Common Weakness Enumeration: CWE

CWE is a community-developed list of common software and hardware weakness types that have security ramifications. A “weakness” is a condition in a software, firmware, hardware, or service component that, under certain circumstances, could contribute to the introduction of vulnerabilities. The CWE List and associated classification taxonomy serve as a language that can be used to identify and describe these weaknesses in terms of CWEs.
CWE Number Name Action
CWE-1106 Insufficient Use of Symbolic Constants
CWE-1107 Insufficient Isolation of Symbolic Constant Definitions
CWE-1108 Excessive Reliance on Global Variables
CWE-1109 Use of Same Variable for Multiple Purposes
CWE-1110 Incomplete Design Documentation
CWE-1111 Incomplete I/O Documentation
CWE-1112 Incomplete Documentation of Program Execution
CWE-1113 Inappropriate Comment Style
CWE-1114 Inappropriate Whitespace Style
CWE-1115 Source Code Element without Standard Prologue
CWE-1116 Inaccurate Comments
CWE-1117 Callable with Insufficient Behavioral Summary
CWE-1118 Insufficient Documentation of Error Handling Techniques
CWE-1119 Excessive Use of Unconditional Branching
CWE-1120 Excessive Code Complexity
CWE-1121 Excessive McCabe Cyclomatic Complexity
CWE-1122 Excessive Halstead Complexity
CWE-1123 Excessive Use of Self-Modifying Code
CWE-1124 Excessively Deep Nesting
CWE-1125 Excessive Attack Surface
CWE-1126 Declaration of Variable with Unnecessarily Wide Scope
CWE-1127 Compilation with Insufficient Warnings or Errors
CWE-1164 Irrelevant Code
CWE-1173 Improper Use of Validation Framework
CWE-1174 ASP.NET Misconfiguration: Improper Model Validation
CWE-1176 Inefficient CPU Computation
CWE-1177 Use of Prohibited Code
CWE-1187 DEPRECATED: Use of Uninitialized Resource
CWE-1188 Initialization of a Resource with an Insecure Default
CWE-1189 Improper Isolation of Shared Resources on System-on-a-Chip (SoC)
CWE-1190 DMA Device Enabled Too Early in Boot Phase
CWE-1191 On-Chip Debug and Test Interface With Improper Access Control
CWE-1192 System-on-Chip (SoC) Using Components without Unique, Immutable Identifiers
CWE-1193 Power-On of Untrusted Execution Core Before Enabling Fabric Access Control
CWE-1204 Generation of Weak Initialization Vector (IV)
CWE-1209 Failure to Disable Reserved Bits
CWE-1220 Insufficient Granularity of Access Control
CWE-1221 Incorrect Register Defaults or Module Parameters
CWE-1222 Insufficient Granularity of Address Regions Protected by Register Locks
CWE-1223 Race Condition for Write-Once Attributes
CWE-1224 Improper Restriction of Write-Once Bit Fields
CWE-1229 Creation of Emergent Resource
CWE-1230 Exposure of Sensitive Information Through Metadata
CWE-1231 Improper Prevention of Lock Bit Modification
CWE-1232 Improper Lock Behavior After Power State Transition
CWE-1233 Security-Sensitive Hardware Controls with Missing Lock Bit Protection
CWE-1234 Hardware Internal or Debug Modes Allow Override of Locks
CWE-1235 Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations
CWE-1236 Improper Neutralization of Formula Elements in a CSV File
CWE-1239 Improper Zeroization of Hardware Register
Showing 50 of 959 Results