CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
64 Windows Shortcut Following (.LNK) 1
65 Windows Hard Link
66 Improper Handling of File Names that Identify Virtual Resources
67 Improper Handling of Windows Device Names
69 Failure to Handle Windows ::DATA Alternate Data Stream
71 Apple '.DS_Store'
72 Improper Handling of Apple HFS+ Alternate Data Stream Path
73 External Control of File Name or Path 5
74 Failure to Sanitize Data into a Different Plane ('Injection') 734
75 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) 1
76 Failure to Resolve Equivalent Special Elements into a Different Plane
77 Improper Sanitization of Special Elements used in a Command ('Command Injection') 863
78 Improper Sanitization of Special Elements used in an OS Command ('OS Command Injection') 1795
79 Failure to Preserve Web Page Structure ('Cross-site Scripting') 17516
80 Improper Sanitization of Script-Related HTML Tags in a Web Page (Basic XSS) 10
81 Improper Sanitization of Script in an Error Message Web Page
82 Improper Sanitization of Script in Attributes of IMG Tags in a Web Page
83 Improper Neutralization of Script in Attributes in a Web Page
84 Failure to Resolve Encoded URI Schemes in a Web Page
85 Doubled Character XSS Manipulations
86 Improper Neutralization of Invalid Characters in Identifiers in Web Pages
87 Failure to Sanitize Alternate XSS Syntax 1
88 Argument Injection or Modification 100
89 Improper Sanitization of Special Elements used in an SQL Command ('SQL Injection') 6989
90 Failure to Sanitize Data into LDAP Queries ('LDAP Injection') 11
91 XML Injection (aka Blind XPath Injection) 60
92 DEPRECATED: Improper Sanitization of Custom Special Characters
93 Failure to Sanitize CRLF Sequences ('CRLF Injection') 36
94 Failure to Control Generation of Code ('Code Injection') 2781
95 Improper Sanitization of Directives in Dynamically Evaluated Code ('Eval Injection')
96 Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')
97 Failure to Sanitize Server-Side Includes (SSI) Within a Web Page
98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP File Inclusion') 1
99 Improper Control of Resource Identifiers ('Resource Injection') 4
102 Struts: Duplicate Validation Forms
103 Struts: Incomplete validate() Method Definition
104 Struts: Form Bean Does Not Extend Validation Class
105 Struts: Form Field Without Validator
106 Struts: Plug-in Framework not in Use
107 Struts: Unused Validation Form
108 Struts: Unvalidated Action Form
109 Struts: Validator Turned Off
110 Struts: Validator Without Form Field
111 Direct Use of Unsafe JNI
112 Missing XML Validation 1
113 Failure to Sanitize CRLF Sequences in HTTP Headers ('HTTP Response Splitting') 20
114 Process Control 1
115 Misinterpretation of Input 1
116 Improper Encoding or Escaping of Output 70
117 Improper Output Sanitization for Logs 1
Total number of cwe definitions : 668   Page : 1 2 (This Page)3 4 5 6 7 8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit http://cwe.mitre.org/ for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.