|
CWE-79
|
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') |
1194 |
|
CWE-862
|
Missing Authorization |
556 |
|
CWE-89
|
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') |
510 |
|
CWE-74
|
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') |
288 |
|
CWE-78
|
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
272 |
|
CWE-77
|
Improper Neutralization of Special Elements used in a Command ('Command Injection') |
256 |
|
CWE-119
|
Improper Restriction of Operations within the Bounds of a Memory Buffer |
256 |
|
CWE-94
|
Improper Control of Generation of Code ('Code Injection') |
241 |
|
CWE-22
|
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') |
235 |
|
CWE-284
|
Improper Access Control |
216 |
|
CWE-122
|
Heap-based Buffer Overflow |
216 |
|
CWE-121
|
Stack-based Buffer Overflow |
210 |
|
CWE-125
|
Out-of-bounds Read |
177 |
|
CWE-918
|
Server-Side Request Forgery (SSRF) |
173 |
|
CWE-502
|
Deserialization of Untrusted Data |
154 |
|
CWE-416
|
Use After Free |
152 |
|
CWE-200
|
Exposure of Sensitive Information to an Unauthorized Actor |
139 |
|
CWE-120
|
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') |
135 |
|
CWE-20
|
Improper Input Validation |
127 |
|
CWE-98
|
Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') |
122 |
|
CWE-787
|
Out-of-bounds Write |
122 |
|
CWE-352
|
Cross-Site Request Forgery (CSRF) |
122 |
|
CWE-639
|
Authorization Bypass Through User-Controlled Key |
113 |
|
CWE-266
|
Incorrect Privilege Assignment |
109 |
|
CWE-306
|
Missing Authentication for Critical Function |
107 |
|
CWE-434
|
Unrestricted Upload of File with Dangerous Type |
104 |
|
CWE-476
|
NULL Pointer Dereference |
100 |
|
CWE-287
|
Improper Authentication |
93 |
|
CWE-863
|
Incorrect Authorization |
84 |
|
CWE-770
|
Allocation of Resources Without Limits or Throttling |
75 |
|
CWE-285
|
Improper Authorization |
66 |
|
CWE-269
|
Improper Privilege Management |
60 |
|
CWE-404
|
Improper Resource Shutdown or Release |
54 |
|
CWE-73
|
External Control of File Name or Path |
49 |
|
CWE-362
|
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') |
49 |
|
CWE-601
|
URL Redirection to Untrusted Site ('Open Redirect') |
48 |
|
CWE-400
|
Uncontrolled Resource Consumption |
48 |
|
CWE-428
|
Unquoted Search Path or Element |
47 |
|
CWE-295
|
Improper Certificate Validation |
47 |
|
CWE-532
|
Insertion of Sensitive Information into Log File |
46 |
|
CWE-427
|
Uncontrolled Search Path Element |
45 |
|
CWE-367
|
Time-of-check Time-of-use (TOCTOU) Race Condition |
44 |
|
CWE-59
|
Improper Link Resolution Before File Access ('Link Following') |
38 |
|
CWE-426
|
Untrusted Search Path |
37 |
|
CWE-732
|
Incorrect Permission Assignment for Critical Resource |
36 |
|
CWE-798
|
Use of Hard-coded Credentials |
35 |
|
CWE-190
|
Integer Overflow or Wraparound |
34 |
|
CWE-693
|
Protection Mechanism Failure |
32 |
|
CWE-613
|
Insufficient Session Expiration |
31 |
|
CWE-345
|
Insufficient Verification of Data Authenticity |
31 |
|
CWE-288
|
Authentication Bypass Using an Alternate Path or Channel |
31 |
|
CWE-451
|
User Interface (UI) Misrepresentation of Critical Information |
30 |
|
CWE-276
|
Incorrect Default Permissions |
30 |
|
CWE-116
|
Improper Encoding or Escaping of Output |
27 |
|
CWE-822
|
Untrusted Pointer Dereference |
26 |
|
CWE-843
|
Access of Resource Using Incompatible Type ('Type Confusion') |
25 |
|
CWE-201
|
Insertion of Sensitive Information Into Sent Data |
25 |
|
CWE-126
|
Buffer Over-read |
25 |
|
CWE-617
|
Reachable Assertion |
24 |
|
CWE-312
|
Cleartext Storage of Sensitive Information |
23 |
|
CWE-307
|
Improper Restriction of Excessive Authentication Attempts |
23 |
|
CWE-497
|
Exposure of Sensitive System Information to an Unauthorized Control Sphere |
22 |
|
CWE-23
|
Relative Path Traversal |
22 |
|
CWE-80
|
Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) |
21 |
|
CWE-346
|
Origin Validation Error |
21 |
|
CWE-704
|
Incorrect Type Conversion or Cast |
19 |
|
CWE-640
|
Weak Password Recovery Mechanism for Forgotten Password |
19 |
|
CWE-209
|
Generation of Error Message Containing Sensitive Information |
19 |
|
CWE-401
|
Missing Release of Memory after Effective Lifetime |
18 |
|
CWE-1333
|
Inefficient Regular Expression Complexity |
18 |
|
CWE-1284
|
Improper Validation of Specified Quantity in Input |
18 |
|
CWE-807
|
Reliance on Untrusted Inputs in a Security Decision |
17 |
|
CWE-522
|
Insufficiently Protected Credentials |
17 |
|
CWE-1336
|
Improper Neutralization of Special Elements Used in a Template Engine |
17 |
|
CWE-835
|
Loop with Unreachable Exit Condition ('Infinite Loop') |
16 |
|
CWE-829
|
Inclusion of Functionality from Untrusted Control Sphere |
16 |
|
CWE-754
|
Improper Check for Unusual or Exceptional Conditions |
16 |
|
CWE-347
|
Improper Verification of Cryptographic Signature |
16 |
|
CWE-789
|
Memory Allocation with Excessive Size Value |
15 |
|
CWE-359
|
Exposure of Private Personal Information to an Unauthorized Actor |
15 |
|
CWE-250
|
Execution with Unnecessary Privileges |
15 |
|
CWE-191
|
Integer Underflow (Wrap or Wraparound) |
15 |
|
CWE-327
|
Use of a Broken or Risky Cryptographic Algorithm |
14 |
|
CWE-338
|
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) |
13 |
|
CWE-330
|
Use of Insufficiently Random Values |
13 |
|
CWE-319
|
Cleartext Transmission of Sensitive Information |
13 |
|
CWE-203
|
Observable Discrepancy |
13 |
|
CWE-1392
|
Use of Default Credentials |
13 |
|
CWE-1286
|
Improper Validation of Syntactic Correctness of Input |
13 |
|
CWE-611
|
Improper Restriction of XML External Entity Reference |
12 |
|
CWE-1327
|
Binding to an Unrestricted IP Address |
12 |
|
CWE-444
|
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') |
11 |
|
CWE-204
|
Observable Response Discrepancy |
11 |
|
CWE-166
|
Improper Handling of Missing Special Element |
11 |
|
CWE-1390
|
Weak Authentication |
11 |
|
CWE-1321
|
Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') |
11 |
|
CWE-129
|
Improper Validation of Array Index |
11 |
|
CWE-88
|
Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') |
10 |
|
CWE-674
|
Uncontrolled Recursion |
10 |
|
CWE-494
|
Download of Code Without Integrity Check |
10 |
|
CWE-321
|
Use of Hard-coded Cryptographic Key |
10 |
|
CWE-290
|
Authentication Bypass by Spoofing |
10 |
|
CWE-1004
|
Sensitive Cookie Without 'HttpOnly' Flag |
10 |
|
CWE-457
|
Use of Uninitialized Variable |
9 |
|
CWE-407
|
Inefficient Algorithmic Complexity |
9 |
|
CWE-331
|
Insufficient Entropy |
9 |
|
CWE-95
|
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') |
8 |
|
CWE-358
|
Improperly Implemented Security Check for Standard |
8 |
|
CWE-340
|
Generation of Predictable Numbers or Identifiers |
8 |
|
CWE-698
|
Execution After Redirect (EAR) |
7 |
|
CWE-668
|
Exposure of Resource to Wrong Sphere |
7 |
|
CWE-648
|
Incorrect Use of Privileged APIs |
7 |
|
CWE-384
|
Session Fixation |
7 |
|
CWE-280
|
Improper Handling of Insufficient Permissions or Privileges |
7 |
|
CWE-256
|
Plaintext Storage of a Password |
7 |
|
CWE-178
|
Improper Handling of Case Sensitivity |
7 |
|
CWE-117
|
Improper Output Neutralization for Logs |
7 |
|
CWE-943
|
Improper Neutralization of Special Elements in Data Query Logic |
6 |
|
CWE-805
|
Buffer Access with Incorrect Length Value |
6 |
|
CWE-755
|
Improper Handling of Exceptional Conditions |
6 |
|
CWE-644
|
Improper Neutralization of HTTP Headers for Scripting Syntax |
6 |
|
CWE-627
|
Dynamic Variable Evaluation |
6 |
|
CWE-620
|
Unverified Password Change |
6 |
|
CWE-61
|
UNIX Symbolic Link (Symlink) Following |
6 |
|
CWE-459
|
Incomplete Cleanup |
6 |
|
CWE-36
|
Absolute Path Traversal |
6 |
|
CWE-283
|
Unverified Ownership |
6 |
|
CWE-267
|
Privilege Defined With Unsafe Actions |
6 |
|
CWE-259
|
Use of Hard-coded Password |
6 |
|
CWE-248
|
Uncaught Exception |
6 |
|
CWE-170
|
Improper Null Termination |
6 |
|
CWE-1220
|
Insufficient Granularity of Access Control |
6 |
|
CWE-1188
|
Initialization of a Resource with an Insecure Default |
6 |
|
CWE-940
|
Improper Verification of Source of a Communication Channel |
5 |
|
CWE-908
|
Use of Uninitialized Resource |
5 |
|
CWE-749
|
Exposed Dangerous Method or Function |
5 |
|
CWE-610
|
Externally Controlled Reference to a Resource in Another Sphere |
5 |
|
CWE-548
|
Exposure of Information Through Directory Listing |
5 |
|
CWE-538
|
Insertion of Sensitive Information into Externally-Accessible File or Directory |
5 |
|
CWE-356
|
Product UI does not Warn User of Unsafe Actions |
5 |
|
CWE-305
|
Authentication Bypass by Primary Weakness |
5 |
|
CWE-208
|
Observable Timing Discrepancy |
5 |
|
CWE-184
|
Incomplete List of Disallowed Inputs |
5 |
|
CWE-1393
|
Use of Default Password |
5 |
|
CWE-134
|
Use of Externally-Controlled Format String |
5 |
|
CWE-942
|
Permissive Cross-domain Security Policy with Untrusted Domains |
4 |
|
CWE-93
|
Improper Neutralization of CRLF Sequences ('CRLF Injection') |
4 |
|
CWE-774
|
Allocation of File Descriptors or Handles Without Limits or Throttling |
4 |
|
CWE-705
|
Incorrect Control Flow Scoping |
4 |
|
CWE-681
|
Incorrect Conversion between Numeric Types |
4 |
|
CWE-669
|
Incorrect Resource Transfer Between Spheres |
4 |
|
CWE-665
|
Improper Initialization |
4 |
|
CWE-521
|
Weak Password Requirements |
4 |
|
CWE-441
|
Unintended Proxy or Intermediary ('Confused Deputy') |
4 |
|
CWE-436
|
Interpretation Conflict |
4 |
|
CWE-415
|
Double Free |
4 |
|
CWE-409
|
Improper Handling of Highly Compressed Data (Data Amplification) |
4 |
|
CWE-369
|
Divide By Zero |
4 |
|
CWE-354
|
Improper Validation of Integrity Check Value |
4 |
|
CWE-35
|
Path Traversal: '.../...//' |
4 |
|
CWE-322
|
Key Exchange without Entity Authentication |
4 |
|
CWE-303
|
Incorrect Implementation of Authentication Algorithm |
4 |
|
CWE-296
|
Improper Following of a Certificate's Chain of Trust |
4 |
|
CWE-294
|
Authentication Bypass by Capture-replay |
4 |
|
CWE-257
|
Storing Passwords in a Recoverable Format |
4 |
|
CWE-212
|
Improper Removal of Sensitive Information Before Storage or Transfer |
4 |
|
CWE-193
|
Off-by-one Error |
4 |
|
CWE-15
|
External Control of System or Configuration Setting |
4 |
|
CWE-1385
|
Missing Origin Validation in WebSockets |
4 |
|
CWE-131
|
Incorrect Calculation of Buffer Size |
4 |
|
CWE-1287
|
Improper Validation of Specified Type of Input |
4 |
|
CWE-1191
|
On-Chip Debug and Test Interface With Improper Access Control |
4 |
|
CWE-113
|
Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') |
4 |
|
CWE-915
|
Improperly Controlled Modification of Dynamically-Determined Object Attributes |
3 |
|
CWE-86
|
Improper Neutralization of Invalid Characters in Identifiers in Web Pages |
3 |
|
CWE-703
|
Improper Check or Handling of Exceptional Conditions |
3 |
|
CWE-682
|
Incorrect Calculation |
3 |
|
CWE-653
|
Improper Isolation or Compartmentalization |
3 |
|
CWE-552
|
Files or Directories Accessible to External Parties |
3 |
|
CWE-524
|
Use of Cache Containing Sensitive Information |
3 |
|
CWE-405
|
Asymmetric Resource Consumption (Amplification) |
3 |
|
CWE-379
|
Creation of Temporary File in Directory with Insecure Permissions |
3 |
|
CWE-350
|
Reliance on Reverse DNS Resolution for a Security-Critical Action |
3 |
|
CWE-317
|
Cleartext Storage of Sensitive Information in GUI |
3 |
|
CWE-185
|
Incorrect Regular Expression |
3 |
|
CWE-180
|
Incorrect Behavior Order: Validate Before Canonicalize |
3 |
|
CWE-1394
|
Use of Default Cryptographic Key |
3 |
|
CWE-1289
|
Improper Validation of Unsafe Equivalence in Input |
3 |
|
CWE-1275
|
Sensitive Cookie with Improper SameSite Attribute |
3 |
|
CWE-124
|
Buffer Underwrite ('Buffer Underflow') |
3 |
|
CWE-1236
|
Improper Neutralization of Formula Elements in a CSV File |
3 |
|
CWE-1021
|
Improper Restriction of Rendered UI Layers or Frames |
3 |
|
CWE-939
|
Improper Authorization in Handler for Custom URL Scheme |
2 |
|
CWE-913
|
Improper Control of Dynamically-Managed Code Resources |
2 |
|
CWE-912
|
Hidden Functionality |
2 |
|
CWE-87
|
Improper Neutralization of Alternate XSS Syntax |
2 |
|
CWE-834
|
Excessive Iteration |
2 |
|
CWE-799
|
Improper Control of Interaction Frequency |
2 |
|
CWE-791
|
Incomplete Filtering of Special Elements |
2 |
|
CWE-788
|
Access of Memory Location After End of Buffer |
2 |
|
CWE-776
|
Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') |
2 |
|
CWE-772
|
Missing Release of Resource after Effective Lifetime |
2 |
|
CWE-75
|
Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) |
2 |
|
CWE-707
|
Improper Neutralization |
2 |
|
CWE-697
|
Incorrect Comparison |
2 |
|
CWE-680
|
Integer Overflow to Buffer Overflow |
2 |
|
CWE-670
|
Always-Incorrect Control Flow Implementation |
2 |
|
CWE-67
|
Improper Handling of Windows Device Names |
2 |
|
CWE-663
|
Use of a Non-reentrant Function in a Concurrent Context |
2 |
|
CWE-647
|
Use of Non-Canonical URL Paths for Authorization Decisions |
2 |
|
CWE-614
|
Sensitive Cookie in HTTPS Session Without 'Secure' Attribute |
2 |
|
CWE-606
|
Unchecked Input for Loop Condition |
2 |
|
CWE-602
|
Client-Side Enforcement of Server-Side Security |
2 |
|
CWE-573
|
Improper Following of Specification by Caller |
2 |
|
CWE-566
|
Authorization Bypass Through User-Controlled SQL Primary Key |
2 |
|
CWE-530
|
Exposure of Backup File to an Unauthorized Control Sphere |
2 |
|
CWE-525
|
Use of Web Browser Cache Containing Sensitive Information |
2 |
|
CWE-506
|
Embedded Malicious Code |
2 |
|
CWE-488
|
Exposure of Data Element to Wrong Session |
2 |
|
CWE-477
|
Use of Obsolete Function |
2 |
|
CWE-425
|
Direct Request ('Forced Browsing') |
2 |
|
CWE-40
|
Path Traversal: '\\UNC\share\name\' (Windows UNC Share) |
2 |
|
CWE-396
|
Declaration of Catch for Generic Exception |
2 |
|
CWE-378
|
Creation of Temporary File With Insecure Permissions |
2 |
|
CWE-377
|
Insecure Temporary File |
2 |
|
CWE-353
|
Missing Support for Integrity Check |
2 |
|
CWE-326
|
Inadequate Encryption Strength |
2 |
|
CWE-323
|
Reusing a Nonce, Key Pair in Encryption |
2 |
|
CWE-316
|
Cleartext Storage of Sensitive Information in Memory |
2 |
|
CWE-302
|
Authentication Bypass by Assumed-Immutable Data |
2 |
|
CWE-297
|
Improper Validation of Certificate with Host Mismatch |
2 |
|
CWE-29
|
Path Traversal: '\..\filename' |
2 |
|
CWE-277
|
Insecure Inherited Permissions |
2 |
|
CWE-272
|
Least Privilege Violation |
2 |
|
CWE-270
|
Privilege Context Switching Error |
2 |
|
CWE-233
|
Improper Handling of Parameters |
2 |
|
CWE-230
|
Improper Handling of Missing Values |
2 |
|
CWE-229
|
Improper Handling of Values |
2 |
|
CWE-213
|
Exposure of Sensitive Information Due to Incompatible Policies |
2 |
|
CWE-195
|
Signed to Unsigned Conversion Error |
2 |
|
CWE-159
|
Improper Handling of Invalid Use of Special Elements |
2 |
|
CWE-150
|
Improper Neutralization of Escape, Meta, or Control Sequences |
2 |
|
CWE-146
|
Improper Neutralization of Expression/Command Delimiters |
2 |
|
CWE-1325
|
Improperly Controlled Sequential Memory Allocation |
2 |
|
CWE-1299
|
Missing Protection Mechanism for Alternate Hardware Interface |
2 |
|
CWE-1285
|
Improper Validation of Specified Index, Position, or Offset in Input |
2 |
|
CWE-1282
|
Assumed-Immutable Data is Stored in Writable Memory |
2 |
|
CWE-1274
|
Improper Access Control for Volatile Memory Containing Boot Code |
2 |
|
CWE-1260
|
Improper Handling of Overlap Between Protected Memory Ranges |
2 |
|
CWE-1254
|
Incorrect Comparison Logic Granularity |
2 |
|
CWE-1241
|
Use of Predictable Algorithm in Random Number Generator |
2 |
|
CWE-1240
|
Use of a Cryptographic Primitive with a Risky Implementation |
2 |
|
CWE-1204
|
Generation of Weak Initialization Vector (IV) |
2 |
|
CWE-96
|
Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') |
1 |
|
CWE-922
|
Insecure Storage of Sensitive Information |
1 |
|
CWE-91
|
XML Injection (aka Blind XPath Injection) |
1 |
|
CWE-90
|
Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection') |
1 |
|
CWE-841
|
Improper Enforcement of Behavioral Workflow |
1 |
|
CWE-824
|
Access of Uninitialized Pointer |
1 |
|
CWE-823
|
Use of Out-of-range Pointer Offset |
1 |
|
CWE-783
|
Operator Precedence Logic Error |
1 |
|
CWE-782
|
Exposed IOCTL with Insufficient Access Control |
1 |
|
CWE-778
|
Insufficient Logging |
1 |
|
CWE-759
|
Use of a One-Way Hash without a Salt |
1 |
|
CWE-706
|
Use of Incorrectly-Resolved Name or Reference |
1 |
|
CWE-643
|
Improper Neutralization of Data within XPath Expressions ('XPath Injection') |
1 |
|
CWE-628
|
Function Call with Incorrectly Specified Arguments |
1 |
|
CWE-624
|
Executable Regular Expression Error |
1 |
|
CWE-605
|
Multiple Binds to the Same Port |
1 |
|
CWE-599
|
Missing Validation of OpenSSL Certificate |
1 |
|
CWE-539
|
Use of Persistent Cookies Containing Sensitive Information |
1 |
|
CWE-526
|
Cleartext Storage of Sensitive Information in an Environment Variable |
1 |
|
CWE-501
|
Trust Boundary Violation |
1 |
|
CWE-473
|
PHP External Variable Modification |
1 |
|
CWE-470
|
Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') |
1 |
|
CWE-420
|
Unprotected Alternate Channel |
1 |
|
CWE-412
|
Unrestricted Externally Accessible Lock |
1 |
|
CWE-410
|
Insufficient Resource Pool |
1 |
|
CWE-394
|
Unexpected Status Code or Return Value |
1 |
|
CWE-390
|
Detection of Error Condition Without Action |
1 |
|
CWE-366
|
Race Condition within a Thread |
1 |
|
CWE-349
|
Acceptance of Extraneous Untrusted Data With Trusted Data |
1 |
|
CWE-337
|
Predictable Seed in Pseudo-Random Number Generator (PRNG) |
1 |
|
CWE-336
|
Same Seed in Pseudo-Random Number Generator (PRNG) |
1 |
|
CWE-328
|
Use of Weak Hash |
1 |
|
CWE-291
|
Reliance on IP Address for Authentication |
1 |
|
CWE-289
|
Authentication Bypass by Alternate Name |
1 |
|
CWE-261
|
Weak Encoding for Password |
1 |
|
CWE-26
|
Path Traversal: '/dir/../filename' |
1 |
|
CWE-244
|
Improper Clearing of Heap Memory Before Release ('Heap Inspection') |
1 |
|
CWE-231
|
Improper Handling of Extra Values |
1 |
|
CWE-215
|
Insertion of Sensitive Information Into Debugging Code |
1 |
|
CWE-183
|
Permissive List of Allowed Inputs |
1 |
|
CWE-176
|
Improper Handling of Unicode Encoding |
1 |
|
CWE-1420
|
Exposure of Sensitive Information during Transient Execution |
1 |
|
CWE-1391
|
Use of Weak Credentials |
1 |
|
CWE-1301
|
Insufficient or Incomplete Data Removal within Hardware Component |
1 |
|
CWE-130
|
Improper Handling of Length Parameter Inconsistency |
1 |
|
CWE-1288
|
Improper Validation of Consistency within Input |
1 |
|
CWE-1262
|
Improper Access Control for Register Interface |
1 |
|
CWE-1245
|
Improper Finite State Machines (FSMs) in Hardware Logic |
1 |
|
CWE-1231
|
Improper Prevention of Lock Bit Modification |
1 |
|
CWE-123
|
Write-what-where Condition |
1 |
|
CWE-1189
|
Improper Isolation of Shared Resources on System-on-a-Chip (SoC) |
1 |
|
CWE-1125
|
Excessive Attack Surface |
1 |