CWE List

ID Name Occurrences
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') 618
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') 277
CWE-416 Use After Free 235
CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') 173
CWE-862 Missing Authorization 166
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor 119
CWE-284 Improper Access Control 118
CWE-352 Cross-Site Request Forgery (CSRF) 87
CWE-94 Improper Control of Generation of Code ('Code Injection') 82
CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer 82
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') 79
CWE-125 Out-of-bounds Read 79
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') 77
CWE-20 Improper Input Validation 67
CWE-121 Stack-based Buffer Overflow 67
CWE-502 Deserialization of Untrusted Data 62
CWE-434 Unrestricted Upload of File with Dangerous Type 61
CWE-122 Heap-based Buffer Overflow 57
CWE-476 NULL Pointer Dereference 55
CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') 52
CWE-787 Out-of-bounds Write 43
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') 42
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') 42
CWE-918 Server-Side Request Forgery (SSRF) 41
CWE-863 Incorrect Authorization 38
CWE-306 Missing Authentication for Critical Function 37
CWE-639 Authorization Bypass Through User-Controlled Key 36
CWE-770 Allocation of Resources Without Limits or Throttling 35
CWE-287 Improper Authentication 35
CWE-73 External Control of File Name or Path 31
CWE-532 Insertion of Sensitive Information into Log File 31
CWE-1287 Improper Validation of Specified Type of Input 31
CWE-400 Uncontrolled Resource Consumption 28
CWE-822 Untrusted Pointer Dereference 27
CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') 26
CWE-266 Incorrect Privilege Assignment 26
CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) 24
CWE-59 Improper Link Resolution Before File Access ('Link Following') 23
CWE-601 URL Redirection to Untrusted Site ('Open Redirect') 22
CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition 22
CWE-285 Improper Authorization 22
CWE-126 Buffer Over-read 22
CWE-269 Improper Privilege Management 21
CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere 20
CWE-288 Authentication Bypass Using an Alternate Path or Channel 20
CWE-190 Integer Overflow or Wraparound 20
CWE-427 Uncontrolled Search Path Element 19
CWE-250 Execution with Unnecessary Privileges 19
CWE-841 Improper Enforcement of Behavioral Workflow 17
CWE-732 Incorrect Permission Assignment for Critical Resource 16
CWE-613 Insufficient Session Expiration 14
CWE-319 Cleartext Transmission of Sensitive Information 13
CWE-276 Incorrect Default Permissions 13
CWE-23 Relative Path Traversal 13
CWE-201 Insertion of Sensitive Information Into Sent Data 13
CWE-347 Improper Verification of Cryptographic Signature 12
CWE-843 Access of Resource Using Incompatible Type ('Type Confusion') 11
CWE-798 Use of Hard-coded Credentials 11
CWE-346 Origin Validation Error 11
CWE-307 Improper Restriction of Excessive Authentication Attempts 11
CWE-908 Use of Uninitialized Resource 10
CWE-522 Insufficiently Protected Credentials 10
CWE-248 Uncaught Exception 10
CWE-209 Generation of Error Message Containing Sensitive Information 10
CWE-693 Protection Mechanism Failure 9
CWE-404 Improper Resource Shutdown or Release 9
CWE-327 Use of a Broken or Risky Cryptographic Algorithm 9
CWE-295 Improper Certificate Validation 9
CWE-829 Inclusion of Functionality from Untrusted Control Sphere 8
CWE-754 Improper Check for Unusual or Exceptional Conditions 8
CWE-703 Improper Check or Handling of Exceptional Conditions 8
CWE-321 Use of Hard-coded Cryptographic Key 8
CWE-312 Cleartext Storage of Sensitive Information 8
CWE-290 Authentication Bypass by Spoofing 8
CWE-204 Observable Response Discrepancy 8
CWE-428 Unquoted Search Path or Element 7
CWE-252 Unchecked Return Value 7
CWE-191 Integer Underflow (Wrap or Wraparound) 7
CWE-674 Uncontrolled Recursion 6
CWE-415 Double Free 6
CWE-359 Exposure of Private Personal Information to an Unauthorized Actor 6
CWE-326 Inadequate Encryption Strength 6
CWE-303 Incorrect Implementation of Authentication Algorithm 6
CWE-1284 Improper Validation of Specified Quantity in Input 6
CWE-1236 Improper Neutralization of Formula Elements in a CSV File 6
CWE-942 Permissive Cross-domain Security Policy with Untrusted Domains 5
CWE-807 Reliance on Untrusted Inputs in a Security Decision 5
CWE-602 Client-Side Enforcement of Server-Side Security 5
CWE-552 Files or Directories Accessible to External Parties 5
CWE-521 Weak Password Requirements 5
CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') 5
CWE-358 Improperly Implemented Security Check for Standard 5
CWE-35 Path Traversal: '.../...//' 5
CWE-345 Insufficient Verification of Data Authenticity 5
CWE-1392 Use of Default Credentials 5
CWE-1390 Weak Authentication 5
CWE-134 Use of Externally-Controlled Format String 5
CWE-116 Improper Encoding or Escaping of Output 5
CWE-922 Insecure Storage of Sensitive Information 4
CWE-87 Improper Neutralization of Alternate XSS Syntax 4
CWE-837 Improper Enforcement of a Single, Unique Action 4
CWE-824 Access of Uninitialized Pointer 4
CWE-755 Improper Handling of Exceptional Conditions 4
CWE-669 Incorrect Resource Transfer Between Spheres 4
CWE-61 UNIX Symbolic Link (Symlink) Following 4
CWE-565 Reliance on Cookies without Validation and Integrity Checking 4
CWE-506 Embedded Malicious Code 4
CWE-426 Untrusted Search Path 4
CWE-384 Session Fixation 4
CWE-349 Acceptance of Extraneous Untrusted Data With Trusted Data 4
CWE-324 Use of a Key Past its Expiration Date 4
CWE-294 Authentication Bypass by Capture-replay 4
CWE-259 Use of Hard-coded Password 4
CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') 4
CWE-1240 Use of a Cryptographic Primitive with a Risky Implementation 4
CWE-1023 Incomplete Comparison with Missing Factors 4
CWE-940 Improper Verification of Source of a Communication Channel 3
CWE-912 Hidden Functionality 3
CWE-88 Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') 3
CWE-823 Use of Out-of-range Pointer Offset 3
CWE-799 Improper Control of Interaction Frequency 3
CWE-789 Memory Allocation with Excessive Size Value 3
CWE-772 Missing Release of Resource after Effective Lifetime 3
CWE-617 Reachable Assertion 3
CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute 3
CWE-611 Improper Restriction of XML External Entity Reference 3
CWE-548 Exposure of Information Through Directory Listing 3
CWE-401 Missing Release of Memory after Effective Lifetime 3
CWE-340 Generation of Predictable Numbers or Identifiers 3
CWE-305 Authentication Bypass by Primary Weakness 3
CWE-280 Improper Handling of Insufficient Permissions or Privileges 3
CWE-203 Observable Discrepancy 3
CWE-1395 Dependency on Vulnerable Third-Party Component 3
CWE-1336 Improper Neutralization of Special Elements Used in a Template Engine 3
CWE-1286 Improper Validation of Syntactic Correctness of Input 3
CWE-1220 Insufficient Granularity of Access Control 3
CWE-117 Improper Output Neutralization for Logs 3
CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') 2
CWE-93 Improper Neutralization of CRLF Sequences ('CRLF Injection') 2
CWE-833 Deadlock 2
CWE-83 Improper Neutralization of Script in Attributes in a Web Page 2
CWE-668 Exposure of Resource to Wrong Sphere 2
CWE-640 Weak Password Recovery Mechanism for Forgotten Password 2
CWE-620 Unverified Password Change 2
CWE-603 Use of Client-Side Authentication 2
CWE-598 Use of GET Request Method With Sensitive Query Strings 2
CWE-525 Use of Web Browser Cache Containing Sensitive Information 2
CWE-494 Download of Code Without Integrity Check 2
CWE-459 Incomplete Cleanup 2
CWE-43 Path Equivalence: 'filename....' (Multiple Trailing Dot) 2
CWE-425 Direct Request ('Forced Browsing') 2
CWE-420 Unprotected Alternate Channel 2
CWE-394 Unexpected Status Code or Return Value 2
CWE-281 Improper Preservation of Permissions 2
CWE-257 Storing Passwords in a Recoverable Format 2
CWE-256 Plaintext Storage of a Password 2
CWE-233 Improper Handling of Parameters 2
CWE-178 Improper Handling of Case Sensitivity 2
CWE-170 Improper Null Termination 2
CWE-1333 Inefficient Regular Expression Complexity 2
CWE-1326 Missing Immutable Root of Trust in Hardware 2
CWE-131 Incorrect Calculation of Buffer Size 2
CWE-1285 Improper Validation of Specified Index, Position, or Offset in Input 2
CWE-1242 Inclusion of Undocumented Features or Chicken Bits 2
CWE-124 Buffer Underwrite ('Buffer Underflow') 2
CWE-113 Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') 2
CWE-1104 Use of Unmaintained Third Party Components 2
CWE-1021 Improper Restriction of Rendered UI Layers or Frames 2
CWE-1004 Sensitive Cookie Without 'HttpOnly' Flag 2
CWE-99 Improper Control of Resource Identifiers ('Resource Injection') 1
CWE-96 Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection') 1
CWE-923 Improper Restriction of Communication Channel to Intended Endpoints 1
CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection') 1
CWE-915 Improperly Controlled Modification of Dynamically-Determined Object Attributes 1
CWE-913 Improper Control of Dynamically-Managed Code Resources 1
CWE-91 XML Injection (aka Blind XPath Injection) 1
CWE-836 Use of Password Hash Instead of Password for Authentication 1
CWE-835 Loop with Unreachable Exit Condition ('Infinite Loop') 1
CWE-834 Excessive Iteration 1
CWE-805 Buffer Access with Incorrect Length Value 1
CWE-791 Incomplete Filtering of Special Elements 1
CWE-776 Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') 1
CWE-775 Missing Release of File Descriptor or Handle after Effective Lifetime 1
CWE-759 Use of a One-Way Hash without a Salt 1
CWE-758 Reliance on Undefined, Unspecified, or Implementation-Defined Behavior 1
CWE-757 Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') 1
CWE-75 Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) 1
CWE-749 Exposed Dangerous Method or Function 1
CWE-707 Improper Neutralization 1
CWE-706 Use of Incorrectly-Resolved Name or Reference 1
CWE-705 Incorrect Control Flow Scoping 1
CWE-704 Incorrect Type Conversion or Cast 1
CWE-694 Use of Multiple Resources with Duplicate Identifier 1
CWE-684 Incorrect Provision of Specified Functionality 1
CWE-672 Operation on a Resource after Expiration or Release 1
CWE-670 Always-Incorrect Control Flow Implementation 1
CWE-667 Improper Locking 1
CWE-664 Improper Control of a Resource Through its Lifetime 1
CWE-653 Improper Isolation or Compartmentalization 1
CWE-646 Reliance on File Name or Extension of Externally-Supplied File 1
CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax 1
CWE-643 Improper Neutralization of Data within XPath Expressions ('XPath Injection') 1
CWE-642 External Control of Critical State Data 1
CWE-610 Externally Controlled Reference to a Resource in Another Sphere 1
CWE-599 Missing Validation of OpenSSL Certificate 1
CWE-564 SQL Injection: Hibernate 1
CWE-550 Server-generated Error Message Containing Sensitive Information 1
CWE-544 Missing Standardized Error Handling Mechanism 1
CWE-538 Insertion of Sensitive Information into Externally-Accessible File or Directory 1
CWE-524 Use of Cache Containing Sensitive Information 1
CWE-523 Unprotected Transport of Credentials 1
CWE-489 Active Debug Code 1
CWE-488 Exposure of Data Element to Wrong Session 1
CWE-470 Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') 1
CWE-467 Use of sizeof() on a Pointer Type 1
CWE-457 Use of Uninitialized Variable 1
CWE-453 Insecure Default Variable Initialization 1
CWE-448 Obsolete Feature in UI 1
CWE-441 Unintended Proxy or Intermediary ('Confused Deputy') 1
CWE-440 Expected Behavior Violation 1
CWE-424 Improper Protection of Alternate Path 1
CWE-413 Improper Resource Locking 1
CWE-41 Improper Resolution of Path Equivalence 1
CWE-409 Improper Handling of Highly Compressed Data (Data Amplification) 1
CWE-407 Inefficient Algorithmic Complexity 1
CWE-405 Asymmetric Resource Consumption (Amplification) 1
CWE-390 Detection of Error Condition Without Action 1
CWE-385 Covert Timing Channel 1
CWE-377 Insecure Temporary File 1
CWE-369 Divide By Zero 1
CWE-364 Signal Handler Race Condition 1
CWE-36 Absolute Path Traversal 1
CWE-348 Use of Less Trusted Source 1
CWE-341 Predictable from Observable State 1
CWE-337 Predictable Seed in Pseudo-Random Number Generator (PRNG) 1
CWE-331 Insufficient Entropy 1
CWE-330 Use of Insufficiently Random Values 1
CWE-328 Use of Weak Hash 1
CWE-316 Cleartext Storage of Sensitive Information in Memory 1
CWE-308 Use of Single-factor Authentication 1
CWE-299 Improper Check for Certificate Revocation 1
CWE-297 Improper Validation of Certificate with Host Mismatch 1
CWE-29 Path Traversal: '\..\filename' 1
CWE-286 Incorrect User Management 1
CWE-279 Incorrect Execution-Assigned Permissions 1
CWE-277 Insecure Inherited Permissions 1
CWE-274 Improper Handling of Insufficient Privileges 1
CWE-273 Improper Check for Dropped Privileges 1
CWE-27 Path Traversal: 'dir/../../filename' 1
CWE-262 Not Using Password Aging 1
CWE-261 Weak Encoding for Password 1
CWE-260 Password in Configuration File 1
CWE-253 Incorrect Check of Function Return Value 1
CWE-25 Path Traversal: '/../filedir' 1
CWE-244 Improper Clearing of Heap Memory Before Release ('Heap Inspection') 1
CWE-24 Path Traversal: '../filedir' 1
CWE-239 Failure to Handle Incomplete Element 1
CWE-228 Improper Handling of Syntactically Invalid Structure 1
CWE-226 Sensitive Information in Resource Not Removed Before Reuse 1
CWE-214 Invocation of Process Using Visible Sensitive Information 1
CWE-208 Observable Timing Discrepancy 1
CWE-184 Incomplete List of Disallowed Inputs 1
CWE-159 Improper Handling of Invalid Use of Special Elements 1
CWE-158 Improper Neutralization of Null Byte or NUL Character 1
CWE-155 Improper Neutralization of Wildcards or Matching Symbols 1
CWE-150 Improper Neutralization of Escape, Meta, or Control Sequences 1
CWE-15 External Control of System or Configuration Setting 1
CWE-146 Improper Neutralization of Expression/Command Delimiters 1
CWE-1427 Improper Neutralization of Input Used for LLM Prompting 1
CWE-142 Improper Neutralization of Value Delimiters 1
CWE-1391 Use of Weak Credentials 1
CWE-1385 Missing Origin Validation in WebSockets 1
CWE-1327 Binding to an Unrestricted IP Address 1
CWE-1301 Insufficient or Incomplete Data Removal within Hardware Component 1
CWE-1288 Improper Validation of Consistency within Input 1
CWE-127 Buffer Under-read 1
CWE-1250 Improper Preservation of Consistency Between Independent Representations of Shared State 1
CWE-1191 On-Chip Debug and Test Interface With Improper Access Control 1
CWE-1188 Initialization of a Resource with an Insecure Default 1