the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  What's the CVSS score of your company?
Vulnerability Feeds & WidgetsNew  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
283 Unverified Ownership 1
284 Access Control (Authorization) Issues 989
285 Improper Access Control (Authorization) 98
286 Incorrect User Management
287 Improper Authentication 2580
288 Authentication Bypass Using an Alternate Path or Channel 13
289 Authentication Bypass by Alternate Name
290 Authentication Bypass by Spoofing 93
292 Trusting Self-reported DNS Name
293 Using Referer Field for Authentication
294 Authentication Bypass by Capture-replay 58
296 Improper Following of Chain of Trust for Certificate Validation 1
297 Improper Validation of Host-specific Certificate Data 9
298 Improper Validation of Certificate Expiration
299 Improper Check for Certificate Revocation 1
300 Channel Accessible by Non-Endpoint ('Man-in-the-Middle') 3
301 Reflection Attack in an Authentication Protocol
302 Authentication Bypass by Assumed-Immutable Data 1
303 Incorrect Implementation of Authentication Algorithm 2
304 Missing Critical Step in Authentication 1
305 Authentication Bypass by Primary Weakness 4
306 Missing Authentication for Critical Function 428
307 Improper Restriction of Excessive Authentication Attempts 138
308 Use of Single-factor Authentication
309 Use of Password System for Primary Authentication
311 Missing Encryption of Sensitive Data 188
312 Cleartext Storage of Sensitive Information 258
313 Plaintext Storage in a File or on Disk 1
314 Plaintext Storage in the Registry
315 Plaintext Storage in a Cookie 1
316 Plaintext Storage in Memory 1
317 Plaintext Storage in GUI 1
318 Plaintext Storage in Executable
319 Cleartext Transmission of Sensitive Information 283
321 Use of Hard-coded Cryptographic Key 11
322 Key Exchange without Entity Authentication
323 Reusing a Nonce, Key Pair in Encryption 1
324 Use of a Key Past its Expiration Date
325 Missing Required Cryptographic Step 1
326 Inadequate Encryption Strength 278
327 Use of a Broken or Risky Cryptographic Algorithm 244
328 Reversible One-Way Hash
329 Not Using a Random IV with CBC Mode
330 Use of Insufficiently Random Values 105
331 Insufficient Entropy 35
332 Insufficient Entropy in PRNG 10
333 Improper Handling of Insufficient Entropy in TRNG
334 Small Space of Random Values 1
335 PRNG Seed Error 13
336 Same Seed in PRNG
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 (This Page)7 8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.