Common Weakness Enumeration: CWE

CWE is a community-developed list of common software and hardware weakness types that have security ramifications. A “weakness” is a condition in a software, firmware, hardware, or service component that, under certain circumstances, could contribute to the introduction of vulnerabilities. The CWE List and associated classification taxonomy serve as a language that can be used to identify and describe these weaknesses in terms of CWEs.
CWE Number Name Action
CWE-510 Trapdoor
CWE-511 Logic/Time Bomb
CWE-512 Spyware
CWE-514 Covert Channel
CWE-515 Covert Storage Channel
CWE-516 DEPRECATED: Covert Timing Channel
CWE-520 .NET Misconfiguration: Use of Impersonation
CWE-521 Weak Password Requirements
CWE-522 Insufficiently Protected Credentials
CWE-523 Unprotected Transport of Credentials
CWE-524 Use of Cache Containing Sensitive Information
CWE-525 Use of Web Browser Cache Containing Sensitive Information
CWE-526 Cleartext Storage of Sensitive Information in an Environment Variable
CWE-527 Exposure of Version-Control Repository to an Unauthorized Control Sphere
CWE-528 Exposure of Core Dump File to an Unauthorized Control Sphere
CWE-529 Exposure of Access Control List Files to an Unauthorized Control Sphere
CWE-530 Exposure of Backup File to an Unauthorized Control Sphere
CWE-531 Inclusion of Sensitive Information in Test Code
CWE-532 Insertion of Sensitive Information into Log File
CWE-533 DEPRECATED: Information Exposure Through Server Log Files
CWE-534 DEPRECATED: Information Exposure Through Debug Log Files
CWE-535 Exposure of Information Through Shell Error Message
CWE-536 Servlet Runtime Error Message Containing Sensitive Information
CWE-537 Java Runtime Error Message Containing Sensitive Information
CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory
CWE-539 Use of Persistent Cookies Containing Sensitive Information
CWE-540 Inclusion of Sensitive Information in Source Code
CWE-541 Inclusion of Sensitive Information in an Include File
CWE-542 DEPRECATED: Information Exposure Through Cleanup Log Files
CWE-543 Use of Singleton Pattern Without Synchronization in a Multithreaded Context
CWE-544 Missing Standardized Error Handling Mechanism
CWE-545 DEPRECATED: Use of Dynamic Class Loading
CWE-546 Suspicious Comment
CWE-547 Use of Hard-coded, Security-relevant Constants
CWE-548 Exposure of Information Through Directory Listing
CWE-549 Missing Password Field Masking
CWE-550 Server-generated Error Message Containing Sensitive Information
CWE-551 Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
CWE-552 Files or Directories Accessible to External Parties
CWE-553 Command Shell in Externally Accessible Directory
CWE-554 ASP.NET Misconfiguration: Not Using Input Validation Framework
CWE-555 J2EE Misconfiguration: Plaintext Password in Configuration File
CWE-556 ASP.NET Misconfiguration: Use of Identity Impersonation
CWE-558 Use of getlogin() in Multithreaded Application
CWE-560 Use of umask() with chmod-style Argument
CWE-561 Dead Code
CWE-562 Return of Stack Variable Address
CWE-563 Assignment to Variable without Use
CWE-564 SQL Injection: Hibernate
CWE-565 Reliance on Cookies without Validation and Integrity Checking
Showing 50 of 959 Results
© cvefeed.io
Latest DB Update: Nov. 21, 2024 23:16