist) Variant Incomplete
CWE-463 Deletion of Data Structure Sentinel Base Incomplete
CWE-464 Addition of Data Structure Sentinel Base Incomplete
CWE-466 Return of Pointer Value Outside of Expected Range Base Draft
CWE-467 Use of sizeof() on a Pointer Type Variant Draft
CWE-468 Incorrect Pointer Scaling Base Incomplete
CWE-469 Use of Pointer Subtraction to Determine Size Base Draft
CWE-47 Path Equivalence: ' filename' (Leading Space) Variant Incomplete
CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') Base Draft
CWE-471 Modification of Assumed-Immutable Data (MAID) Base Draft
CWE-472 External Control of Assumed-Immutable Web Parameter Base Draft
CWE-473 PHP External Variable Modification Variant Draft
CWE-474 Use of Function with Inconsistent Implementations Base Draft
CWE-475 Undefined Behavior for Input to API Base Incomplete
CWE-476 NULL Pointer Dereference Base Stable
CWE-477 Use of Obsolete Function Base Draft
CWE-478 Missing Default Case in Multiple Condition Expression Base Draft
CWE-479 Signal Handler Use of a Non-reentrant Function Variant Draft
CWE-48 Path Equivalence: 'file name' (Internal Whitespace) Variant Incomplete
CWE-480 Use of Incorrect Operator Base Draft
CWE-481 Assigning instead of Comparing Variant Draft
CWE-482 Comparing instead of Assigning Variant Draft
CWE-483 Incorrect Block Delimitation Base Draft
CWE-484 Omitted Break Statement in Switch Base Draft
CWE-486 Comparison of Classes by Name Variant Draft
CWE-487 Reliance on Package-level Scope Base Incomplete
CWE-488 Exposure of Data Element to Wrong Session Base Draft
CWE-489 Active Debug Code Base Draft
CWE-49 Path Equivalence: 'filename/' (Trailing Slash) Variant Incomplete
CWE-491 Public cloneable() Method Without Final ('Object Hijack') Variant Draft
CWE-492 Use of Inner Class Containing Sensitive Data Variant Draft
CWE-493 Critical Public Variable Without Final Modifier Variant Draft
CWE-494 Download of Code Without Integrity Check Base Draft
CWE-495 Private Data Structure Returned From A Public Method Variant Draft
CWE-496 Public Data Assigned to Private Array-Typed Field Variant Incomplete
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere Base Incomplete
CWE-498 Cloneable Class Containing Sensitive Information Variant Draft
CWE-499 Serializable Class Containing Sensitive Data Variant Draft
CWE-5 J2EE Misconfiguration: Data Transmission Without Encryption Variant Draft
CWE-50 Path Equivalence: '//multiple/leading/slash' Variant Incomplete
CWE-500 Public Static Field Not Marked Final Variant Draft
CWE-501 Trust Boundary Violation Base Draft
CWE-502 Deserialization of Untrusted Data Base Draft
CWE-506 Embedded Malicious Code Class Incomplete
CWE-507 Trojan Horse Base Incomplete
CWE-508 Non-Replicating Malicious Code Base Incomplete
CWE-509 Replicating Malicious Code (Virus or Worm) Base Incomplete
CWE-51 Path Equivalence: '/multiple//internal/slash' Variant Incomplete
CWE-510 Trapdoor Base Incomplete
CWE-511 Logic/Time Bomb Base Incomplete
CWE-512 Spyware Base Incomplete
CWE-514 Covert Channel Class Incomplete
CWE-515 Covert Storage Channel Base Incomplete
CWE-516 DEPRECATED: Covert Timing Channel Base Deprecated
CWE-52 Path Equivalence: '/multiple/trailing/slash//' Variant Incomplete
CWE-520 .NET Misconfiguration: Use of Impersonation Variant Incomplete
CWE-521 Weak Password Requirements Base Draft
CWE-522 Insufficiently Protected Credentials Class Incomplete
CWE-523 Unprotected Transport of Credentials Base Incomplete
CWE-524 Use of Cache Containing Sensitive Information Base Incomplete
CWE-525 Use of Web Browser Cache Containing Sensitive Information Variant Incomplete
CWE-526 Cleartext Storage of Sensitive Information in an Environment Variable Variant Incomplete
CWE-527 Exposure of Version-Control Repository to an Unauthorized Control Sphere Variant Incomplete
CWE-528 Exposure of Core Dump File to an Unauthorized Control Sphere Variant Draft
CWE-529 Exposure of Access Control List Files to an Unauthorized Control Sphere Variant Incomplete
CWE-53 Path Equivalence: '\multiple\\internal\backslash' Variant Incomplete
CWE-530 Exposure of Backup File to an Unauthorized Control Sphere Variant Incomplete
CWE-531 Inclusion of Sensitive Information in Test Code Variant Incomplete
CWE-532 Insertion of Sensitive Information into Log File Base Incomplete
CWE-533 DEPRECATED: Information Exposure Through Server Log Files Variant Deprecated
CWE-534 DEPRECATED: Information Exposure Through Debug Log Files Variant Deprecated
CWE-535 Exposure of Information Through Shell Error Message Variant Incomplete
CWE-536 Servlet Runtime Error Message Containing Sensitive Information Variant Incomplete
CWE-537 Java Runtime Error Message Containing Sensitive Information Variant Incomplete
CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory Base Draft
CWE-539 Use of Persistent Cookies Containing Sensitive Information Variant Incomplete
CWE-54 Path Equivalence: 'filedir\' (Trailing Backslash) Variant Incomplete
CWE-540 Inclusion of Sensitive Information in Source Code Base Incomplete
CWE-541 Inclusion of Sensitive Information in an Include File Variant Incomplete
CWE-542 DEPRECATED: Information Exposure Through Cleanup Log Files Variant Deprecated
CWE-543 Use of Singleton Pattern Without Synchronization in a Multithreaded Context Variant Incomplete
CWE-544 Missing Standardized Error Handling Mechanism Base Draft
CWE-545 DEPRECATED: Use of Dynamic Class Loading Variant Deprecated
CWE-546 Suspicious Comment Variant Draft
CWE-547 Use of Hard-coded, Security-relevant Constants Base Draft
CWE-548 Exposure of Information Through Directory Listing Variant Draft
CWE-549 Missing Password Field Masking Base Draft
CWE-55 Path Equivalence: '/./' (Single Dot Directory) Variant Incomplete
CWE-550 Server-generated Error Message Containing Sensitive Information Variant Incomplete
CWE-551 Incorrect Behavior Order: Authorization Before Parsing and Canonicalization Base Incomplete
CWE-552 Files or Directories Accessible to External Parties Base Draft
CWE-553 Command Shell in Externally Accessible Directory Variant Incomplete
CWE-554 ASP.NET Misconfiguration: Not Using Input Validation Framework Variant Draft
CWE-555 J2EE Misconfiguration: Plaintext Password in Configuration File Variant Draft
CWE-556 ASP.NET Misconfiguration: Use of Identity Impersonation Variant Incomplete
CWE-558 Use of getlogin() in Multithreaded Application Variant Draft
CWE-56 Path Equivalence: 'filedir*' (Wildcard) Variant Incomplete
CWE-560 Use of umask() with chmod-style Argument Variant Draft
CWE-561 Dead Code Base Draft
CWE-562 Return of Stack Variable Address Base Draft
CWE-563 Assignment to Variable without Use Base Draft
CWE-564 SQL Injection: Hibernate Variant Incomplete
CWE-565 Reliance on Cookies without Validation and Integrity Checking Base Incomplete
CWE-566 Authorization Bypass Through User-Controlled SQL Primary Key Variant Incomplete
CWE-567 Unsynchronized Access to Shared Data in a Multithreaded Context Base Draft
CWE-568 finalize() Method Without super.finalize() Variant Draft
CWE-57 Path Equivalence: 'fakedir/../realdir/filename' Variant Incomplete
CWE-570 Expression is Always False Base Draft
CWE-571 Expression is Always True Base Draft
CWE-572 Call to Thread run() instead of start() Variant Draft
CWE-573 Improper Following of Specification by Caller Class Draft
CWE-574 EJB Bad Practices: Use of Synchronization Primitives Variant Draft
CWE-575 EJB Bad Practices: Use of AWT Swing Variant Draft
CWE-576 EJB Bad Practices: Use of Java I/O Variant Draft
CWE-577 EJB Bad Practices: Use of Sockets Variant Draft
CWE-578 EJB Bad Practices: Use of Class Loader Variant Draft
CWE-579 J2EE Bad Practices: Non-serializable Object Stored in Session Variant Draft
CWE-58 Path Equivalence: Windows 8.3 Filename Variant Incomplete
CWE-580 clone() Method Without super.clone() Variant Draft
CWE-581 Object Model Violation: Just One of Equals and Hashcode Defined Variant Draft
CWE-582 Array Declared Public, Final, and Static Variant Draft
CWE-583 finalize() Method Declared Public Variant Incomplete
CWE-584 Return Inside Finally Block Base Draft
CWE-585 Empty Synchronized Block Variant Draft
CWE-586 Explicit Call to Finalize() Base Draft
CWE-587 Assignment of a Fixed Address to a Pointer Variant Draft
CWE-588 Attempt to Access Child of a Non-structure Pointer Variant Incomplete
CWE-589 Call to Non-ubiquitous API Variant Incomplete
CWE-59 Improper Link Resolution Before File Access ('Link Following') Base Draft
CWE-590 Free of Memory not on the Heap Variant Incomplete
CWE-591 Sensitive Data Storage in Improperly Locked Memory Variant Draft
CWE-592 DEPRECATED: Authentication Bypass Issues Class Deprecated
CWE-593 Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created Variant Draft
CWE-594 J2EE Framework: Saving Unserializable Objects to Disk Variant Incomplete
CWE-595 Comparison of Object References Instead of Object Contents Variant Incomplete
CWE-596 DEPRECATED: Incorrect Semantic Object Comparison Base Deprecated
CWE-597 Use of Wrong Operator in String Comparison Variant Draft
CWE-598 Use of GET Request Method With Sensitive Query Strings Variant Draft
CWE-599 Missing Validation of OpenSSL Certificate Variant Incomplete
CWE-6 J2EE Misconfiguration: Insufficient Session-ID Length Variant Incomplete
CWE-600 Uncaught Exception in Servlet Variant Draft
CWE-601 URL Redirection to Untrusted Site ('Open Redirect') Base Draft
CWE-602 Client-Side Enforcement of Server-Side Security Class Draft
CWE-603 Use of Client-Side Authentication Base Draft
CWE-605 Multiple Binds to the Same Port Variant Draft
CWE-606 Unchecked Input for Loop Condition Base Draft
CWE-607 Public Static Final Field References Mutable Object Variant Draft
CWE-608 Struts: Non-private Field in ActionForm Class Variant Draft
CWE-609 Double-Checked Locking Base Draft
CWE-61 UNIX Symbolic Link (Symlink) Following Compound Incomplete
CWE-610 Externally Controlled Reference to a Resource in Another Sphere Class Draft
CWE-611 Improper Restriction of XML External Entity Reference Base Draft
CWE-612 Improper Authorization of Index Containing Sensitive Information Base Draft
CWE-613 Insufficient Session Expiration Base Incomplete
CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute Variant Draft
CWE-615 Inclusion of Sensitive Information in Source Code Comments Variant Incomplete
CWE-616 Incomplete Identification of Uploaded File Variables (PHP) Variant Incomplete
CWE-617 Reachable Assertion Base Draft
CWE-618 Exposed Unsafe ActiveX Method Variant Incomplete
CWE-619 Dangling Database Cursor ('Cursor Injection') Base Incomplete
CWE-62 UNIX Hard Link Variant Incomplete
CWE-620 Unverified Password Change Base Draft
CWE-621 Variable Extraction Error Variant Incomplete
CWE-622 Improper Validation of Function Hook Arguments Variant Draft
CWE-623 Unsafe ActiveX Control Marked Safe For Scripting Variant Draft
CWE-624 Executable Regular Expression Error Base Incomplete
CWE-625 Permissive Regular Expression Base Draft
CWE-626 Null Byte Interaction Error (Poison Null Byte) Variant Draft
CWE-627 Dynamic Variable Evaluation Variant Incomplete
CWE-628 Function Call with Incorrectly Specified Arguments Base Draft
CWE-636 Not Failing Securely ('Failing Open') Class Draft
CWE-637 Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism') Class Draft
CWE-638 Not Using Complete Mediation Class Draft
CWE-639 Authorization Bypass Through User-Controlled Key Base Incomplete
CWE-64 Windows Shortcut Following (.LNK) Variant Incomplete
CWE-640 Weak Password Recovery Mechanism for Forgotten Password Base Incomplete
CWE-641 Improper Restriction of Names for Files and Other Resources Base Incomplete
CWE-642 External Control of Critical State Data Class Draft
CWE-643 Improper Neutralization of Data within XPath Expressions ('XPath Injection') Base Incomplete
CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax Variant Incomplete
CWE-645 Overly Restrictive Account Lockout Mechanism Base Incomplete
CWE-646 Reliance on File Name or Extension of Externally-Supplied File Variant Incomplete
CWE-647 Use of Non-Canonical URL Paths for Authorization Decisions Variant Incomplete
CWE-648 Incorrect Use of Privileged APIs Base Incomplete
CWE-649 Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking Base Incomplete
CWE-65 Windows Hard Link Variant Incomplete
CWE-650 Trusting HTTP Permission Methods on the Server Side Variant Incomplete
CWE-651 Exposure of WSDL File Containing Sensitive Information Variant Incomplete
CWE-652 Improper Neutralization of Data within XQuery Expressions ('XQuery Injection') Base Incomplete
CWE-653 Improper Isolation or Compartmentalization Class Draft
CWE-654 Reliance on a Single Factor in a Security Decision Base Draft
CWE-655 Insufficient Psychological Acceptability Class Draft
CWE-656 Reliance on Security Through Obscurity Class Draft
CWE-657 Violation of Secure Design Principles Class Draft
CWE-66 Improper Handling of File Names that Identify Virtual Resources Base Draft
CWE-662 Improper Synchronization Class Draft
CWE-663 Use of a Non-reentrant Function in a Concurrent Context Base Draft
CWE-664 Improper Control of a Resource Through its Lifetime Pillar Draft
CWE-665 Improper Initialization Class Draft
CWE-666 Operation on Resource in Wrong Phase of Lifetime Class Draft
CWE-667 Improper Locking Class Draft
CWE-668 Exposure of Resource to Wrong Sphere Class Draft
CWE-669 Incorrect Resource Transfer Between Spheres Class Draft
CWE-67 Improper Handling of Windows Device Names Variant Incomplete
CWE-670 Always-Incorrect Control Flow Implementation Class Draft
CWE-671 Lack of Administrator Control over Security Class Draft
CWE-672 Operation on a Resource after Expiration or Release Class Draft
CWE-673 External Influence of Sphere Definition Class Draft
CWE-674 Uncontrolled Recursion Class Draft
CWE-675 Multiple Operations on Resource in Single-Operation Context Class Draft
CWE-676 Use of Potentially Dangerous Function Base Draft
CWE-680 Integer Overflow to Buffer Overflow Compound Draft
CWE-681 Incorrect Conversion between Numeric Types Base Draft
CWE-682 Incorrect Calculation Pillar Draft
CWE-683 Function Call With Incorrect Order of Arguments Variant Draft
CWE-684 Incorrect Provision of Specified Functionality Class Draft
CWE-685 Function Call With Incorrect Number of Arguments Variant Draft
CWE-686 Function Call With Incorrect Argument Type Variant Draft
CWE-687 Function Call With Incorrectly Specified Argument Value Variant Draft
CWE-688 Function Call With Incorrect Variable or Reference as Argument Variant Draft
CWE-689 Permission Race Condition During Resource Copy Compound Draft
CWE-69 Improper Handling of Windows ::DATA Alternate Data Stream Variant Incomplete
CWE-690 Unchecked Return Value to NULL Pointer Dereference Compound Draft
CWE-691 Insufficient Control Flow Management Pillar Draft
CWE-692 Incomplete Denylist to Cross-Site Scripting Compound Draft
CWE-693 Protection Mechanism Failure Pillar Draft
CWE-694 Use of Multiple Resources with Duplicate Identifier Base Incomplete
CWE-695 Use of Low-Level Functionality Base Incomplete
CWE-696 Incorrect Behavior Order Class Incomplete
CWE-697 Incorrect Comparison Pillar Incomplete
CWE-698 Execution After Redirect (EAR) Base Incomplete
CWE-7 J2EE Misconfiguration: Missing Custom Error Page Variant Incomplete
CWE-703 Improper Check or Handling of Exceptional Conditions Pillar Incomplete
CWE-704 Incorrect Type Conversion or Cast Class Incomplete
CWE-705 Incorrect Control Flow Scoping Class Incomplete
CWE-706 Use of Incorrectly-Resolved Name or Reference Class Incomplete
CWE-707 Improper Neutralization Pillar Incomplete
CWE-708 Incorrect Ownership Assignment Base Incomplete
CWE-71 DEPRECATED: Apple '.DS_Store' Variant Deprecated
CWE-710 Improper Adherence to Coding Standards Pillar Incomplete
CWE-72 Improper Handling of Apple HFS+ Alternate Data Stream Path Variant Incomplete
CWE-73 External Control of File Name or Path Base Draft
CWE-732 Incorrect Permission Assignment for Critical Resource Class Draft
CWE-733 Compiler Optimization Removal or Modification of Security-critical Code Base Incomplete
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') Class Incomplete
CWE-749 Exposed Dangerous Method or Function Base Incomplete
CWE-75 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) Class Draft
CWE-754 Improper Check for Unusual or Exceptional Conditions Class Incomplete
CWE-755 Improper Handling of Exceptional Conditions Class Incomplete
CWE-756 Missing Custom Error Page Base Incomplete
CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') Base Incomplete
CWE-758 Reliance on Undefined, Unspecified, or Implementation-Defined Behavior Class Incomplete
CWE-759 Use of a One-Way Hash without a Salt Variant Incomplete
CWE-76 Improper Neutralization of Equivalent Special Elements Base Draft
CWE-760 Use of a One-Way Hash with a Predictable Salt Variant Incomplete
CWE-761 Free of Pointer not at Start of Buffer Variant Incomplete
CWE-762 Mismatched Memory Management Routines Variant Incomplete
CWE-763 Release of Invalid Pointer or Reference Base Incomplete
CWE-764 Multiple Locks of a Critical Resource Base Incomplete
CWE-765 Multiple Unlocks of a Critical Resource Base Incomplete
CWE-766 Critical Data Element Declared Public Base Incomplete
CWE-767 Access to Critical Private Variable via Public Method Base Incomplete
CWE-768 Incorrect Short Circuit Evaluation Variant Incomplete
CWE-769 DEPRECATED: Uncontrolled File Descriptor Consumption Base Deprecated
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') Class Draft
CWE-770 Allocation of Resources Without Limits or Throttling Base Incomplete
CWE-771 Missing Reference to Active Allocated Resource Base Incomplete
CWE-772 Missing Release of Resource after Effective Lifetime Base Draft
CWE-773 Missing Reference to Active File Descriptor or Handle Variant Incomplete
CWE-774 Allocation of File Descriptors or Handles Without Limits or Throttling Variant Incomplete
CWE-775 Missing Release of File Descriptor or Handle after Effective Lifetime Variant Incomplete
CWE-776 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') Base Draft
CWE-777 Regular Expression without Anchors Variant Incomplete
CWE-778 Insufficient Logging Base Draft
CWE-779 Logging of Excessive Data Base Draft
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') Base Stable
CWE-780 Use of RSA Algorithm without OAEP Variant Incomplete
CWE-781 Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code Variant Draft
CWE-782 Exposed IOCTL with Insufficient Access Control Variant Draft
CWE-783 Operator Precedence Logic Error Base Draft
CWE-784 Reliance on Cookies without Validation and Integrity Checking in a Security Decision Variant Draft
CWE-785 Use of Path Manipulation Function without Maximum-sized Buffer Variant Incomplete
CWE-786 Access of Memory Location Before Start of Buffer Base Incomplete
CWE-787 Out-of-bounds Write Base Draft
CWE-788 Access of Memory Location After End of Buffer Base Incomplete
CWE-789 Memory Allocation with Excessive Size Value Variant Draft
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') Base Stable
CWE-790 Improper Filtering of Special Elements Class Incomplete
CWE-791 Incomplete Filtering of Special Elements Base Incomplete
CWE-792 Incomplete Filtering of One or More Instances of Special Elements Variant Incomplete
CWE-793 Only Filtering One Instance of a Special Element Variant Incomplete
CWE-794 Incomplete Filtering of Multiple Instances of Special Elements Variant Incomplete
CWE-795 Only Filtering Special Elements at a Specified Location Base Incomplete
CWE-796 Only Filtering Special Elements Relative to a Marker Variant Incomplete
CWE-797 Only Filtering Special Elements at an Absolute Position Variant Incomplete
CWE-798 Use of Hard-coded Credentials Base Draft
CWE-799 Improper Control of Interaction Frequency Class Incomplete
CWE-8 J2EE Misconfiguration: Entity Bean Declared Remote Variant Incomplete
CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) Variant Incomplete
CWE-804 Guessable CAPTCHA Base Incomplete
CWE-805 Buffer Access with Incorrect Length Value Base Incomplete
CWE-806 Buffer Access Using Size of Source Buffer Variant Incomplete
CWE-807 Reliance on Untrusted Inputs in a Security Decision Base Incomplete
CWE-81 Improper Neutralization of Script in an Error Message Web Page Variant Incomplete
CWE-82 Improper Neutralization of Script in Attributes of IMG Tags in a Web Page Variant Incomplete
CWE-820 Missing Synchronization Base Incomplete
CWE-821 Incorrect Synchronization Base Incomplete
CWE-822 Untrusted Pointer Dereference Base Incomplete
CWE-823 Use of Out-of-range Pointer Offset Base Incomplete
CWE-824 Access of Uninitialized Pointer Base Incomplete
CWE-825 Expired Pointer Dereference Base Incomplete
CWE-826 Premature Release of Resource During Expected Lifetime Base Incomplete
CWE-827 Improper Control of Document Type Definition Variant Incomplete
CWE-828 Signal Handler with Functionality that is not Asynchronous-Safe Variant Incomplete
CWE-829 Inclusion of Functionality from Untrusted Control Sphere Base Incomplete
CWE-83 Improper Neutralization of Script in Attributes in a Web Page Variant Draft
CWE-830 Inclusion of Web Functionality from an Untrusted Source Variant Incomplete
CWE-831 Signal Handler Function Associated with Multiple Signals Variant Incomplete
CWE-832 Unlock of a Resource that is not Locked Base Incomplete
CWE-833 Deadlock Base Incomplete
CWE-834 Excessive Iteration Class Incomplete
CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop') Base Incomplete
CWE-836 Use of Password Hash Instead of Password for Authentication Base Incomplete
CWE-837 Improper Enforcement of a Single, Unique Action Base Incomplete
CWE-838 Inappropriate Encoding for Output Context Base Incomplete
CWE-839 Numeric Range Comparison Without Minimum Check Base Incomplete
CWE-84 Improper Neutralization of Encoded URI Schemes in a Web Page Variant Draft
CWE-841 Improper Enforcement of Behavioral Workflow Class Incomplete
CWE-842 Placement of User into Incorrect Group Base Incomplete
CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') Base Incomplete
CWE-85 Doubled Character XSS Manipulations Variant Draft
CWE-86 Improper Neutralization of Invalid Characters in Identifiers in Web Pages Variant Draft
CWE-862 Missing Authorization Class Incomplete
CWE-863 Incorrect Authorization Class Incomplete
CWE-87 Improper Neutralization of Alternate XSS Syntax Variant Draft
CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') Base Draft
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') Base Stable
CWE-9 J2EE Misconfiguration: Weak Access Permissions for EJB Methods Variant Draft
CWE-90 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') Base Draft
CWE-908 Use of Uninitialized Resource Base Incomplete
CWE-909 Missing Initialization of Resource Class Incomplete
CWE-91 XML Injection (aka Blind XPath Injection) Base Draft
CWE-910 Use of Expired File Descriptor Base Incomplete
CWE-911 Improper Update of Reference Count Base Incomplete
CWE-912 Hidden Functionality Class Incomplete
CWE-913 Improper Control of Dynamically-Managed Code Resources Class Incomplete
CWE-914 Improper Control of Dynamically-Identified Variables Base Incomplete
CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes Base Incomplete
CWE-916 Use of Password Hash With Insufficient Computational Effort Base Incomplete
CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') Base Incomplete
CWE-918 Server-Side Request Forgery (SSRF) Base Incomplete
CWE-92 DEPRECATED: Improper Sanitization of Custom Special Characters Base Deprecated
CWE-920 Improper Restriction of Power Consumption Base Incomplete
CWE-921 Storage of Sensitive Data in a Mechanism without Access Control Base Incomplete
CWE-922 Insecure Storage of Sensitive Information Class Incomplete
CWE-923 Improper Restriction of Communication Channel to Intended Endpoints Class Incomplete
CWE-924 Improper Enforcement of Message Integrity During Transmission in a Communication Channel Base Incomplete
CWE-925 Improper Verification of Intent by Broadcast Receiver Variant Incomplete
CWE-926 Improper Export of Android Application Components Variant Incomplete
CWE-927 Use of Implicit Intent for Sensitive Communication Variant Incomplete
CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection') Base Draft
CWE-939 Improper Authorization in Handler for Custom URL Scheme Base Incomplete
CWE-94 Improper Control of Generation of Code ('Code Injection') Base Draft
CWE-940 Improper Verification of Source of a Communication Channel Base Incomplete
CWE-941 Incorrectly Specified Destination in a Communication Channel Base Incomplete
CWE-942 Permissive Cross-domain Security Policy with Untrusted Domains Variant Incomplete
CWE-943 Improper Neutralization of Special Elements in Data Query Logic Class Incomplete
CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') Variant Incomplete
CWE-96 Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') Base Draft
CWE-97 Improper Neutralization of Server-Side Includes (SSI) Within a Web Page Variant Draft
CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') Variant Draft
CWE-99 Improper Control of Resource Identifiers ('Resource Injection') Class Draft

AVET INS is an owner of VULNDBASE brand and website. This product uses data from the NVD API but is not endorsed or certified by the NVD. See NVD page for more information. CVE is a registered trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE site. CWE is a registered trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE page. KEV (Known Exploited Vulnerabilities) is a catalog maintained by CISA. EUVD is the official EU repository for timely, curated cybersecurity vulnerability intelligence and remediation guidance run by ENISA. DORA (Digital Operational Resilience Act) is and EU directive.

Copyright AVET INS 1997 - 2026