CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
622 Unvalidated Function Hook Arguments
623 Unsafe ActiveX Control Marked Safe For Scripting
624 Executable Regular Expression Error
625 Permissive Regular Expression
626 Null Byte Interaction Error (Poison Null Byte)
627 Dynamic Variable Evaluation
628 Function Call with Incorrectly Specified Arguments
636 Not Failing Securely ('Failing Open')
637 Failure to Use Economy of Mechanism
638 Failure to Use Complete Mediation
639 Access Control Bypass Through User-Controlled Key 122
640 Weak Password Recovery Mechanism for Forgotten Password 100
641 Insufficient Filtering of File and Other Resource Names for Executable Content
642 External Control of Critical State Data 3
643 Improper Neutralization of Data within XPath Expressions ('XPath injection')
644 Improper Neutralization of HTTP Headers for Scripting Syntax 1
645 Overly Restrictive Account Lockout Mechanism
646 Reliance on File Name or Extension of Externally-Supplied File
647 Use of Non-Canonical URL Paths for Authorization Decisions
648 Incorrect Use of Privileged APIs
649 Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking 1
650 Trusting HTTP Permission Methods on the Server Side
651 Information Leak through WSDL File
652 Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')
653 Insufficient Compartmentalization 1
654 Reliance on a Single Factor in a Security Decision
655 Insufficient Psychological Acceptability
656 Reliance on Security through Obscurity
657 Violation of Secure Design Principles 2
662 Insufficient Synchronization 11
663 Use of a Non-reentrant Function in an Unsynchronized Context
664 Improper Control of a Resource Through its Lifetime 2
665 Improper Initialization 172
666 Operation on Resource in Wrong Phase of Lifetime
667 Insufficient Locking 33
668 Exposure of Resource to Wrong Sphere 414
669 Incorrect Resource Transfer Between Spheres 21
670 Always-Incorrect Control Flow Implementation 20
671 Lack of Administrator Control over Security
672 Operation on a Resource after Expiration or Release 12
673 External Influence of Sphere Definition
674 Uncontrolled Recursion 120
675 Duplicate Operations on Resource
676 Use of Potentially Dangerous Function
681 Incorrect Conversion between Numeric Types 33
682 Incorrect Calculation 45
683 Function Call With Incorrect Order of Arguments
684 Failure to Provide Specified Functionality 1
685 Function Call With Incorrect Number of Arguments
686 Function Call With Incorrect Argument Type
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 7 8 9 10 11 12 (This Page)13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit http://cwe.mitre.org/ for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.