CWE Weakness Database

Browse 944 Common Weakness Enumeration (CWE) entries maintained by MITRE. Each entry includes detailed descriptions, code examples, mitigations, detection methods, and real-world CVE references.

944
Weaknesses
523
Base
292
Variant
112
Class
Showing 944 weaknesses
Variant CWE-5

J2EE Misconfiguration: Data Transmission Without Encryption

Information sent over a network can be compromised while in transit. An attacker may be able to read or modify the conte...

1 mitigations
Variant CWE-6

J2EE Misconfiguration: Insufficient Session-ID Length

The J2EE application is configured to use an insufficient session ID length.

2 mitigations
Variant CWE-7

J2EE Misconfiguration: Missing Custom Error Page

The default error page of a web application should not display sensitive information about the product.

4 mitigations
Variant CWE-8

J2EE Misconfiguration: Entity Bean Declared Remote

When an application exposes a remote interface for an entity bean, it might also expose methods that get or set the bean...

1 mitigations
Variant CWE-9

J2EE Misconfiguration: Weak Access Permissions for EJB Methods

If elevated access rights are assigned to EJB methods, then an attacker can take advantage of the permissions to exploit...

1 mitigations
Variant CWE-11

ASP.NET Misconfiguration: Creating Debug Binary

Debugging messages help attackers learn about the system and plan a form of attack.

1 mitigations
Variant CWE-12

ASP.NET Misconfiguration: Missing Custom Error Page

An ASP .NET application must enable custom error pages in order to prevent attackers from mining information from the fr...

3 mitigations
Variant CWE-13

ASP.NET Misconfiguration: Password in Configuration File

Storing a plaintext password in a configuration file allows anyone who can read the file access to the password-protecte...

1 mitigations
Variant CWE-14

Compiler Removal of Code to Clear Buffers

Sensitive memory is cleared according to the source code, but compiler optimizations leave the memory untouched when it ...

3 mitigations
Base CWE-15

External Control of System or Configuration Setting

One or more system settings or configuration elements can be externally controlled by a user.

3 mitigations
Class CWE-20

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the ...

43 CVEs 10 mitigations
Base CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located...

23 CVEs 11 mitigations
Base CWE-23

Relative Path Traversal

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

34 CVEs 3 mitigations
Variant CWE-24

Path Traversal: '../filedir'

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

1 CVEs 2 mitigations
Variant CWE-25

Path Traversal: '/../filedir'

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

1 CVEs 2 mitigations
Variant CWE-26

Path Traversal: '/dir/../filename'

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

2 CVEs 2 mitigations
Variant CWE-27

Path Traversal: 'dir/../../filename'

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

1 CVEs 2 mitigations
Variant CWE-28

Path Traversal: '..\filedir'

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

5 CVEs 2 mitigations
Variant CWE-29

Path Traversal: '\..\filename'

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

2 CVEs 2 mitigations
Variant CWE-30

Path Traversal: '\dir\..\filename'

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

1 CVEs 2 mitigations
Variant CWE-31

Path Traversal: 'dir\..\..\filename'

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

1 CVEs 2 mitigations
Variant CWE-32

Path Traversal: '...' (Triple Dot)

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

9 CVEs 2 mitigations
Variant CWE-33

Path Traversal: '....' (Multiple Dot)

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

6 CVEs 2 mitigations
Variant CWE-34

Path Traversal: '....//'

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

1 CVEs 2 mitigations
Variant CWE-35

Path Traversal: '.../...//'

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

2 CVEs 2 mitigations
Base CWE-36

Absolute Path Traversal

The product uses external input to construct a pathname that should be within a restricted directory, but it does not pr...

18 CVEs 3 mitigations
Variant CWE-37

Path Traversal: '/absolute/pathname/here'

The product accepts input in the form of a slash absolute path ('/absolute/pathname/here') without appropriate validatio...

6 CVEs 2 mitigations
Variant CWE-38

Path Traversal: '\absolute\pathname\here'

The product accepts input in the form of a backslash absolute path ('\absolute\pathname\here') without appropriate valid...

3 CVEs 2 mitigations
Variant CWE-39

Path Traversal: 'C:dirname'

The product accepts input that contains a drive letter or Windows volume letter ('C:dirname') that potentially redirects...

7 CVEs 2 mitigations
Variant CWE-40

Path Traversal: '\\UNC\share\name\' (Windows UNC Share)

The product accepts input that identifies a Windows UNC share ('\\UNC\share\name') that potentially redirects access to ...

1 CVEs 2 mitigations
Base CWE-41

Improper Resolution of Path Equivalence

The product is vulnerable to file system contents disclosure through path equivalence. Path equivalence involves the use...

50 CVEs 3 mitigations
Variant CWE-42

Path Equivalence: 'filename.' (Trailing Dot)

The product accepts path input in the form of trailing dot ('filedir.') without appropriate validation, which can lead t...

7 CVEs
Variant CWE-43

Path Equivalence: 'filename....' (Multiple Trailing Dot)

The product accepts path input in the form of multiple trailing dot ('filedir....') without appropriate validation, whic...

1 CVEs
Variant CWE-44

Path Equivalence: 'file.name' (Internal Dot)

The product accepts path input in the form of internal dot ('file.ordir') without appropriate validation, which can lead...

1 CVEs
Variant CWE-45

Path Equivalence: 'file...name' (Multiple Internal Dot)

The product accepts path input in the form of multiple internal dot ('file...dir') without appropriate validation, which...

Variant CWE-46

Path Equivalence: 'filename ' (Trailing Space)

The product accepts path input in the form of trailing space ('filedir ') without appropriate validation, which can lead...

10 CVEs
Variant CWE-47

Path Equivalence: ' filename' (Leading Space)

The product accepts path input in the form of leading space (' filedir') without appropriate validation, which can lead ...

Variant CWE-48

Path Equivalence: 'file name' (Internal Whitespace)

The product accepts path input in the form of internal space ('file(SPACE)name') without appropriate validation, which c...

2 CVEs
Variant CWE-49

Path Equivalence: 'filename/' (Trailing Slash)

The product accepts path input in the form of trailing slash ('filedir/') without appropriate validation, which can lead...

6 CVEs
Variant CWE-50

Path Equivalence: '//multiple/leading/slash'

The product accepts path input in the form of multiple leading slash ('//multiple/leading/slash') without appropriate va...

11 CVEs
Variant CWE-51

Path Equivalence: '/multiple//internal/slash'

The product accepts path input in the form of multiple internal slash ('/multiple//internal/slash/') without appropriate...

1 CVEs 1 mitigations
Variant CWE-52

Path Equivalence: '/multiple/trailing/slash//'

The product accepts path input in the form of multiple trailing slash ('/multiple/trailing/slash//') without appropriate...

1 CVEs 1 mitigations
Variant CWE-53

Path Equivalence: '\multiple\\internal\backslash'

The product accepts path input in the form of multiple internal backslash ('\multiple\trailing\\slash') without appropri...

1 mitigations
Variant CWE-54

Path Equivalence: 'filedir\' (Trailing Backslash)

The product accepts path input in the form of trailing backslash ('filedir\') without appropriate validation, which can ...

2 CVEs 1 mitigations
Variant CWE-55

Path Equivalence: '/./' (Single Dot Directory)

The product accepts path input in the form of single dot directory exploit ('/./') without appropriate validation, which...

6 CVEs 1 mitigations
Variant CWE-56

Path Equivalence: 'filedir*' (Wildcard)

The product accepts path input in the form of asterisk wildcard ('filedir*') without appropriate validation, which can l...

2 CVEs 1 mitigations
Variant CWE-57

Path Equivalence: 'fakedir/../realdir/filename'

The product contains protection mechanisms to restrict access to 'realdir/filename', but it constructs pathnames using e...

3 CVEs 1 mitigations
Variant CWE-58

Path Equivalence: Windows 8.3 Filename

The product contains a protection mechanism that restricts access to a long filename on a Windows operating system, but ...

3 CVEs 1 mitigations
Base CWE-59

Improper Link Resolution Before File Access ('Link Following')

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identif...

28 CVEs 1 mitigations
Compound CWE-61

UNIX Symbolic Link (Symlink) Following

The product, when opening a file or directory, does not sufficiently account for when the file is a symbolic link that r...

13 CVEs 2 mitigations
Variant CWE-62

UNIX Hard Link

The product, when opening a file or directory, does not sufficiently account for when the name is associated with a hard...

10 CVEs 1 mitigations
Variant CWE-64

Windows Shortcut Following (.LNK)

The product, when opening a file or directory, does not sufficiently handle when the file is a Windows shortcut (.LNK) w...

7 CVEs 1 mitigations
Variant CWE-65

Windows Hard Link

The product, when opening a file or directory, does not sufficiently handle when the name is associated with a hard link...

2 CVEs 1 mitigations
Base CWE-66

Improper Handling of File Names that Identify Virtual Resources

The product does not handle or incorrectly handles a file name that identifies a "virtual" resource that is not directly...

3 CVEs
Variant CWE-67

Improper Handling of Windows Device Names

The product constructs pathnames from user input, but it does not handle or incorrectly handles a pathname containing a ...

9 CVEs 1 mitigations
Variant CWE-69

Improper Handling of Windows ::DATA Alternate Data Stream

The product does not properly prevent access to, or detect usage of, alternate data streams (ADS).

2 CVEs 1 mitigations
Variant CWE-72

Improper Handling of Apple HFS+ Alternate Data Stream Path

The product does not properly handle special paths that may identify the data or resource fork of a file on the HFS+ fil...

1 CVEs
Base CWE-73

External Control of File Name or Path

The product allows user input to control or influence paths or file names that are used in filesystem operations.

3 CVEs 8 mitigations
Class CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

The product constructs all or part of a command, data structure, or record using externally-influenced input from an ups...

6 CVEs 2 mitigations
Class CWE-75

Failure to Sanitize Special Elements into a Different Plane (Special Element Injection)

The product does not adequately filter user-controlled input for special elements with control implications.

2 mitigations
Base CWE-76

Improper Neutralization of Equivalent Special Elements

The product correctly neutralizes certain special elements, but it improperly neutralizes equivalent special elements.

2 mitigations
Class CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it doe...

9 CVEs 5 mitigations
Base CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it...

19 CVEs 17 mitigations
Base CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')

The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is...

20 CVEs 12 mitigations
Variant CWE-80

Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special cha...

4 CVEs 4 mitigations
Variant CWE-81

Improper Neutralization of Script in an Error Message Web Page

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special cha...

3 CVEs 5 mitigations
Variant CWE-82

Improper Neutralization of Script in Attributes of IMG Tags in a Web Page

The web application does not neutralize or incorrectly neutralizes scripting elements within attributes of HTML IMG tags...

8 CVEs 2 mitigations
Variant CWE-83

Improper Neutralization of Script in Attributes in a Web Page

The product does not neutralize or incorrectly neutralizes "javascript:" or other URIs from dangerous attributes within ...

8 CVEs 4 mitigations
Variant CWE-84

Improper Neutralization of Encoded URI Schemes in a Web Page

The web application improperly neutralizes user-controlled input for executable script disguised with URI encodings.

5 CVEs 5 mitigations
Variant CWE-85

Doubled Character XSS Manipulations

The web application does not filter user-controlled input for executable script disguised using doubling of the involved...

3 CVEs 5 mitigations
Variant CWE-86

Improper Neutralization of Invalid Characters in Identifiers in Web Pages

The product does not neutralize or incorrectly neutralizes invalid characters or byte sequences in the middle of tag nam...

1 CVEs 2 mitigations
Variant CWE-87

Improper Neutralization of Alternate XSS Syntax

The product does not neutralize or incorrectly neutralizes user-controlled input for alternate script syntax.

1 CVEs 5 mitigations
Base CWE-88

Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')

The product constructs a string for a command to be executed by a separate component in another control sphere, but it d...

24 CVEs 8 mitigations
Base CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but i...

15 CVEs 10 mitigations
Base CWE-90

Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')

The product constructs all or part of an LDAP query using externally-influenced input from an upstream component, but it...

2 CVEs 1 mitigations
Base CWE-91

XML Injection (aka Blind XPath Injection)

The product does not properly neutralize special elements that are used in XML, allowing attackers to modify the syntax,...

1 mitigations
Base CWE-93

Improper Neutralization of CRLF Sequences ('CRLF Injection')

The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does ...

6 CVEs 2 mitigations
Base CWE-94

Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but i...

22 CVEs 7 mitigations
Variant CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax...

17 CVEs 4 mitigations
Base CWE-96

Improper Neutralization of Directives in Statically Saved Code ('Static Code Injection')

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes code syntax...

5 CVEs 2 mitigations
Variant CWE-97

Improper Neutralization of Server-Side Includes (SSI) Within a Web Page

The product generates a web page, but does not neutralize or incorrectly neutralizes user-controllable input that could ...

Variant CWE-98

Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion')

The PHP application receives input from an upstream component, but it does not restrict or incorrectly restricts the inp...

20 CVEs 12 mitigations
Class CWE-99

Improper Control of Resource Identifiers ('Resource Injection')

The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input befor...

1 CVEs 1 mitigations
Variant CWE-102

Struts: Duplicate Validation Forms

The product uses multiple validation forms with the same name, which might cause the Struts Validator to validate a form...

1 mitigations
Variant CWE-103

Struts: Incomplete validate() Method Definition

The product has a validator form that either does not define a validate() method, or defines a validate() method but doe...

1 mitigations
Variant CWE-104

Struts: Form Bean Does Not Extend Validation Class

If a form bean does not extend an ActionForm subclass of the Validator framework, it can expose the application to other...

1 mitigations
Variant CWE-105

Struts: Form Field Without Validator

The product has a form field that is not validated by a corresponding validation form, which can introduce other weaknes...

1 mitigations
Variant CWE-106

Struts: Plug-in Framework not in Use

When an application does not use an input validation framework such as the Struts Validator, there is a greater risk of ...

4 mitigations
Variant CWE-107

Struts: Unused Validation Form

An unused validation form indicates that validation logic is not up-to-date.

1 mitigations
Variant CWE-108

Struts: Unvalidated Action Form

Every Action Form must have a corresponding validation form.

1 mitigations
Variant CWE-109

Struts: Validator Turned Off

Automatic filtering via a Struts bean has been turned off, which disables the Struts Validator and custom validation log...

1 mitigations
Variant CWE-110

Struts: Validator Without Form Field

Validation fields that do not appear in forms they are associated with indicate that the validation logic is out of date...

Variant CWE-111

Direct Use of Unsafe JNI

When a Java application uses the Java Native Interface (JNI) to call code written in another programming language, it ca...

3 mitigations
Base CWE-112

Missing XML Validation

The product accepts XML from an untrusted source but does not validate the XML against the proper schema.

1 mitigations
Variant CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutral...

8 CVEs 4 mitigations
Class CWE-114

Process Control

Executing commands or loading libraries from an untrusted source or in an untrusted environment can cause an application...

1 mitigations
Base CWE-115

Misinterpretation of Input

The product misinterprets an input, whether from an attacker or another product, in a security-relevant fashion.

2 CVEs
Class CWE-116

Improper Encoding or Escaping of Output

The product prepares a structured message for communication with another component, but encoding or escaping of the data...

7 CVEs 7 mitigations
Base CWE-117

Improper Output Neutralization for Logs

The product constructs a log message from external input, but it does not neutralize or incorrectly neutralizes special ...

1 CVEs 3 mitigations
Class CWE-118

Incorrect Access of Indexable Resource ('Range Error')

The product does not restrict or incorrectly restricts operations within the boundaries of a resource that is accessed u...

Class CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer'...

19 CVEs 7 mitigations
Base CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than ...

5 CVEs 13 mitigations
Variant CWE-121

Stack-based Buffer Overflow

A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e...

1 CVEs 5 mitigations
Variant CWE-122

Heap-based Buffer Overflow

A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portio...

6 CVEs 7 mitigations
Base CWE-123

Write-what-where Condition

Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the resu...

2 CVEs 2 mitigations
Base CWE-124

Buffer Underwrite ('Buffer Underflow')

The product writes to a buffer using an index or pointer that references a memory location prior to the beginning of the...

8 CVEs 2 mitigations
Base CWE-125

Out-of-bounds Read

The product reads data past the end, or before the beginning, of the intended buffer.

14 CVEs 2 mitigations
Variant CWE-126

Buffer Over-read

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locatio...

3 CVEs
Variant CWE-127

Buffer Under-read

The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locatio...

1 CVEs
Base CWE-128

Wrap-around Error

Wrap around errors occur whenever a value is incremented past the maximum value for its type and therefore "wraps around...

3 mitigations
Variant CWE-129

Improper Validation of Array Index

The product uses untrusted input when calculating or using an array index, but the product does not validate or incorrec...

6 CVEs 9 mitigations
Base CWE-130

Improper Handling of Length Parameter Inconsistency

The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that i...

25 CVEs 3 mitigations
Base CWE-131

Incorrect Calculation of Buffer Size

The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer over...

17 CVEs 16 mitigations
Base CWE-134

Use of Externally-Controlled Format String

The product uses a function that accepts a format string as an argument, but the format string originates from an extern...

6 CVEs 3 mitigations
Base CWE-135

Incorrect Calculation of Multi-Byte String Length

The product does not correctly calculate the length of strings that can contain wide or multi-byte characters.

2 mitigations
Class CWE-138

Improper Neutralization of Special Elements

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

4 CVEs 5 mitigations
Base CWE-140

Improper Neutralization of Delimiters

The product does not neutralize or incorrectly neutralizes delimiters.

4 CVEs 4 mitigations
Variant CWE-141

Improper Neutralization of Parameter/Argument Delimiters

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

1 CVEs 4 mitigations
Variant CWE-142

Improper Neutralization of Value Delimiters

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

1 CVEs 4 mitigations
Variant CWE-143

Improper Neutralization of Record Delimiters

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

2 CVEs 4 mitigations
Variant CWE-144

Improper Neutralization of Line Delimiters

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

1 CVEs 4 mitigations
Variant CWE-145

Improper Neutralization of Section Delimiters

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

4 mitigations
Variant CWE-146

Improper Neutralization of Expression/Command Delimiters

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

4 mitigations
Variant CWE-147

Improper Neutralization of Input Terminators

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

4 CVEs 4 mitigations
Variant CWE-148

Improper Neutralization of Input Leaders

The product does not properly handle when a leading character or sequence ("leader") is missing or malformed, or if mult...

4 mitigations
Variant CWE-149

Improper Neutralization of Quoting Syntax

Quotes injected into a product can be used to compromise a system. As data are parsed, an injected/absent/duplicate/malf...

2 CVEs 4 mitigations
Variant CWE-150

Improper Neutralization of Escape, Meta, or Control Sequences

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

12 CVEs 6 mitigations
Variant CWE-151

Improper Neutralization of Comment Delimiters

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

5 CVEs 4 mitigations
Variant CWE-152

Improper Neutralization of Macro Symbols

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

2 CVEs 4 mitigations
Variant CWE-153

Improper Neutralization of Substitution Characters

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

1 CVEs 4 mitigations
Variant CWE-154

Improper Neutralization of Variable Name Delimiters

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

2 CVEs 4 mitigations
Variant CWE-155

Improper Neutralization of Wildcards or Matching Symbols

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

4 CVEs 4 mitigations
Variant CWE-156

Improper Neutralization of Whitespace

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special ele...

3 CVEs 4 mitigations
Variant CWE-157

Failure to Sanitize Paired Delimiters

The product does not properly handle the characters that are used to mark the beginning and ending of a group of entitie...

3 CVEs 4 mitigations
Variant CWE-158

Improper Neutralization of Null Byte or NUL Character

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes NUL charact...

15 CVEs 3 mitigations
Class CWE-159

Improper Handling of Invalid Use of Special Elements

The product does not properly filter, remove, quote, or otherwise manage the invalid use of special elements in user-con...

2 CVEs 4 mitigations
Variant CWE-160

Improper Neutralization of Leading Special Elements

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes leading spe...

1 CVEs 4 mitigations
Variant CWE-161

Improper Neutralization of Multiple Leading Special Elements

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes multiple le...

1 CVEs 4 mitigations
Variant CWE-162

Improper Neutralization of Trailing Special Elements

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes trailing sp...

3 CVEs 4 mitigations
Variant CWE-163

Improper Neutralization of Multiple Trailing Special Elements

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes multiple tr...

2 CVEs 4 mitigations
Variant CWE-164

Improper Neutralization of Internal Special Elements

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes internal sp...

4 mitigations
Variant CWE-165

Improper Neutralization of Multiple Internal Special Elements

The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes multiple in...

4 mitigations
Base CWE-166

Improper Handling of Missing Special Element

The product receives input from an upstream component, but it does not handle or incorrectly handles when an expected sp...

3 CVEs 3 mitigations
Base CWE-167

Improper Handling of Additional Special Element

The product receives input from an upstream component, but it does not handle or incorrectly handles when an additional ...

3 CVEs 4 mitigations
Base CWE-168

Improper Handling of Inconsistent Special Elements

The product does not properly handle input in which an inconsistency exists between two or more special characters or re...

3 mitigations
Base CWE-170

Improper Null Termination

The product does not terminate or incorrectly terminates a string or array with a null character or equivalent terminato...

6 CVEs 5 mitigations
Class CWE-172

Encoding Error

The product does not properly encode or decode the data, resulting in unexpected values.

4 CVEs 3 mitigations
Variant CWE-173

Improper Handling of Alternate Encoding

The product does not properly handle when an input uses an alternate encoding that is valid for the control sphere to wh...

4 mitigations
Variant CWE-174

Double Decoding of the Same Data

The product decodes the same input twice, which can limit the effectiveness of any protection mechanism that occurs in b...

6 CVEs 4 mitigations
Variant CWE-175

Improper Handling of Mixed Encoding

The product does not properly handle when the same input uses several different (mixed) encodings.

4 mitigations
Variant CWE-176

Improper Handling of Unicode Encoding

The product does not properly handle when an input contains Unicode encoding.

3 CVEs 3 mitigations
Variant CWE-177

Improper Handling of URL Encoding (Hex Encoding)

The product does not properly handle when all or part of an input has been URL encoded.

19 CVEs 3 mitigations
Base CWE-178

Improper Handling of Case Sensitivity

The product does not properly account for differences in case sensitivity when accessing or determining the properties o...

18 CVEs 3 mitigations
Base CWE-179

Incorrect Behavior Order: Early Validation

The product validates input before applying protection mechanisms that modify the input, which could allow an attacker t...

7 CVEs 1 mitigations
Variant CWE-180

Incorrect Behavior Order: Validate Before Canonicalize

The product validates input before it is canonicalized, which prevents the product from detecting data that becomes inva...

5 CVEs 1 mitigations
Variant CWE-181

Incorrect Behavior Order: Validate Before Filter

The product validates data before it has been filtered, which prevents the product from detecting data that becomes inva...

2 CVEs 1 mitigations
Base CWE-182

Collapse of Data into Unsafe Value

The product filters data in a way that causes it to be reduced or "collapsed" into an unsafe value that violates an expe...

6 CVEs 4 mitigations
Base CWE-183

Permissive List of Allowed Inputs

The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are explici...

5 CVEs
Base CWE-184

Incomplete List of Disallowed Inputs

The product implements a protection mechanism that relies on a list of inputs (or properties of inputs) that are not all...

17 CVEs 1 mitigations
Class CWE-185

Incorrect Regular Expression

The product specifies a regular expression in a way that causes data to be improperly matched or compared.

11 CVEs 1 mitigations
Base CWE-186

Overly Restrictive Regular Expression

A regular expression is overly restrictive, which prevents dangerous values from being detected.

1 CVEs 1 mitigations
Variant CWE-187

Partial String Comparison

The product performs a comparison that only examines a portion of a factor before determining whether there is a match, ...

5 CVEs 1 mitigations
Base CWE-188

Reliance on Data/Memory Layout

The product makes invalid assumptions about how protocol data or memory is organized at a lower level, resulting in unin...

3 mitigations
Base CWE-190

Integer Overflow or Wraparound

The product performs a calculation that can produce an integer overflow or wraparound when the logic a...

19 CVEs 7 mitigations
Base CWE-191

Integer Underflow (Wrap or Wraparound)

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, whi...

4 CVEs
Variant CWE-192

Integer Coercion Error

Integer coercion refers to a set of flaws pertaining to the type casting, extension, or truncation of primitive data typ...

1 CVEs 3 mitigations
Base CWE-193

Off-by-one Error

A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.

18 CVEs 1 mitigations
Variant CWE-194

Unexpected Sign Extension

The product performs an operation on a number that causes it to be sign extended when it is transformed into a larger da...

6 CVEs 1 mitigations
Variant CWE-195

Signed to Unsigned Conversion Error

The product uses a signed primitive and performs a cast to an unsigned primitive, which can produce an unexpected value ...

2 CVEs
Variant CWE-196

Unsigned to Signed Conversion Error

The product uses an unsigned primitive and performs a cast to a signed primitive, which can produce an unexpected value ...

3 mitigations
Base CWE-197

Numeric Truncation Error

Truncation errors occur when a primitive is cast to a primitive of a smaller size and data is lost in the conversion.

3 CVEs 1 mitigations
Variant CWE-198

Use of Incorrect Byte Ordering

The product receives input from an upstream component, but it does not account for byte ordering (e.g. big-endian and li...

Class CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that informati...

19 CVEs 1 mitigations
Base CWE-201

Insertion of Sensitive Information Into Sent Data

The code transmits data to another actor, but a portion of the data includes sensitive information that should not be ac...

3 CVEs 4 mitigations
Base CWE-202

Exposure of Sensitive Information Through Data Queries

When trying to keep information confidential, an attacker can often infer some of the information by using statistics.

1 CVEs 1 mitigations
Base CWE-203

Observable Discrepancy

The product behaves differently or sends different responses under different circumstances in a way that is observable t...

23 CVEs 2 mitigations
Base CWE-204

Observable Response Discrepancy

The product provides different responses to incoming requests in a way that reveals internal state information to an una...

12 CVEs 2 mitigations
Base CWE-205

Observable Behavioral Discrepancy

The product's behaviors indicate important differences that may be observed by unauthorized actors in a way that reveals...

2 CVEs
Variant CWE-206

Observable Internal Behavioral Discrepancy

The product performs multiple behaviors that are combined to produce a single result, but the individual behaviors are o...

4 CVEs 1 mitigations
Variant CWE-207

Observable Behavioral Discrepancy With Equivalent Products

The product operates in an environment in which its existence or specific identity should not be known, but it behaves d...

3 CVEs
Base CWE-208

Observable Timing Discrepancy

Two separate operations in a product require different amounts of time to complete, in a way that is observable to an ac...

9 CVEs
Base CWE-209

Generation of Error Message Containing Sensitive Information

The product generates an error message that includes sensitive information about its environment, users, or associated d...

9 CVEs 7 mitigations
Base CWE-210

Self-generated Error Message Containing Sensitive Information

The product identifies an error condition and creates its own diagnostic or error messages that contain sensitive inform...

1 CVEs 2 mitigations
Base CWE-211

Externally-Generated Error Message Containing Sensitive Information

The product performs an operation that triggers an external diagnostic or error message that is not directly generated o...

6 CVEs 5 mitigations
Base CWE-212

Improper Removal of Sensitive Information Before Storage or Transfer

The product stores, transfers, or shares a resource that contains sensitive information, but it does not properly remove...

5 CVEs 5 mitigations
Base CWE-213

Exposure of Sensitive Information Due to Incompatible Policies

The product's intended functionality exposes information to certain actors in accordance with the developer's security p...

8 CVEs
Base CWE-214

Invocation of Process Using Visible Sensitive Information

A process is invoked with sensitive command-line arguments, environment variables, or other elements that can be seen by...

8 CVEs
Base CWE-215

Insertion of Sensitive Information Into Debugging Code

The product inserts sensitive information into debugging code, which could expose this information if the debugging code...

3 CVEs 2 mitigations
Variant CWE-219

Storage of File with Sensitive Data Under Web Root

The product stores sensitive data under the web document root with insufficient access control, which might make it acce...

5 CVEs 2 mitigations
Variant CWE-220

Storage of File With Sensitive Data Under FTP Root

The product stores sensitive data under the FTP server root with insufficient access control, which might make it access...

2 mitigations
Class CWE-221

Information Loss or Omission

The product does not record, or improperly records, security-relevant information that leads to an incorrect decision or...

5 CVEs
Base CWE-222

Truncation of Security-relevant Information

The product truncates the display, recording, or processing of security-relevant information in a way that can obscure t...

3 CVEs
Base CWE-223

Omission of Security-relevant Information

The product does not record or display information that would be important for identifying the source or nature of an at...

3 CVEs
Base CWE-224

Obscured Security-relevant Information by Alternate Name

The product records security-relevant information according to an alternate name of the affected entity, instead of the ...

1 CVEs
Base CWE-226

Sensitive Information in Resource Not Removed Before Reuse

The product releases a resource such as memory or a file so that it can be made available for reuse, but it does not cle...

8 CVEs 2 mitigations
Class CWE-228

Improper Handling of Syntactically Invalid Structure

The product does not handle or incorrectly handles input that is not syntactically well-formed with respect to the assoc...

1 CVEs
Base CWE-229

Improper Handling of Values

The product does not properly handle when the expected number of values for parameters, fields, or arguments is not prov...

Variant CWE-230

Improper Handling of Missing Values

The product does not handle or incorrectly handles when a parameter, field, or argument name is specified, but the assoc...

4 CVEs
Variant CWE-231

Improper Handling of Extra Values

The product does not handle or incorrectly handles when more values are provided than expected.

Variant CWE-232

Improper Handling of Undefined Values

The product does not handle or incorrectly handles when a value is not defined or supported for the associated parameter...

1 CVEs
Base CWE-233

Improper Handling of Parameters

The product does not properly handle when the expected number of parameters, fields, or arguments is not provided in inp...

Variant CWE-234

Failure to Handle Missing Parameter

If too few arguments are sent to a function, the function will still pop the expected number of arguments from the stack...

15 CVEs 2 mitigations
Variant CWE-235

Improper Handling of Extra Parameters

The product does not handle or incorrectly handles when the number of parameters, fields, or arguments with the same nam...

1 CVEs
Variant CWE-236

Improper Handling of Undefined Parameters

The product does not handle or incorrectly handles when a particular parameter, field, or argument name is not defined o...

2 CVEs
Base CWE-237

Improper Handling of Structural Elements

The product does not handle or incorrectly handles inputs that are related to complex structures.

Variant CWE-238

Improper Handling of Incomplete Structural Elements

The product does not handle or incorrectly handles when a particular structural element is not completely specified.

Variant CWE-239

Failure to Handle Incomplete Element

The product does not properly handle when a particular element is not completely specified.

4 CVEs
Base CWE-240

Improper Handling of Inconsistent Structural Elements

The product does not handle or incorrectly handles when two or more structural elements should be consistent, but are no...

2 CVEs
Base CWE-241

Improper Handling of Unexpected Data Type

The product does not handle or incorrectly handles when a particular element is not the expected type, e.g. it expects a...

2 CVEs 2 mitigations
Base CWE-242

Use of Inherently Dangerous Function

The product calls a function that can never be guaranteed to work safely.

1 CVEs 2 mitigations
Variant CWE-243

Creation of chroot Jail Without Changing Working Directory

The product uses the chroot() system call to create a jail, but does not change the working directory afterward. This do...

Variant CWE-244

Improper Clearing of Heap Memory Before Release ('Heap Inspection')

Using realloc() to resize buffers that store sensitive information can leave the sensitive information exposed to attack...

1 CVEs
Variant CWE-245

J2EE Bad Practices: Direct Management of Connections

The J2EE application directly manages connections, instead of using the container's connection management facilities.

Variant CWE-246

J2EE Bad Practices: Direct Use of Sockets

The J2EE application directly uses sockets instead of using framework method calls.

1 mitigations
Base CWE-248

Uncaught Exception

An exception is thrown from a function, but it is not caught.

2 CVEs
Base CWE-250

Execution with Unnecessary Privileges

The product performs an operation at a privilege level that is higher than the minimum level required, which creates new...

9 CVEs 7 mitigations
Base CWE-252

Unchecked Return Value

The product does not check the return value from a method or function, which can prevent it from detecting unexpected st...

10 CVEs 4 mitigations
Base CWE-253

Incorrect Check of Function Return Value

The product incorrectly checks a return value from a function, which prevents it from detecting errors or exceptional co...

1 CVEs 3 mitigations
Base CWE-256

Plaintext Storage of a Password

The product stores a password in plaintext within resources such as memory or files.

1 CVEs 3 mitigations
Base CWE-257

Storing Passwords in a Recoverable Format

The storage of passwords in a recoverable format makes them subject to password reuse attacks by malicious users. In fac...

1 CVEs 1 mitigations
Variant CWE-258

Empty Password in Configuration File

Using an empty string as a password is insecure.

1 CVEs 1 mitigations
Variant CWE-259

Use of Hard-coded Password

The product contains a hard-coded password, which it uses for its own inbound authentication or for outbound communicati...

3 CVEs 5 mitigations
Base CWE-260

Password in Configuration File

The product stores a password in a configuration file that might be accessible to actors who do not know the password.

1 CVEs 2 mitigations
Base CWE-261

Weak Encoding for Password

Obscuring a password with a trivial encoding does not protect the password.

1 CVEs 1 mitigations
Base CWE-262

Not Using Password Aging

The product does not have a mechanism in place for managing password aging.

2 mitigations
Base CWE-263

Password Aging with Long Expiration

The product supports password aging, but the expiration period is too long.

5 mitigations
Base CWE-266

Incorrect Privilege Assignment

A product incorrectly assigns a privilege to a particular actor, creating an unintended sphere of control for that actor...

4 CVEs 2 mitigations
Base CWE-267

Privilege Defined With Unsafe Actions

A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even wh...

17 CVEs 2 mitigations
Base CWE-268

Privilege Chaining

Two distinct privileges, roles, capabilities, or rights can be combined in a way that allows an entity to perform unsafe...

4 CVEs 3 mitigations
Class CWE-269

Improper Privilege Management

The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of ...

15 CVEs 3 mitigations
Base CWE-270

Privilege Context Switching Error

The product does not properly manage privileges while it is switching between different contexts that have different pri...

4 CVEs 3 mitigations
Class CWE-271

Privilege Dropping / Lowering Errors

The product does not drop privileges before passing control of a resource to an actor that does not have those privilege...

13 CVEs 3 mitigations
Base CWE-272

Least Privilege Violation

The elevated privilege level required to perform operations such as chroot() should be dropped immediately after the ope...

3 mitigations
Base CWE-273

Improper Check for Dropped Privileges

The product attempts to drop privileges but does not check or incorrectly checks to see if the drop succeeded.

2 CVEs 3 mitigations
Base CWE-274

Improper Handling of Insufficient Privileges

The product does not handle or incorrectly handles when it has insufficient privileges to perform an operation, leading ...

3 CVEs
Base CWE-276

Incorrect Default Permissions

During installation, installed file permissions are set to allow anyone to modify those files.

7 CVEs 2 mitigations
Variant CWE-277

Insecure Inherited Permissions

A product defines a set of insecure permissions that are inherited by objects that are created by the program.

2 CVEs 2 mitigations
Variant CWE-278

Insecure Preserved Inherited Permissions

A product inherits a set of insecure permissions for an object, e.g. when copying from an archive file, without user awa...

1 CVEs 2 mitigations
Variant CWE-279

Incorrect Execution-Assigned Permissions

While it is executing, the product sets the permissions of an object in a way that violates the intended permissions tha...

3 CVEs 2 mitigations
Base CWE-280

Improper Handling of Insufficient Permissions or Privileges

The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functional...

2 CVEs 2 mitigations
Base CWE-281

Improper Preservation of Permissions

The product does not preserve permissions or incorrectly preserves permissions when copying, restoring, or sharing objec...

4 CVEs
Class CWE-282

Improper Ownership Management

The product assigns the wrong ownership, or does not properly verify the ownership, of an object or resource.

1 CVEs 1 mitigations
Base CWE-283

Unverified Ownership

The product does not properly verify that a critical resource is owned by the proper entity.

2 CVEs 2 mitigations
Pillar CWE-284

Improper Access Control

The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

10 CVEs 2 mitigations
Class CWE-285

Improper Authorization

The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource ...

21 CVEs 5 mitigations
Class CWE-286

Incorrect User Management

The product does not properly manage a user within its environment.

2 CVEs
Class CWE-287

Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is cor...

33 CVEs 1 mitigations
Base CWE-288

Authentication Bypass Using an Alternate Path or Channel

The product requires authentication, but the product has an alternate path or channel that does not require authenticati...

7 CVEs 1 mitigations
Base CWE-289

Authentication Bypass by Alternate Name

The product performs authentication based on the name of a resource being accessed, or the name of the actor performing ...

2 CVEs 3 mitigations
Base CWE-290

Authentication Bypass by Spoofing

This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing at...

2 CVEs
Variant CWE-291

Reliance on IP Address for Authentication

The product uses an IP address for authentication.

1 CVEs 1 mitigations
Variant CWE-293

Using Referer Field for Authentication

The referer field in HTTP requests can be easily modified and, as such, is not a valid means of message integrity checki...

1 mitigations
Base CWE-294

Authentication Bypass by Capture-replay

A capture-replay flaw exists when the design of the product makes it possible for a malicious user to sniff network traf...

2 CVEs 2 mitigations
Base CWE-295

Improper Certificate Validation

The product does not validate, or incorrectly validates, a certificate.

21 CVEs 2 mitigations
Base CWE-296

Improper Following of a Certificate's Chain of Trust

The product does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certifi...

8 CVEs 3 mitigations
Variant CWE-297

Improper Validation of Certificate with Host Mismatch

The product communicates with a host that provides a certificate, but the product does not properly ensure that the cert...

20 CVEs 2 mitigations
Variant CWE-298

Improper Validation of Certificate Expiration

A certificate expiration is not validated or is incorrectly validated.

4 CVEs 2 mitigations
Base CWE-299

Improper Check for Certificate Revocation

The product does not check or incorrectly checks the revocation status of a certificate, which may cause it to use a cer...

12 CVEs 2 mitigations
Class CWE-300

Channel Accessible by Non-Endpoint

The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequ...

1 CVEs 3 mitigations
Base CWE-301

Reflection Attack in an Authentication Protocol

Simple authentication protocols are subject to reflection attacks if a malicious user can use the target machine to impe...

2 CVEs 2 mitigations
Base CWE-302

Authentication Bypass by Assumed-Immutable Data

The authentication scheme or implementation uses key data elements that are assumed to be immutable, but can be controll...

9 CVEs 1 mitigations
Base CWE-303

Incorrect Implementation of Authentication Algorithm

The requirements for the product dictate the use of an established authentication algorithm, but the implementation of t...

1 CVEs
Base CWE-304

Missing Critical Step in Authentication

The product implements an authentication technique, but it skips a step that weakens the technique.

2 CVEs
Base CWE-305

Authentication Bypass by Primary Weakness

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weaknes...

3 CVEs
Base CWE-306

Missing Authentication for Critical Function

The product does not perform any authentication for functionality that requires a provable user identity or consumes a s...

17 CVEs 5 mitigations
Base CWE-307

Improper Restriction of Excessive Authentication Attempts

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short tim...

7 CVEs 2 mitigations
Base CWE-308

Use of Single-factor Authentication

The product uses an authentication algorithm that uses a single factor (e.g., a password) in a security context that sho...

1 CVEs 1 mitigations
Base CWE-309

Use of Password System for Primary Authentication

The use of password systems as the primary means of authentication may be subject to several flaws or shortcomings, each...

6 mitigations
Class CWE-311

Missing Encryption of Sensitive Data

The product does not encrypt sensitive or critical information before storage or transmission.

21 CVEs 6 mitigations
Base CWE-312

Cleartext Storage of Sensitive Information

The product stores sensitive information in cleartext within a resource that might be accessible to another control sphe...

21 CVEs 2 mitigations
Variant CWE-313

Cleartext Storage in a File or on Disk

The product stores sensitive information in cleartext in a file, or on disk.

5 CVEs
Variant CWE-314

Cleartext Storage in the Registry

The product stores sensitive information in cleartext in the registry.

1 CVEs
Variant CWE-315

Cleartext Storage of Sensitive Information in a Cookie

The product stores sensitive information in cleartext in a cookie.

4 CVEs
Variant CWE-316

Cleartext Storage of Sensitive Information in Memory

The product stores sensitive information in cleartext in memory.

4 CVEs
Variant CWE-317

Cleartext Storage of Sensitive Information in GUI

The product stores sensitive information in cleartext within the GUI.

1 CVEs
Variant CWE-318

Cleartext Storage of Sensitive Information in Executable

The product stores sensitive information in cleartext in an executable.

2 CVEs
Base CWE-319

Cleartext Transmission of Sensitive Information

The product transmits sensitive or security-critical data in cleartext in a communication channel that can be sniffed by...

13 CVEs 5 mitigations
Variant CWE-321

Use of Hard-coded Cryptographic Key

The product uses a hard-coded, unchangeable cryptographic key.

4 CVEs 1 mitigations
Base CWE-322

Key Exchange without Entity Authentication

The product performs a key exchange with an actor without verifying the identity of that actor.

2 mitigations
Base CWE-323

Reusing a Nonce, Key Pair in Encryption

Nonces should be used for the present occasion and only once.

2 CVEs 2 mitigations
Base CWE-324

Use of a Key Past its Expiration Date

The product uses a cryptographic key or password past its expiration date, which diminishes its safety significantly by ...

1 CVEs 1 mitigations
Base CWE-325

Missing Cryptographic Step

The product does not implement a required step in a cryptographic algorithm, resulting in weaker encryption than adverti...

1 CVEs
Class CWE-326

Inadequate Encryption Strength

The product stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong...

10 CVEs 1 mitigations
Class CWE-327

Use of a Broken or Risky Cryptographic Algorithm

The product uses a broken or risky cryptographic algorithm or protocol.

10 CVEs 5 mitigations
Base CWE-328

Use of Weak Hash

The product uses an algorithm that produces a digest (output value) that does not meet security expectations for a hash ...

7 CVEs 1 mitigations
Variant CWE-329

Generation of Predictable IV with CBC Mode

The product generates and uses a predictable initialization Vector (IV) with Cipher Block Chaining (CBC) Mode, which cau...

5 CVEs 1 mitigations
Class CWE-330

Use of Insufficiently Random Values

The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.

18 CVEs 3 mitigations
Base CWE-331

Insufficient Entropy

The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that ...

2 CVEs 1 mitigations
Variant CWE-332

Insufficient Entropy in PRNG

The lack of entropy available for, or used by, a Pseudo-Random Number Generator (PRNG) can be a stability and security t...

2 CVEs 3 mitigations
Variant CWE-333

Improper Handling of Insufficient Entropy in TRNG

True random number generators (TRNG) generally have a limited source of entropy and therefore can fail or block.

1 mitigations
Base CWE-334

Small Space of Random Values

The number of possible random values is smaller than needed by the product, making it more susceptible to brute force at...

4 CVEs 1 mitigations
Base CWE-335

Incorrect Usage of Seeds in Pseudo-Random Number Generator (PRNG)

The product uses a Pseudo-Random Number Generator (PRNG) but does not correctly manage seeds.

4 CVEs
Variant CWE-336

Same Seed in Pseudo-Random Number Generator (PRNG)

A Pseudo-Random Number Generator (PRNG) uses the same seed each time the product is initialized.

1 CVEs 2 mitigations
Variant CWE-337

Predictable Seed in Pseudo-Random Number Generator (PRNG)

A Pseudo-Random Number Generator (PRNG) is initialized from a predictable seed, such as the process ID or system time.

5 CVEs 3 mitigations
Base CWE-338

Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)

The product uses a Pseudo-Random Number Generator (PRNG) in a security context, but the PRNG's algorithm is not cryptogr...

5 CVEs 1 mitigations
Variant CWE-339

Small Seed Space in PRNG

A Pseudo-Random Number Generator (PRNG) uses a relatively small seed space, which makes it more susceptible to brute for...

1 CVEs 2 mitigations
Class CWE-340

Generation of Predictable Numbers or Identifiers

The product uses a scheme that generates numbers or identifiers that are more predictable than required.

3 CVEs
Base CWE-341

Predictable from Observable State

A number or object is predictable based on observations that the attacker can make about the state of the system or netw...

5 CVEs 3 mitigations
Base CWE-342

Predictable Exact Value from Previous Values

An exact value or random number can be precisely predicted by observing previous values.

4 CVEs 3 mitigations
Base CWE-343

Predictable Value Range from Previous Values

The product's random number generator produces a series of values which, when observed, can be used to infer a relativel...

3 mitigations
Base CWE-344

Use of Invariant Value in Dynamically Changing Context

The product uses a constant value, name, or reference, but this value can (or should) vary across different environments...

1 CVEs
Class CWE-345

Insufficient Verification of Data Authenticity

The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid d...

3 CVEs
Class CWE-346

Origin Validation Error

The product does not properly verify that the source of data or communication is valid.

10 CVEs
Base CWE-347

Improper Verification of Cryptographic Signature

The product does not verify, or incorrectly verifies, the cryptographic signature for data.

4 CVEs
Base CWE-348

Use of Less Trusted Source

The product has two different sources of the same data or information, but it uses the source that has less support for ...

4 CVEs
Base CWE-349

Acceptance of Extraneous Untrusted Data With Trusted Data

The product, when processing trusted data, accepts any untrusted data that is also included with the trusted data, treat...

2 CVEs
Variant CWE-350

Reliance on Reverse DNS Resolution for a Security-Critical Action

The product performs reverse DNS resolution on an IP address to obtain the hostname and make a security decision, but it...

7 CVEs 2 mitigations
Base CWE-351

Insufficient Type Distinction

The product does not properly distinguish between different types of elements in a way that leads to insecure behavior.

2 CVEs
Compound CWE-352

Cross-Site Request Forgery (CSRF)

The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user wh...

10 CVEs 7 mitigations
Base CWE-353

Missing Support for Integrity Check

The product uses a transmission protocol that does not include a mechanism for verifying the integrity of the data durin...

1 CVEs 2 mitigations
Base CWE-354

Improper Validation of Integrity Check Value

The product does not validate or incorrectly validates the integrity check values or "checksums" of a message. This may ...

1 CVEs 1 mitigations
Base CWE-356

Product UI does not Warn User of Unsafe Actions

The product's user interface does not warn the user before undertaking an unsafe action on behalf of that user. This mak...

6 CVEs
Base CWE-357

Insufficient UI Warning of Dangerous Operations

The user interface provides a warning to a user regarding dangerous or sensitive operations, but the warning is not noti...

1 CVEs
Base CWE-358

Improperly Implemented Security Check for Standard

The product does not implement or incorrectly implements one or more security-relevant checks as specified by the design...

8 CVEs
Base CWE-359

Exposure of Private Personal Information to an Unauthorized Actor

The product does not properly prevent a person's private, personal information from being accessed by actors who either ...

3 CVEs 3 mitigations
Base CWE-360

Trust of System Event Data

Security based on event locations are insecure and can be spoofed.

1 CVEs 1 mitigations
Class CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')

The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a ti...

22 CVEs 10 mitigations
Base CWE-363

Race Condition Enabling Link Following

The product checks the status of a file or directory before accessing it, which produces a race condition in which the f...

Base CWE-364

Signal Handler Race Condition

The product uses a signal handler that introduces a race condition.

5 CVEs 3 mitigations
Base CWE-366

Race Condition within a Thread

If two threads of execution use a resource simultaneously, there exists the possibility that resources may be used while...

1 CVEs 2 mitigations
Base CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition

The product checks the state of a resource before using that resource, but the resource's state can change between the c...

5 CVEs 7 mitigations
Base CWE-368

Context Switching Race Condition

A product performs a series of non-atomic actions to switch between contexts that cross privilege or other security boun...

4 CVEs
Base CWE-369

Divide By Zero

The product divides a value by zero.

3 CVEs
Variant CWE-370

Missing Check for Certificate Revocation after Initial Check

The product does not check the revocation status of a certificate after its initial revocation check, which can cause th...

1 mitigations
Base CWE-372

Incomplete Internal State Distinction

The product does not properly determine which state it is in, causing it to assume it is in state X when in fact it is i...

Base CWE-374

Passing Mutable Objects to an Untrusted Method

The product sends non-cloned mutable data as an argument to a method or function.

2 mitigations
Base CWE-375

Returning a Mutable Object to an Untrusted Caller

Sending non-cloned mutable data as a return value may result in that data being altered or deleted by the calling functi...

2 mitigations
Class CWE-377

Insecure Temporary File

Creating and using insecure temporary files can leave application and system data vulnerable to attack.

1 CVEs
Base CWE-378

Creation of Temporary File With Insecure Permissions

Opening temporary files without appropriate measures or controls can leave the file, its contents and any function that ...

1 CVEs 3 mitigations
Base CWE-379

Creation of Temporary File in Directory with Insecure Permissions

The product creates a temporary file in a directory whose permissions allow unintended actors to determine the file's ex...

3 CVEs 3 mitigations
Variant CWE-382

J2EE Bad Practices: Use of System.exit()

A J2EE application uses System.exit(), which also shuts down its container.

4 mitigations
Variant CWE-383

J2EE Bad Practices: Direct Use of Threads

Thread management in a Web application is forbidden in some circumstances and is always highly error prone.

1 mitigations
Compound CWE-384

Session Fixation

Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifie...

1 CVEs 3 mitigations
Base CWE-385

Covert Timing Channel

Covert timing channels convey information by modulating some aspect of system behavior over time, so that the program re...

3 mitigations
Base CWE-386

Symbolic Name not Mapping to Correct Object

A constant symbolic reference to an object is used, even though the reference can resolve to a different object over tim...

Base CWE-390

Detection of Error Condition Without Action

The product detects a specific error, but takes no actions to handle the error.

1 CVEs 3 mitigations
Base CWE-391

Unchecked Error Condition

[PLANNED FOR DEPRECATION. SEE MAINTENANCE NOTES AND CONSIDER CWE-252, CWE-248, OR CWE-1069.] Ignoring exceptions and oth...

3 mitigations
Base CWE-392

Missing Report of Error Condition

The product encounters an error but does not provide a status code or return value to indicate that an error has occurre...

6 CVEs
Base CWE-393

Return of Wrong Status Code

A function or operation returns an incorrect return value or status code that does not indicate the true result of execu...

4 CVEs
Base CWE-394

Unexpected Status Code or Return Value

The product does not properly check when a function or operation returns a value that is legitimate for the function, bu...

8 CVEs
Base CWE-395

Use of NullPointerException Catch to Detect NULL Pointer Dereference

Catching NullPointerException should not be used as an alternative to programmatic checks to prevent dereferencing a nul...

1 mitigations
Base CWE-396

Declaration of Catch for Generic Exception

Catching overly broad exceptions promotes complex error handling code that is more likely to contain security vulnerabil...

Base CWE-397

Declaration of Throws for Generic Exception

The product throws or raises an overly broad exceptions that can hide important details and produce inappropriate respon...

Class CWE-400

Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource.

17 CVEs 4 mitigations
Variant CWE-401

Missing Release of Memory after Effective Lifetime

The product does not sufficiently track and release allocated memory after it has been used, making the memory unavailab...

6 CVEs 3 mitigations
Class CWE-402

Transmission of Private Resources into a New Sphere ('Resource Leak')

The product makes resources available to untrusted parties when those resources are only intended to be accessed by the ...

2 CVEs
Base CWE-403

Exposure of File Descriptor to Unintended Control Sphere ('File Descriptor Leak')

A process does not close sensitive file descriptors before invoking a child process, which allows the child to perform u...

8 CVEs
Class CWE-404

Improper Resource Shutdown or Release

The product does not release or incorrectly releases a resource before it is made available for re-use.

3 CVEs 4 mitigations
Class CWE-405

Asymmetric Resource Consumption (Amplification)

The product does not properly control situations in which an adversary can cause the product to consume or produce exces...

8 CVEs 3 mitigations
Class CWE-406

Insufficient Control of Network Message Volume (Network Amplification)

The product does not sufficiently monitor or control transmitted network traffic volume, so that an actor can cause the ...

5 CVEs 3 mitigations
Class CWE-407

Inefficient Algorithmic Complexity

An algorithm in a product has an inefficient worst-case computational complexity that may be detrimental to system perfo...

14 CVEs
Base CWE-408

Incorrect Behavior Order: Early Amplification

The product allows an entity to perform a legitimate but expensive operation before authentication or authorization has ...

1 CVEs
Base CWE-409

Improper Handling of Highly Compressed Data (Data Amplification)

The product does not handle or incorrectly handles a compressed input with a very high compression ratio that produces a...

2 CVEs
Class CWE-410

Insufficient Resource Pool

The product's resource pool is not large enough to handle peak demand, which allows an attacker to prevent others from a...

3 CVEs 5 mitigations
Base CWE-412

Unrestricted Externally Accessible Lock

The product properly checks for the existence of a lock, but the lock can be externally controlled or influenced by an a...

7 CVEs 3 mitigations
Base CWE-413

Improper Resource Locking

The product does not lock or does not correctly lock a resource when the product must have exclusive access to the resou...

1 CVEs 2 mitigations
Base CWE-414

Missing Lock Check

A product does not check to see if a lock is present before performing sensitive operations on a resource.

1 CVEs 1 mitigations
Variant CWE-415

Double Free

The product calls free() twice on the same memory address.

8 CVEs 3 mitigations
Variant CWE-416

Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated ag...

29 CVEs 2 mitigations
Base CWE-419

Unprotected Primary Channel

The product uses a primary channel for administration or restricted functionality, but it does not properly protect the ...

2 mitigations
Base CWE-420

Unprotected Alternate Channel

The product protects a primary channel, but it does not use the same level of protection for an alternate channel.

7 CVEs 1 mitigations
Base CWE-421

Race Condition During Access to Alternate Channel

The product opens an alternate channel to communicate with an authorized user, but the channel is accessible to other ac...

2 CVEs
Variant CWE-422

Unprotected Windows Messaging Channel ('Shatter')

The product does not properly verify the source of a message in the Windows Messaging System while running at elevated p...

6 CVEs 1 mitigations
Class CWE-424

Improper Protection of Alternate Path

The product does not sufficiently protect all possible paths that a user can take to access restricted functionality or ...

1 CVEs 1 mitigations
Base CWE-425

Direct Request ('Forced Browsing')

The web application does not adequately enforce appropriate authorization on all restricted URLs, scripts, or files.

12 CVEs 2 mitigations
Base CWE-426

Untrusted Search Path

The product searches for critical resources using an externally-supplied search path that can point to resources that ar...

6 CVEs 5 mitigations
Base CWE-427

Uncontrolled Search Path Element

The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be unde...

30 CVEs 5 mitigations
Base CWE-428

Unquoted Search Path or Element

The product uses a search path that contains an unquoted element, in which the element contains whitespace or other sepa...

3 CVEs 3 mitigations
Base CWE-430

Deployment of Wrong Handler

The wrong "handler" is assigned to process an object.

4 CVEs 2 mitigations
Base CWE-431

Missing Handler

A handler is not available or implemented.

1 CVEs 2 mitigations
Base CWE-432

Dangerous Signal Handler not Disabled During Sensitive Operations

The product uses a signal handler that shares state with other signal handlers, but it does not properly mask or prevent...

1 mitigations
Variant CWE-433

Unparsed Raw Web Content Delivery

The product stores raw content or supporting code under the web document root with an extension that is not specifically...

7 CVEs 2 mitigations
Base CWE-434

Unrestricted Upload of File with Dangerous Type

The product allows the upload or transfer of dangerous file types that are automatically processed within its environmen...

11 CVEs 12 mitigations
Pillar CWE-435

Improper Interaction Between Multiple Correctly-Behaving Entities

An interaction error occurs when two entities have correct behavior when running independently of each other, but when t...

2 CVEs
Class CWE-436

Interpretation Conflict

Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its p...

9 CVEs
Base CWE-437

Incomplete Model of Endpoint Features

A product acts as an intermediary or monitor between two or more endpoints, but it does not have a complete model of an ...

1 CVEs
Base CWE-439

Behavioral Change in New Version or Environment

A's behavior or functionality changes with a new version of A, or a new environment, which is not known (or manageable) ...

3 CVEs
Base CWE-440

Expected Behavior Violation

A feature, API, or function does not perform according to its specification.

3 CVEs
Class CWE-441

Unintended Proxy or Intermediary ('Confused Deputy')

The product receives a request, message, or directive from an upstream component, but the product does not sufficiently ...

8 CVEs 2 mitigations
Base CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two ...

6 CVEs 4 mitigations
Class CWE-446

UI Discrepancy for Security Feature

The user interface does not correctly enable or configure a security feature, but the interface provides feedback that c...

1 CVEs
Base CWE-447

Unimplemented or Unsupported Feature in UI

A UI function for a security feature appears to be supported and gives feedback to the user that suggests that it is sup...

4 CVEs 1 mitigations
Base CWE-448

Obsolete Feature in UI

A UI function is obsolete and the product does not warn the user.

1 mitigations
Base CWE-449

The UI Performs the Wrong Action

The UI performs the wrong action with respect to the user's request.

3 CVEs
Base CWE-450

Multiple Interpretations of UI Input

The UI has multiple interpretations of user input but does not prompt the user when it selects the less secure interpret...

2 mitigations
Class CWE-451

User Interface (UI) Misrepresentation of Critical Information

The user interface (UI) does not properly represent critical information to the user, allowing the information - or its ...

27 CVEs 2 mitigations
Variant CWE-453

Insecure Default Variable Initialization

The product, by default, initializes an internal variable with an insecure or less secure value than is possible.

1 CVEs 1 mitigations
Base CWE-454

External Initialization of Trusted Variables or Data Stores

The product initializes critical internal variables or data stores using inputs that can be modified by untrusted actors...

5 CVEs 2 mitigations
Base CWE-455

Non-exit on Failed Initialization

The product does not exit or otherwise modify its operation when security-relevant errors occur during initialization, s...

1 CVEs 1 mitigations
Variant CWE-456

Missing Initialization of a Variable

The product does not initialize critical variables, which causes the execution environment to use unexpected values.

8 CVEs 2 mitigations
Variant CWE-457

Use of Uninitialized Variable

The code uses a variable that has not been initialized, leading to unpredictable or unintended results.

6 CVEs 5 mitigations
Base CWE-459

Incomplete Cleanup

The product does not properly "clean up" and remove temporary or supporting resources after they have been used.

9 CVEs 1 mitigations
Base CWE-460

Improper Cleanup on Thrown Exception

The product does not clean up its state or incorrectly cleans up its state when an exception is thrown, leading to unexp...

1 mitigations
Variant CWE-462

Duplicate Key in Associative List (Alist)

Duplicate keys in associative lists can lead to non-unique keys being mistaken for an error.

2 mitigations
Base CWE-463

Deletion of Data Structure Sentinel

The accidental deletion of a data-structure sentinel can cause serious programming logic problems.

3 mitigations
Base CWE-464

Addition of Data Structure Sentinel

The accidental addition of a data-structure sentinel can cause serious programming logic problems.

4 mitigations
Base CWE-466

Return of Pointer Value Outside of Expected Range

A function can return a pointer to memory that is outside of the buffer that the pointer is expected to reference.

Variant CWE-467

Use of sizeof() on a Pointer Type

The code calls sizeof() on a pointer type, which can be an incorrect calculation if the programmer intended to determine...

1 mitigations
Base CWE-468

Incorrect Pointer Scaling

In C and C++, one may often accidentally refer to the wrong memory due to the semantics of when math operations are impl...

3 mitigations
Base CWE-469

Use of Pointer Subtraction to Determine Size

The product subtracts one pointer from another in order to determine size, but this calculation can be incorrect if the ...

1 mitigations
Base CWE-470

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently pre...

2 CVEs 3 mitigations
Base CWE-471

Modification of Assumed-Immutable Data (MAID)

The product does not properly protect an assumed-immutable element from being modified by an attacker.

2 CVEs 1 mitigations
Base CWE-472

External Control of Assumed-Immutable Web Parameter

The web application does not sufficiently verify inputs that are assumed to be immutable but are actually externally con...

13 CVEs 2 mitigations
Variant CWE-473

PHP External Variable Modification

A PHP application does not properly protect against the modification of variables from external sources, such as query p...

5 CVEs 1 mitigations
Base CWE-474

Use of Function with Inconsistent Implementations

The code uses a function that has inconsistent implementations across operating systems and versions.

1 mitigations
Base CWE-475

Undefined Behavior for Input to API

The behavior of this function is undefined unless its control parameter is set to a specific value.

Base CWE-476

NULL Pointer Dereference

The product dereferences a pointer that it expects to be valid but is NULL.

25 CVEs 5 mitigations
Base CWE-477

Use of Obsolete Function

The code uses deprecated or obsolete functions, which suggests that the code has not been actively reviewed or maintaine...

2 mitigations
Base CWE-478

Missing Default Case in Multiple Condition Expression

The code does not have a default case in an expression with multiple conditions, such as a switch statement.

1 mitigations
Variant CWE-479

Signal Handler Use of a Non-reentrant Function

The product defines a signal handler that calls a non-reentrant function.

2 CVEs 4 mitigations
Base CWE-480

Use of Incorrect Operator

The product accidentally uses the wrong operator, which changes the logic in security-relevant ways.

2 CVEs
Variant CWE-481

Assigning instead of Comparing

The code uses an operator for assignment when the intention was to perform a comparison.

1 mitigations
Variant CWE-482

Comparing instead of Assigning

The code uses an operator for comparison when the intention was to perform an assignment.

1 mitigations
Base CWE-483

Incorrect Block Delimitation

The code does not explicitly delimit a block that is intended to contain 2 or more statements, creating a logic error.

1 CVEs 1 mitigations
Base CWE-484

Omitted Break Statement in Switch

The product omits a break statement within a switch or similar construct, causing code associated with multiple conditio...

2 mitigations
Variant CWE-486

Comparison of Classes by Name

The product compares classes by name, which can cause it to use the wrong class when multiple classes can have the same ...

1 mitigations
Base CWE-487

Reliance on Package-level Scope

Java packages are not inherently closed; therefore, relying on them for code security is not a good practice.

1 mitigations
Base CWE-488

Exposure of Data Element to Wrong Session

The product does not sufficiently enforce boundaries between the states of different sessions, causing data to be provid...

3 mitigations
Base CWE-489

Active Debug Code

The product is released with debugging code still enabled or active.

3 CVEs 1 mitigations
Variant CWE-491

Public cloneable() Method Without Final ('Object Hijack')

A class has a cloneable() method that is not declared final, which allows an object to be created without calling the co...

1 mitigations
Variant CWE-492

Use of Inner Class Containing Sensitive Data

Inner classes are translated into classes that are accessible at package scope and may expose code that the programmer i...

2 mitigations
Variant CWE-493

Critical Public Variable Without Final Modifier

The product has a critical public variable that is not final, which allows the variable to be modified to contain unexpe...

1 mitigations
Base CWE-494

Download of Code Without Integrity Check

The product downloads source code or an executable from a remote location and executes the code without sufficiently ver...

6 CVEs 5 mitigations
Variant CWE-495

Private Data Structure Returned From A Public Method

The product has a method that is declared public, but returns a reference to a private data structure, which could then ...

3 mitigations
Variant CWE-496

Public Data Assigned to Private Array-Typed Field

Assigning public data to a private array is equivalent to giving public access to the array.

1 mitigations
Base CWE-497

Exposure of Sensitive System Information to an Unauthorized Control Sphere

The product does not properly prevent sensitive system-level information from being accessed by unauthorized actors who ...

1 CVEs 1 mitigations
Variant CWE-498

Cloneable Class Containing Sensitive Information

The code contains a class with sensitive data, but the class is cloneable. The data can then be accessed by cloning the ...

1 mitigations
Variant CWE-499

Serializable Class Containing Sensitive Data

The code contains a class with sensitive data, but the class does not explicitly deny serialization. The data can be acc...

2 mitigations
Variant CWE-500

Public Static Field Not Marked Final

An object contains a public static field that is not marked final, which might allow it to be modified in unexpected way...

2 mitigations
Base CWE-501

Trust Boundary Violation

The product mixes trusted and untrusted data in the same data structure or structured message.

Base CWE-502

Deserialization of Untrusted Data

The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.

13 CVEs 7 mitigations
Class CWE-506

Embedded Malicious Code

The product contains code that appears to be malicious in nature.

1 CVEs 1 mitigations
Base CWE-507

Trojan Horse

The product appears to contain benign or useful functionality, but it also contains code that is hidden from normal oper...

2 mitigations
Base CWE-508

Non-Replicating Malicious Code

Non-replicating malicious code only resides on the target system or product that is attacked; it does not attempt to spr...

2 mitigations
Base CWE-509

Replicating Malicious Code (Virus or Worm)

Replicating malicious code, including viruses and worms, will attempt to attack other systems once it has successfully c...

2 mitigations
Base CWE-510

Trapdoor

A trapdoor is a hidden piece of code that responds to a special input, allowing its user access to resources without pas...

2 mitigations
Base CWE-511

Logic/Time Bomb

The product contains code that is designed to disrupt the legitimate operation of the product (or its environment) when ...

1 mitigations
Base CWE-512

Spyware

The product collects personally identifiable information about a human user or the user's activities, but the product ac...

2 mitigations
Class CWE-514

Covert Channel

A covert channel is a path that can be used to transfer information in a way not intended by the system's designers.

Base CWE-515

Covert Storage Channel

A covert storage channel transfers information through the setting of bits by one program and the reading of those bits ...

1 mitigations
Variant CWE-520

.NET Misconfiguration: Use of Impersonation

Allowing a .NET application to run at potentially escalated levels of access to the underlying operating and file system...

1 mitigations
Base CWE-521

Weak Password Requirements

The product does not require that users should have strong passwords.

1 CVEs 4 mitigations
Class CWE-522

Insufficiently Protected Credentials

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauth...

11 CVEs 3 mitigations
Base CWE-523

Unprotected Transport of Credentials

Login pages do not use adequate measures to protect the user name and password while they are in transit from the client...

1 mitigations
Base CWE-524

Use of Cache Containing Sensitive Information

The code uses a cache that contains sensitive information, but the cache can be read by an actor outside of the intended...

1 CVEs 3 mitigations
Variant CWE-525

Use of Web Browser Cache Containing Sensitive Information

The web application does not use an appropriate caching policy that specifies the extent to which each web page and asso...

2 CVEs 4 mitigations
Variant CWE-526

Cleartext Storage of Sensitive Information in an Environment Variable

The product uses an environment variable to store unencrypted sensitive information.

3 CVEs 2 mitigations
Variant CWE-527

Exposure of Version-Control Repository to an Unauthorized Control Sphere

The product stores a CVS, git, or other repository in a directory, archive, or other resource that is stored, transferre...

1 mitigations
Variant CWE-528

Exposure of Core Dump File to an Unauthorized Control Sphere

The product generates a core dump file in a directory, archive, or other resource that is stored, transferred, or otherw...

1 CVEs 1 mitigations
Variant CWE-529

Exposure of Access Control List Files to an Unauthorized Control Sphere

The product stores access control list files in a directory or other container that is accessible to actors outside of t...

1 mitigations
Variant CWE-530

Exposure of Backup File to an Unauthorized Control Sphere

A backup file is stored in a directory or archive that is made accessible to unauthorized actors.

1 CVEs 1 mitigations
Variant CWE-531

Inclusion of Sensitive Information in Test Code

Accessible test applications can pose a variety of security risks. Since developers or administrators rarely consider th...

1 mitigations
Base CWE-532

Insertion of Sensitive Information into Log File

The product writes sensitive information to a log file.

2 CVEs 4 mitigations
Variant CWE-535

Exposure of Information Through Shell Error Message

A command shell error message indicates that there exists an unhandled exception in the web application code. In many ca...

Variant CWE-536

Servlet Runtime Error Message Containing Sensitive Information

A servlet error message indicates that there exists an unhandled exception in the web application code and may provide u...

Variant CWE-537

Java Runtime Error Message Containing Sensitive Information

In many cases, an attacker can leverage the conditions that cause unhandled exception errors in order to gain unauthoriz...

1 mitigations
Base CWE-538

Insertion of Sensitive Information into Externally-Accessible File or Directory

The product places sensitive information into files or directories that are accessible to actors who are allowed to have...

1 CVEs 1 mitigations
Variant CWE-539

Use of Persistent Cookies Containing Sensitive Information

The web application uses persistent cookies, but the cookies contain sensitive information.

1 mitigations
Base CWE-540

Inclusion of Sensitive Information in Source Code

Source code on a web server or repository often contains sensitive information and should generally not be accessible to...

3 CVEs 1 mitigations
Variant CWE-541

Inclusion of Sensitive Information in an Include File

If an include file source is accessible, the file can contain usernames and passwords, as well as sensitive information ...

2 mitigations
Variant CWE-543

Use of Singleton Pattern Without Synchronization in a Multithreaded Context

The product uses the singleton pattern when creating a resource within a multithreaded environment.

3 mitigations
Base CWE-544

Missing Standardized Error Handling Mechanism

The product does not use a standardized method for handling errors throughout the code, which might introduce inconsiste...

1 mitigations
Variant CWE-546

Suspicious Comment

The code contains comments that suggest the presence of bugs, incomplete functionality, or weaknesses.

1 mitigations
Base CWE-547

Use of Hard-coded, Security-relevant Constants

The product uses hard-coded constants instead of symbolic names for security-critical values, which increases the likeli...

1 mitigations
Variant CWE-548

Exposure of Information Through Directory Listing

The product inappropriately exposes a directory listing with an index of all the resources located inside of the directo...

1 CVEs 1 mitigations
Base CWE-549

Missing Password Field Masking

The product does not mask passwords during entry, increasing the potential for attackers to observe and capture password...

1 CVEs 1 mitigations
Variant CWE-550

Server-generated Error Message Containing Sensitive Information

Certain conditions, such as network failure, will cause a server error message to be displayed.

1 mitigations
Base CWE-551

Incorrect Behavior Order: Authorization Before Parsing and Canonicalization

If a web server does not fully parse requested URLs before it examines them for authorization, it may be possible for an...

1 mitigations
Base CWE-552

Files or Directories Accessible to External Parties

The product makes files or directories accessible to unauthorized actors, even though they should not be.

1 CVEs 1 mitigations
Variant CWE-553

Command Shell in Externally Accessible Directory

A possible shell file exists in /cgi-bin/ or other accessible directories. This is extremely dangerous and can be used b...

1 mitigations
Variant CWE-554

ASP.NET Misconfiguration: Not Using Input Validation Framework

The ASP.NET application does not use an input validation framework.

1 mitigations
Variant CWE-555

J2EE Misconfiguration: Plaintext Password in Configuration File

The J2EE application stores a plaintext password in a configuration file.

2 mitigations
Variant CWE-556

ASP.NET Misconfiguration: Use of Identity Impersonation

Configuring an ASP.NET application to run with impersonated credentials may give the application unnecessary privileges.

1 mitigations
Variant CWE-558

Use of getlogin() in Multithreaded Application

The product uses the getlogin() function in a multithreaded context, potentially causing it to return incorrect values.

2 mitigations
Variant CWE-560

Use of umask() with chmod-style Argument

The product calls umask() with an incorrect argument that is specified as if it is an argument to chmod().

1 mitigations
Base CWE-561

Dead Code

The product contains dead code, which can never be executed.

1 CVEs 1 mitigations
Base CWE-562

Return of Stack Variable Address

A function returns the address of a stack variable, which will cause unintended program behavior, typically in the form ...

1 CVEs 1 mitigations
Base CWE-563

Assignment to Variable without Use

The variable's value is assigned but never used, making it a dead store.

1 mitigations
Variant CWE-564

SQL Injection: Hibernate

Using Hibernate to execute a dynamic SQL statement built with user-controlled input can allow an attacker to modify the ...

5 mitigations
Base CWE-565

Reliance on Cookies without Validation and Integrity Checking

The product relies on the existence or values of cookies when performing security-critical operations, but it does not p...

1 CVEs 4 mitigations
Variant CWE-566

Authorization Bypass Through User-Controlled SQL Primary Key

The product uses a database table that includes records that should not be accessible to an actor, but it executes a SQL...

2 mitigations
Base CWE-567

Unsynchronized Access to Shared Data in a Multithreaded Context

The product does not properly synchronize shared data, such as static variables across threads, which can lead to undefi...

1 mitigations
Variant CWE-568

finalize() Method Without super.finalize()

The product contains a finalize() method that does not call super.finalize().

1 mitigations
Base CWE-570

Expression is Always False

The product contains an expression that will always evaluate to false.

1 mitigations
Base CWE-571

Expression is Always True

The product contains an expression that will always evaluate to true.

1 mitigations
Variant CWE-572

Call to Thread run() instead of start()

The product calls a thread's run() method instead of calling start(), which causes the code to run in the thread of the ...

1 mitigations
Class CWE-573

Improper Following of Specification by Caller

The product does not follow or incorrectly follows the specifications as required by the implementation language, enviro...

2 CVEs
Variant CWE-574

EJB Bad Practices: Use of Synchronization Primitives

The product violates the Enterprise JavaBeans (EJB) specification by using thread synchronization primitives.

1 mitigations
Variant CWE-575

EJB Bad Practices: Use of AWT Swing

The product violates the Enterprise JavaBeans (EJB) specification by using AWT/Swing.

1 mitigations
Variant CWE-576

EJB Bad Practices: Use of Java I/O

The product violates the Enterprise JavaBeans (EJB) specification by using the java.io package.

1 mitigations
Variant CWE-577

EJB Bad Practices: Use of Sockets

The product violates the Enterprise JavaBeans (EJB) specification by using sockets.

1 mitigations
Variant CWE-578

EJB Bad Practices: Use of Class Loader

The product violates the Enterprise JavaBeans (EJB) specification by using the class loader.

1 mitigations
Variant CWE-579

J2EE Bad Practices: Non-serializable Object Stored in Session

The product stores a non-serializable object as an HttpSession attribute, which can hurt reliability.

1 mitigations
Variant CWE-580

clone() Method Without super.clone()

The product contains a clone() method that does not call super.clone() to obtain the new object.

2 mitigations
Variant CWE-581

Object Model Violation: Just One of Equals and Hashcode Defined

The product does not maintain equal hashcodes for equal objects.

1 mitigations
Variant CWE-582

Array Declared Public, Final, and Static

The product declares an array public, final, and static, which is not sufficient to prevent the array's contents from be...

1 mitigations
Variant CWE-583

finalize() Method Declared Public

The product violates secure coding principles for mobile code by declaring a finalize() method public.

1 mitigations
Base CWE-584

Return Inside Finally Block

The code has a return statement inside a finally block, which will cause any thrown exception in the try block to be dis...

1 mitigations
Variant CWE-585

Empty Synchronized Block

The product contains an empty synchronized block.

1 mitigations
Base CWE-586

Explicit Call to Finalize()

The product makes an explicit call to the finalize() method from outside the finalizer.

1 mitigations
Variant CWE-587

Assignment of a Fixed Address to a Pointer

The product sets a pointer to a specific address other than NULL or 0.

1 mitigations
Variant CWE-588

Attempt to Access Child of a Non-structure Pointer

Casting a non-structure type to a structure type and accessing a field can lead to memory access errors or data corrupti...

1 CVEs 2 mitigations
Variant CWE-589

Call to Non-ubiquitous API

The product uses an API function that does not exist on all versions of the target platform. This could cause portabilit...

3 mitigations
Variant CWE-590

Free of Memory not on the Heap

The product calls free() on a pointer to memory that was not allocated using associated heap allocation functions such a...

1 CVEs 4 mitigations
Variant CWE-591

Sensitive Data Storage in Improperly Locked Memory

The product stores sensitive data in memory that is not locked, or that has been incorrectly locked, which might cause t...

1 CVEs 2 mitigations
Variant CWE-593

Authentication Bypass: OpenSSL CTX Object Modified after SSL Objects are Created

The product modifies the SSL context after connection creation has begun.

3 mitigations
Variant CWE-594

J2EE Framework: Saving Unserializable Objects to Disk

When the J2EE container attempts to write unserializable objects to disk there is no guarantee that the process will com...

1 mitigations
Variant CWE-595

Comparison of Object References Instead of Object Contents

The product compares object references instead of the contents of the objects themselves, preventing it from detecting e...

1 mitigations
Variant CWE-597

Use of Wrong Operator in String Comparison

The product uses the wrong operator when comparing a string, such as using "==" when the .equals() method should be used...

1 mitigations
Variant CWE-598

Use of HTTP Request With Sensitive Query String

The web application uses an HTTP method to process a request, but the request includes sensitive information in the quer...

4 CVEs 1 mitigations
Variant CWE-599

Missing Validation of OpenSSL Certificate

The product uses OpenSSL and trusts or uses a certificate without using the SSL_get_verify_result() function to ensure t...

2 mitigations
Variant CWE-600

Uncaught Exception in Servlet

The Servlet does not catch all exceptions, which may reveal sensitive debugging information.

1 mitigations
Base CWE-601

URL Redirection to Untrusted Site ('Open Redirect')

The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a r...

4 CVEs 6 mitigations
Class CWE-602

Client-Side Enforcement of Server-Side Security

The product is composed of a server that relies on the client to implement a mechanism that is intended to protect the s...

6 CVEs 2 mitigations
Base CWE-603

Use of Client-Side Authentication

A client/server product performs authentication within client code but not in server code, allowing server-side authenti...

2 CVEs 1 mitigations
Variant CWE-605

Multiple Binds to the Same Port

When multiple sockets are allowed to bind to the same port, other services on that port may be stolen or spoofed.

1 mitigations
Base CWE-606

Unchecked Input for Loop Condition

The product does not properly check inputs that are used for loop conditions, potentially leading to a denial of service...

1 CVEs 2 mitigations
Variant CWE-607

Public Static Final Field References Mutable Object

A public or protected static final field references a mutable object, which allows the object to be changed by malicious...

1 mitigations
Variant CWE-608

Struts: Non-private Field in ActionForm Class

An ActionForm class contains a field that has not been declared private, which can be accessed without using a setter or...

1 mitigations
Base CWE-609

Double-Checked Locking

The product uses double-checked locking to access a resource without the overhead of explicit synchronization, but the l...

1 mitigations
Class CWE-610

Externally Controlled Reference to a Resource in Another Sphere

The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended ...

6 CVEs
Base CWE-611

Improper Restriction of XML External Entity Reference

The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the i...

11 CVEs 1 mitigations
Base CWE-612

Improper Authorization of Index Containing Sensitive Information

The product creates a search index of private or sensitive documents, but it does not properly limit index access to act...

1 CVEs
Base CWE-613

Insufficient Session Expiration

According to WASC, "Insufficient Session Expiration is when a web site permits an attacker to reuse old session credenti...

4 CVEs 1 mitigations
Variant CWE-614

Sensitive Cookie in HTTPS Session Without 'Secure' Attribute

The Secure attribute for sensitive cookies in HTTPS sessions is not set.

5 CVEs 1 mitigations
Variant CWE-615

Inclusion of Sensitive Information in Source Code Comments

While adding general comments is very useful, some programmers tend to leave important data, such as: filenames related ...

3 CVEs 1 mitigations
Variant CWE-616

Incomplete Identification of Uploaded File Variables (PHP)

The PHP application uses an old method for processing uploaded files by referencing the four global variables that are s...

3 CVEs 3 mitigations
Base CWE-617

Reachable Assertion

The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an applicatio...

8 CVEs 2 mitigations
Variant CWE-618

Exposed Unsafe ActiveX Method

An ActiveX control is intended for use in a web browser, but it exposes dangerous methods that perform actions that are ...

3 CVEs 3 mitigations
Base CWE-619

Dangling Database Cursor ('Cursor Injection')

If a database cursor is not closed properly, then it could become accessible to other users while retaining the same pri...

1 mitigations
Base CWE-620

Unverified Password Change

When setting a new password for a user, the product does not require knowledge of the original password, or using anothe...

3 CVEs 2 mitigations
Variant CWE-621

Variable Extraction Error

The product uses external input to determine the names of variables into which information is extracted, without verifyi...

5 CVEs 3 mitigations
Variant CWE-622

Improper Validation of Function Hook Arguments

The product adds hooks to user-accessible API functions, but it does not properly validate the arguments. This could lea...

5 CVEs 2 mitigations
Variant CWE-623

Unsafe ActiveX Control Marked Safe For Scripting

An ActiveX control is intended for restricted use, but it has been marked as safe-for-scripting.

3 CVEs 2 mitigations
Base CWE-624

Executable Regular Expression Error

The product uses a regular expression that either (1) contains an executable component with user-controlled inputs, or (...

4 CVEs 1 mitigations
Base CWE-625

Permissive Regular Expression

The product uses a regular expression that does not sufficiently restrict the set of allowed values.

8 CVEs 1 mitigations
Variant CWE-626

Null Byte Interaction Error (Poison Null Byte)

The product does not properly handle null bytes or NUL characters when passing data between different representations or...

2 CVEs 1 mitigations
Variant CWE-627

Dynamic Variable Evaluation

In a language where the user can influence the name of a variable at runtime, if the variable names are not controlled, ...

4 CVEs 3 mitigations
Base CWE-628

Function Call with Incorrectly Specified Arguments

The product calls a function, procedure, or routine with arguments that are not correctly specified, leading to always-i...

1 CVEs 2 mitigations
Class CWE-636

Not Failing Securely ('Failing Open')

When the product encounters an error condition or failure, its design requires it to fall back to a state that is less s...

2 CVEs 1 mitigations
Class CWE-637

Unnecessary Complexity in Protection Mechanism (Not Using 'Economy of Mechanism')

The product uses a more complex mechanism than necessary, which could lead to resultant weaknesses when the mechanism is...

4 CVEs 1 mitigations
Class CWE-638

Not Using Complete Mediation

The product does not perform access checks on a resource every time the resource is accessed by an entity, which can cre...

1 CVEs 2 mitigations
Base CWE-639

Authorization Bypass Through User-Controlled Key

The system's authorization functionality does not prevent one user from gaining access to another user's data or record ...

1 CVEs 3 mitigations
Base CWE-640

Weak Password Recovery Mechanism for Forgotten Password

The product contains a mechanism for users to recover or change their passwords without knowing the original password, b...

4 CVEs 6 mitigations
Base CWE-641

Improper Restriction of Names for Files and Other Resources

The product constructs the name of a file or other resource using input from an upstream component, but it does not rest...

3 mitigations
Class CWE-642

External Control of Critical State Data

The product stores security-critical state information about its users, or the product itself, in a location that is acc...

13 CVEs 6 mitigations
Base CWE-643

Improper Neutralization of Data within XPath Expressions ('XPath Injection')

The product uses external input to dynamically construct an XPath expression used to retrieve data from an XML database,...

2 mitigations
Variant CWE-644

Improper Neutralization of HTTP Headers for Scripting Syntax

The product does not neutralize or incorrectly neutralizes web scripting syntax in HTTP headers that can be used by web ...

1 CVEs 2 mitigations
Base CWE-645

Overly Restrictive Account Lockout Mechanism

The product contains an account lockout protection mechanism, but the mechanism is too restrictive and can be triggered ...

3 mitigations
Variant CWE-646

Reliance on File Name or Extension of Externally-Supplied File

The product allows a file to be uploaded, but it relies on the file name or extension of the file to determine the appro...

1 mitigations
Variant CWE-647

Use of Non-Canonical URL Paths for Authorization Decisions

The product defines policy namespaces and makes authorization decisions based on the assumption that a URL is canonical....

2 mitigations
Base CWE-648

Incorrect Use of Privileged APIs

The product does not conform to the API requirements for a function call that requires extra privileges. This could allo...

1 CVEs 6 mitigations
Base CWE-649

Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking

The product uses obfuscation or encryption of inputs that should not be mutable by an external actor, but the product do...

1 CVEs 4 mitigations
Variant CWE-650

Trusting HTTP Permission Methods on the Server Side

The server contains a protection mechanism that assumes that any URI that is accessed using HTTP GET will not cause a st...

1 mitigations
Variant CWE-651

Exposure of WSDL File Containing Sensitive Information

The Web services architecture may require exposing a Web Service Definition Language (WSDL) file that contains informati...

3 mitigations
Base CWE-652

Improper Neutralization of Data within XQuery Expressions ('XQuery Injection')

The product uses external input to dynamically construct an XQuery expression used to retrieve data from an XML database...

2 mitigations
Class CWE-653

Improper Isolation or Compartmentalization

The product does not properly compartmentalize or isolate functionality, processes, or resources that require different ...

2 CVEs 1 mitigations
Base CWE-654

Reliance on a Single Factor in a Security Decision

A protection mechanism relies exclusively, or to a large extent, on the evaluation of a single condition or the integrit...

1 CVEs 2 mitigations
Class CWE-655

Insufficient Psychological Acceptability

The product has a protection mechanism that is too difficult or inconvenient to use, encouraging non-malicious users to ...

2 mitigations
Class CWE-656

Reliance on Security Through Obscurity

The product uses a protection mechanism whose strength depends heavily on its obscurity, such that knowledge of its algo...

4 CVEs 2 mitigations
Class CWE-657

Violation of Secure Design Principles

The product violates well-established principles for secure design.

4 CVEs
Class CWE-662

Improper Synchronization

The product utilizes multiple threads, processes, components, or systems to allow temporary access to a shared resource ...

2 CVEs 1 mitigations
Base CWE-663

Use of a Non-reentrant Function in a Concurrent Context

The product calls a non-reentrant function in a concurrent context in which a competing code sequence (e.g. thread or si...

2 CVEs 3 mitigations
Pillar CWE-664

Improper Control of a Resource Through its Lifetime

The product does not maintain or incorrectly maintains control over a resource throughout its lifetime of creation, use,...

2 CVEs
Class CWE-665

Improper Initialization

The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected s...

16 CVEs 6 mitigations
Class CWE-666

Operation on Resource in Wrong Phase of Lifetime

The product performs an operation on a resource at the wrong phase of the resource's lifecycle, which can lead to unexpe...

1 CVEs 1 mitigations
Class CWE-667

Improper Locking

The product does not properly acquire or release a lock on a resource, leading to unexpected resource state changes and ...

26 CVEs 1 mitigations
Class CWE-668

Exposure of Resource to Wrong Sphere

The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the...

Class CWE-669

Incorrect Resource Transfer Between Spheres

The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior ...

3 CVEs
Class CWE-670

Always-Incorrect Control Flow Implementation

The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leadin...

1 CVEs
Class CWE-671

Lack of Administrator Control over Security

The product uses security features in a way that prevents the product's administrator from tailoring security settings t...

2 CVEs
Class CWE-672

Operation on a Resource after Expiration or Release

The product uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revok...

1 CVEs
Class CWE-673

External Influence of Sphere Definition

The product does not prevent the definition of control spheres from external actors.

1 CVEs
Class CWE-674

Uncontrolled Recursion

The product does not properly control the amount of recursion that takes place, consuming excessive resources, such as ...

5 CVEs 2 mitigations
Class CWE-675

Multiple Operations on Resource in Single-Operation Context

The product performs the same operation on a resource two or more times, when the operation should only be applied once.

3 CVEs
Base CWE-676

Use of Potentially Dangerous Function

The product invokes a potentially dangerous function that could introduce a vulnerability if it is used incorrectly, but...

6 CVEs 1 mitigations
Compound CWE-680

Integer Overflow to Buffer Overflow

The product performs a calculation to determine how much memory to allocate, but an integer overflow can occur that caus...

2 CVEs
Base CWE-681

Incorrect Conversion between Numeric Types

When converting from one data type to another, such as long to integer, data can be omitted or translated in a way that ...

6 CVEs 1 mitigations
Pillar CWE-682

Incorrect Calculation

The product performs a calculation that generates incorrect or unintended results that are later used in security-critic...

3 CVEs 6 mitigations
Variant CWE-683

Function Call With Incorrect Order of Arguments

The product calls a function, procedure, or routine, but the caller specifies the arguments in an incorrect order, leadi...

1 CVEs 1 mitigations
Class CWE-684

Incorrect Provision of Specified Functionality

The code does not function according to its published specifications, potentially leading to incorrect usage.

4 CVEs 1 mitigations
Variant CWE-685

Function Call With Incorrect Number of Arguments

The product calls a function, procedure, or routine, but the caller specifies too many arguments, or too few arguments, ...

1 mitigations
Variant CWE-686

Function Call With Incorrect Argument Type

The product calls a function, procedure, or routine, but the caller specifies an argument that is the wrong data type, w...

Variant CWE-687

Function Call With Incorrectly Specified Argument Value

The product calls a function, procedure, or routine, but the caller specifies an argument that contains the wrong value,...

Variant CWE-688

Function Call With Incorrect Variable or Reference as Argument

The product calls a function, procedure, or routine, but the caller specifies the wrong variable or reference as one of ...

1 CVEs 1 mitigations
Compound CWE-689

Permission Race Condition During Resource Copy

The product, while copying or cloning a resource, does not set the resource's permissions or access control until the co...

5 CVEs
Compound CWE-690

Unchecked Return Value to NULL Pointer Dereference

The product does not check for an error after calling a function that can return with a NULL pointer if the function fai...

5 CVEs
Pillar CWE-691

Insufficient Control Flow Management

The code does not sufficiently manage its control flow during execution, creating conditions in which the control flow c...

4 CVEs
Compound CWE-692

Incomplete Denylist to Cross-Site Scripting

The product uses a denylist-based protection mechanism to defend against XSS attacks, but the denylist is incomplete, al...

3 CVEs
Pillar CWE-693

Protection Mechanism Failure

The product does not use or incorrectly uses a protection mechanism that provides sufficient defense against directed at...

Base CWE-694

Use of Multiple Resources with Duplicate Identifier

The product uses multiple resources that can have the same identifier, in a context in which unique identifiers are requ...

1 CVEs 1 mitigations
Base CWE-695

Use of Low-Level Functionality

The product uses low-level functionality that is explicitly prohibited by the framework or specification under which the...

Class CWE-696

Incorrect Behavior Order

The product performs multiple related behaviors, but the behaviors are performed in the wrong order in ways that may pro...

4 CVEs
Pillar CWE-697

Incorrect Comparison

The product compares two entities in a security-relevant context, but the comparison is incorrect.

3 CVEs
Base CWE-698

Execution After Redirect (EAR)

The web application sends a redirect to another location, but instead of exiting, it executes additional code.

7 CVEs
Pillar CWE-703

Improper Check or Handling of Exceptional Conditions

The product does not properly anticipate or handle exceptional conditions that rarely occur during normal operation of t...

2 CVEs
Class CWE-704

Incorrect Type Conversion or Cast

The product does not correctly convert an object, resource, or structure from one type to a different type.

2 CVEs
Class CWE-705

Incorrect Control Flow Scoping

The product does not properly return control flow to the proper location after it has completed a task or detected an un...

2 CVEs
Class CWE-706

Use of Incorrectly-Resolved Name or Reference

The product uses a name or reference to access a resource, but the name/reference resolves to a resource that is outside...

Pillar CWE-707

Improper Neutralization

The product does not ensure or incorrectly ensures that structured messages or data are well-formed and that certain sec...

Base CWE-708

Incorrect Ownership Assignment

The product assigns an owner to a resource, but the owner is outside of the intended control sphere.

7 CVEs 1 mitigations
Pillar CWE-710

Improper Adherence to Coding Standards

The product does not follow certain coding rules for development, which can lead to resultant weaknesses or increase the...

2 mitigations
Class CWE-732

Incorrect Permission Assignment for Critical Resource

The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modi...

19 CVEs 9 mitigations
Base CWE-733

Compiler Optimization Removal or Modification of Security-critical Code

The developer builds a security-critical protection mechanism into the software, but the compiler optimizes the program ...

2 CVEs
Base CWE-749

Exposed Dangerous Method or Function

The product provides an Applications Programming Interface (API) or similar interface for interaction with external acto...

2 CVEs 2 mitigations
Class CWE-754

Improper Check for Unusual or Exceptional Conditions

The product does not check or incorrectly checks for unusual or exceptional conditions that are not expected to occur fr...

4 CVEs 7 mitigations
Class CWE-755

Improper Handling of Exceptional Conditions

The product does not handle or incorrectly handles an exceptional condition.

4 CVEs
Base CWE-756

Missing Custom Error Page

The product does not return custom error pages to the user, possibly exposing sensitive information.

1 CVEs
Base CWE-757

Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade')

A protocol or its implementation supports interaction between multiple actors and allows those actors to negotiate which...

5 CVEs
Class CWE-758

Reliance on Undefined, Unspecified, or Implementation-Defined Behavior

The product uses an API function, data structure, or other entity in a way that relies on properties that are not always...

1 CVEs
Variant CWE-759

Use of a One-Way Hash without a Salt

The product uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but th...

2 CVEs 3 mitigations
Variant CWE-760

Use of a One-Way Hash with a Predictable Salt

The product uses a one-way cryptographic hash against an input that should not be reversible, such as a password, but th...

4 CVEs 2 mitigations
Variant CWE-761

Free of Pointer not at Start of Buffer

The product calls free() on a pointer to a memory resource that was allocated on the heap, but the pointer is not at the...

1 CVEs 4 mitigations
Variant CWE-762

Mismatched Memory Management Routines

The product attempts to return a memory resource to the system, but it calls a release function that is not compatible w...

4 mitigations
Base CWE-763

Release of Invalid Pointer or Reference

The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the app...

1 CVEs 4 mitigations
Base CWE-764

Multiple Locks of a Critical Resource

The product locks a critical resource more times than intended, leading to an unexpected state in the system.

1 mitigations
Base CWE-765

Multiple Unlocks of a Critical Resource

The product unlocks a critical resource more times than intended, leading to an unexpected state in the system.

1 CVEs 1 mitigations
Base CWE-766

Critical Data Element Declared Public

The product declares a critical variable, field, or member to be public when intended security policy requires it to be ...

1 CVEs 1 mitigations
Base CWE-767

Access to Critical Private Variable via Public Method

The product defines a public method that reads or modifies a private variable.

1 mitigations
Variant CWE-768

Incorrect Short Circuit Evaluation

The product contains a conditional statement with multiple logical expressions in which one of the non-leading expressio...

1 mitigations
Base CWE-770

Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any intended rest...

10 CVEs 9 mitigations
Base CWE-771

Missing Reference to Active Allocated Resource

The product does not properly maintain a reference to a resource that has been allocated, which prevents the resource fr...

1 mitigations
Base CWE-772

Missing Release of Resource after Effective Lifetime

The product does not release a resource after its effective lifetime has ended, i.e., after the resource is no longer ne...

8 CVEs 3 mitigations
Variant CWE-773

Missing Reference to Active File Descriptor or Handle

The product does not properly maintain references to a file descriptor or handle, which prevents that file descriptor/ha...

1 mitigations
Variant CWE-774

Allocation of File Descriptors or Handles Without Limits or Throttling

The product allocates file descriptors or handles on behalf of an actor without imposing any restrictions on how many de...

1 mitigations
Variant CWE-775

Missing Release of File Descriptor or Handle after Effective Lifetime

The product does not release a file descriptor or handle after its effective lifetime has ended, i.e., after the file de...

1 CVEs 1 mitigations
Base CWE-776

Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')

The product uses XML documents and allows their structure to be defined with a Document Type Definition (DTD), but it do...

5 CVEs 2 mitigations
Variant CWE-777

Regular Expression without Anchors

The product uses a regular expression to perform neutralization, but the regular expression is not anchored and may allo...

1 CVEs 1 mitigations
Base CWE-778

Insufficient Logging

When a security-critical event occurs, the product either does not record the event or omits important details about the...

5 CVEs 4 mitigations
Base CWE-779

Logging of Excessive Data

The product logs too much information, making log files hard to process and possibly hindering recovery efforts or foren...

2 CVEs 3 mitigations
Variant CWE-780

Use of RSA Algorithm without OAEP

The product uses the RSA algorithm but does not incorporate Optimal Asymmetric Encryption Padding (OAEP), which might we...

Variant CWE-781

Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code

The product defines an IOCTL that uses METHOD_NEITHER for I/O, but it does not validate or incorrectly validates the add...

5 CVEs 3 mitigations
Variant CWE-782

Exposed IOCTL with Insufficient Access Control

The product implements an IOCTL with functionality that should be restricted, but it does not properly enforce access co...

8 CVEs 1 mitigations
Base CWE-783

Operator Precedence Logic Error

The product uses an expression in which operator precedence causes incorrect logic to be used.

3 CVEs 1 mitigations
Variant CWE-784

Reliance on Cookies without Validation and Integrity Checking in a Security Decision

The product uses a protection mechanism that relies on the existence or values of a cookie, but it does not properly ens...

5 CVEs 4 mitigations
Variant CWE-785

Use of Path Manipulation Function without Maximum-sized Buffer

The product invokes a function for normalizing paths or file names, but it provides an output buffer that is smaller tha...

1 mitigations
Base CWE-786

Access of Memory Location Before Start of Buffer

The product reads or writes to a buffer using an index or pointer that references a memory location prior to the beginni...

7 CVEs
Base CWE-787

Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

17 CVEs 7 mitigations
Base CWE-788

Access of Memory Location After End of Buffer

The product reads or writes to a buffer using an index or pointer that references a memory location after the end of the...

6 CVEs
Variant CWE-789

Memory Allocation with Excessive Size Value

The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within exp...

7 CVEs 2 mitigations
Class CWE-790

Improper Filtering of Special Elements

The product receives data from an upstream component, but does not filter or incorrectly filters special elements before...

Base CWE-791

Incomplete Filtering of Special Elements

The product receives data from an upstream component, but does not completely filter special elements before sending it ...

Variant CWE-792

Incomplete Filtering of One or More Instances of Special Elements

The product receives data from an upstream component, but does not completely filter one or more instances of special el...

Variant CWE-793

Only Filtering One Instance of a Special Element

The product receives data from an upstream component, but only filters a single instance of a special element before sen...

Variant CWE-794

Incomplete Filtering of Multiple Instances of Special Elements

The product receives data from an upstream component, but does not filter all instances of a special element before send...

Base CWE-795

Only Filtering Special Elements at a Specified Location

The product receives data from an upstream component, but only accounts for special elements at a specified location, th...

Variant CWE-796

Only Filtering Special Elements Relative to a Marker

The product receives data from an upstream component, but only accounts for special elements positioned relative to a ma...

Variant CWE-797

Only Filtering Special Elements at an Absolute Position

The product receives data from an upstream component, but only accounts for special elements at an absolute position (e....

Base CWE-798

Use of Hard-coded Credentials

The product contains hard-coded credentials, such as a password or cryptographic key.

20 CVEs 5 mitigations
Class CWE-799

Improper Control of Interaction Frequency

The product does not properly limit the number or frequency of interactions that it has with an actor, such as the numbe...

2 CVEs
Base CWE-804

Guessable CAPTCHA

The product uses a CAPTCHA challenge, but the challenge can be guessed or automatically recognized by a non-human actor.

1 CVEs
Base CWE-805

Buffer Access with Incorrect Length Value

The product uses a sequential operation to read or write a buffer, but it uses an incorrect length value that causes it ...

6 CVEs 9 mitigations
Variant CWE-806

Buffer Access Using Size of Source Buffer

The product uses the size of a source buffer when reading from or writing to a destination buffer, which may cause it to...

6 mitigations
Base CWE-807

Reliance on Untrusted Inputs in a Security Decision

The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modifie...

5 CVEs 5 mitigations
Base CWE-820

Missing Synchronization

The product utilizes a shared resource in a concurrent manner but does not attempt to synchronize access to the resource...

Base CWE-821

Incorrect Synchronization

The product utilizes a shared resource in a concurrent manner, but it does not correctly synchronize access to the resou...

Base CWE-822

Untrusted Pointer Dereference

The product obtains a value from an untrusted source, converts this value to a pointer, and dereferences the resulting p...

8 CVEs
Base CWE-823

Use of Out-of-range Pointer Offset

The product performs pointer arithmetic on a valid pointer, but it uses an offset that can point outside of the intended...

17 CVEs
Base CWE-824

Access of Uninitialized Pointer

The product accesses or uses a pointer that has not been initialized.

19 CVEs
Base CWE-825

Expired Pointer Dereference

The product dereferences a pointer that contains a location for memory that was previously valid, but is no longer valid...

5 CVEs 2 mitigations
Base CWE-826

Premature Release of Resource During Expected Lifetime

The product releases a resource that is still intended to be used by itself or another actor.

1 CVEs
Variant CWE-827

Improper Control of Document Type Definition

The product does not restrict a reference to a Document Type Definition (DTD) to the intended control sphere. This might...

1 CVEs
Variant CWE-828

Signal Handler with Functionality that is not Asynchronous-Safe

The product defines a signal handler that contains code sequences that are not asynchronous-safe, i.e., the functionalit...

6 CVEs 2 mitigations
Base CWE-829

Inclusion of Functionality from Untrusted Control Sphere

The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of...

20 CVEs 9 mitigations
Variant CWE-830

Inclusion of Web Functionality from an Untrusted Source

The product includes web functionality (such as a web widget) from another domain, which causes it to operate within the...

Variant CWE-831

Signal Handler Function Associated with Multiple Signals

The product defines a function that is used as a handler for more than one signal.

Base CWE-832

Unlock of a Resource that is not Locked

The product attempts to unlock a resource that is not locked.

3 CVEs
Base CWE-833

Deadlock

The product contains multiple threads or executable segments that are waiting for each other to release a necessary lock...

15 CVEs
Class CWE-834

Excessive Iteration

The product performs an iteration or loop without sufficiently limiting the number of times that the loop is executed.

2 CVEs
Base CWE-835

Loop with Unreachable Exit Condition ('Infinite Loop')

The product contains an iteration or loop with an exit condition that cannot be reached, i.e., an infinite loop.

12 CVEs
Base CWE-836

Use of Password Hash Instead of Password for Authentication

The product records password hashes in a data store, receives a hash of a password from a client, and compares the suppl...

2 CVEs
Base CWE-837

Improper Enforcement of a Single, Unique Action

The product requires that an actor should only be able to perform an action once, or to have only one unique action, but...

6 CVEs
Base CWE-838

Inappropriate Encoding for Output Context

The product uses or specifies an encoding when generating output to a downstream component, but the specified encoding i...

1 CVEs 3 mitigations
Base CWE-839

Numeric Range Comparison Without Minimum Check

The product checks a value to ensure that it is less than or equal to a maximum, but it does not also verify that the va...

8 CVEs 2 mitigations
Class CWE-841

Improper Enforcement of Behavioral Workflow

The product supports a session in which more than one behavior must be performed by an actor, but it does not properly e...

9 CVEs
Base CWE-842

Placement of User into Incorrect Group

The product or the administrator places a user into an incorrect group.

6 CVEs
Base CWE-843

Access of Resource Using Incompatible Type ('Type Confusion')

The product allocates or initializes a resource such as a pointer, object, or variable using one type, but it later acce...

4 CVEs
Class CWE-862

Missing Authorization

The product does not perform an authorization check when an actor attempts to access a resource or perform an action.

25 CVEs 5 mitigations
Class CWE-863

Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource or perform an action, but it doe...

13 CVEs 5 mitigations
Base CWE-908

Use of Uninitialized Resource

The product uses or accesses a resource that has not been initialized.

13 CVEs 4 mitigations
Class CWE-909

Missing Initialization of Resource

The product does not initialize a critical resource.

2 CVEs 4 mitigations
Base CWE-910

Use of Expired File Descriptor

The product uses or accesses a file descriptor after it has been closed.

Base CWE-911

Improper Update of Reference Count

The product uses a reference count to manage a resource, but it does not update or incorrectly updates the reference cou...

17 CVEs
Class CWE-912

Hidden Functionality

The product contains functionality that is not documented, not part of the specification, and not accessible through an ...

2 CVEs 1 mitigations
Class CWE-913

Improper Control of Dynamically-Managed Code Resources

The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, ...

5 CVEs 2 mitigations
Base CWE-914

Improper Control of Dynamically-Identified Variables

The product does not properly restrict reading from or writing to dynamically-identified variables.

9 CVEs 2 mitigations
Base CWE-915

Improperly Controlled Modification of Dynamically-Determined Object Attributes

The product receives input from an upstream component that specifies multiple attributes, properties, or fields that are...

18 CVEs 4 mitigations
Base CWE-916

Use of Password Hash With Insufficient Computational Effort

The product generates a hash for a password, but it uses a scheme that does not provide a sufficient level of computatio...

6 CVEs 2 mitigations
Base CWE-917

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (J...

1 CVEs 3 mitigations
Base CWE-918

Server-Side Request Forgery (SSRF)

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but ...

10 CVEs
Base CWE-920

Improper Restriction of Power Consumption

The product operates in an environment in which power is a limited resource that cannot be automatically replenished, bu...

Base CWE-921

Storage of Sensitive Data in a Mechanism without Access Control

The product stores sensitive information in a file system or device that does not have built-in access control.

Class CWE-922

Insecure Storage of Sensitive Information

The product stores sensitive information without properly limiting read or write access by unauthorized actors.

1 CVEs
Class CWE-923

Improper Restriction of Communication Channel to Intended Endpoints

The product establishes a communication channel to (or from) an endpoint for privileged or protected operations, but it ...

7 CVEs
Base CWE-924

Improper Enforcement of Message Integrity During Transmission in a Communication Channel

The product establishes a communication channel with an endpoint and receives a message from that endpoint, but it does ...

Variant CWE-925

Improper Verification of Intent by Broadcast Receiver

The Android application uses a Broadcast Receiver that receives an Intent but does not properly verify that the Intent c...

2 CVEs 1 mitigations
Variant CWE-926

Improper Export of Android Application Components

The Android application exports a component for use by other applications, but does not properly restrict which applicat...

4 mitigations
Variant CWE-927

Use of Implicit Intent for Sensitive Communication

The Android application uses an implicit intent for transmitting sensitive data to other applications.

1 CVEs 1 mitigations
Base CWE-939

Improper Authorization in Handler for Custom URL Scheme

The product uses a handler for a custom URL scheme, but it does not properly restrict which actors can invoke the handle...

2 CVEs 1 mitigations
Base CWE-940

Improper Verification of Source of a Communication Channel

The product establishes a communication channel to handle an incoming request that has been initiated by an actor, but i...

4 CVEs 1 mitigations
Base CWE-941

Incorrectly Specified Destination in a Communication Channel

The product creates a communication channel to initiate an outgoing request to an actor, but it does not correctly speci...

3 CVEs
Variant CWE-942

Permissive Cross-domain Security Policy with Untrusted Domains

The product uses a web-client protection mechanism such as a Content Security Policy (CSP) or cross-do...

5 CVEs 3 mitigations
Class CWE-943

Improper Neutralization of Special Elements in Data Query Logic

The product generates a query intended to access or manipulate data in a data store such as a database, but it does not ...

5 CVEs
Variant CWE-1004

Sensitive Cookie Without 'HttpOnly' Flag

The product uses a cookie to store sensitive information, but the cookie is not marked with the HttpOnly flag.

4 CVEs 1 mitigations
Base CWE-1007

Insufficient Visual Distinction of Homoglyphs Presented to User

The product displays information or identifiers to a user, but the display mechanism does not make it easy for the user ...

7 CVEs 2 mitigations
Base CWE-1021

Improper Restriction of Rendered UI Layers or Frames

The web application does not restrict or incorrectly restricts frame objects or UI layers that belong to another applica...

6 CVEs 4 mitigations
Variant CWE-1022

Use of Web Link to Untrusted Target with window.opener Access

The web application produces links to untrusted external sites outside of its sphere of control, but it does not properl...

1 CVEs 3 mitigations
Class CWE-1023

Incomplete Comparison with Missing Factors

The product performs a comparison between entities that must consider multiple factors or characteristics of each entity...

2 CVEs
Base CWE-1024

Comparison of Incompatible Types

The product performs a comparison between two entities, but the entities are of different, incompatible types that canno...

Base CWE-1025

Comparison Using Wrong Factors

The code performs a comparison between two entities, but the comparison examines the wrong factors or characteristics of...

Base CWE-1037

Processor Optimization Removal or Modification of Security-critical Code

The developer builds a security-critical protection mechanism into the software, but the processor optimizes the executi...

3 CVEs
Class CWE-1038

Insecure Automated Optimizations

The product uses a mechanism that automatically optimizes code, e.g. to improve a characteristic such as performance, bu...

2 CVEs
Class CWE-1039

Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism

The product uses an automated mechanism such as machine learning to recognize complex data inputs (e.g. image or audio) ...

1 CVEs 7 mitigations
Base CWE-1041

Use of Redundant Code

The product has multiple functions, methods, procedures, macros, etc. that contain the same code.

1 mitigations
Variant CWE-1042

Static Member Data Element outside of a Singleton Class Element

The code contains a member element that is declared as static (but not final), in which its parent class element ...

Base CWE-1043

Data Element Aggregating an Excessively Large Number of Non-Primitive Elements

The product uses a data element that has an excessively large number of sub-elements with non-primitive data types ...

Base CWE-1044

Architecture with Number of Horizontal Layers Outside of Expected Range

The product's architecture contains too many - or too few - horizontal layers.

Base CWE-1045

Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor

A parent class has a virtual destructor method, but the parent has a child class that does not have a virtual destructor...

Base CWE-1046

Creation of Immutable Text Using String Concatenation

The product creates an immutable text string using string concatenation operations.

Base CWE-1047

Modules with Circular Dependencies

The product contains modules in which one module has references that cycle back to itself, i.e., there are circular depe...

Base CWE-1048

Invokable Control Element with Large Number of Outward Calls

The code contains callable control elements that contain an excessively large number of references to other ...

Base CWE-1049

Excessive Data Query Operations in a Large Data Table

The product performs a data query with a large number of joins and sub-queries on a large data table.

Base CWE-1050

Excessive Platform Resource Consumption within a Loop

The product has a loop body or loop condition that contains a control element that directly or indirectly consumes ...

Base CWE-1051

Initialization with Hard-Coded Network Resource Configuration Data

The product initializes data using hard-coded values that act as network resource identifiers.

Base CWE-1052

Excessive Use of Hard-Coded Literals in Initialization

The product initializes a data element using a hard-coded literal that is not a simple integer or static constant e...

Base CWE-1053

Missing Documentation for Design

The product does not have documentation that represents how it is designed.

Base CWE-1054

Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer

The code at one architectural layer invokes code that resides at a deeper layer than the adjacent layer, i.e., the ...

Base CWE-1055

Multiple Inheritance from Concrete Classes

The product contains a class with inheritance from more than one concrete class.

Base CWE-1056

Invokable Control Element with Variadic Parameters

A named-callable or method control element has a signature that supports a variable (variadic) number of parameters...

Base CWE-1057

Data Access Operations Outside of Expected Data Manager Component

The product uses a dedicated, central data manager component as required by design, but it contains code that performs d...

Base CWE-1058

Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element

The code contains a function or method that operates in a multi-threaded environment but owns an unsafe non-final ...

Class CWE-1059

Insufficient Technical Documentation

The product does not contain sufficient technical or engineering documentation (whether on paper or in...

1 CVEs 1 mitigations
Base CWE-1060

Excessive Number of Inefficient Server-Side Data Accesses

The product performs too many data queries without using efficient data processing functionality such as stored procedur...

Class CWE-1061

Insufficient Encapsulation

The product does not sufficiently hide the internal representation and implementation details of data or methods, which ...

1 CVEs
Base CWE-1062

Parent Class with References to Child Class

The code has a parent class that contains references to a child class, its methods, or its members.

Base CWE-1063

Creation of Class Instance within a Static Code Block

A static code block creates an instance of a class.

Base CWE-1064

Invokable Control Element with Signature Containing an Excessive Number of Parameters

The product contains a function, subroutine, or method whose signature has an unnecessarily large number of paramet...

Base CWE-1065

Runtime Resource Management Control Element in a Component Built to Run on Application Servers

The product uses deployed components from application servers, but it also uses low-level functions/methods for manageme...

Base CWE-1066

Missing Serialization Control Element

The product contains a serializable data element that does not have an associated serialization method.

Base CWE-1067

Excessive Execution of Sequential Searches of Data Resource

The product contains a data query against an SQL table or view that is configured in a way that does not utilize an...

Base CWE-1068

Inconsistency Between Implementation and Documented Design

The implementation of the product is not consistent with the design as described within the relevant documentation.

Variant CWE-1069

Empty Exception Block

An invokable code block contains an exception handling block that does not contain any code, i.e. is empty.

1 mitigations
Base CWE-1070

Serializable Data Element Containing non-Serializable Item Elements

The product contains a serializable, storable data element such as a field or member, but the data element contains...

Base CWE-1071

Empty Code Block

The source code contains a block that does not contain any code, i.e., the block is empty.

Base CWE-1072

Data Resource Access without Use of Connection Pooling

The product accesses a data resource through a database without using a connection pooling capability.

Base CWE-1073

Non-SQL Invokable Control Element with Excessive Number of Data Resource Accesses

The product contains a client with a function or method that contains a large number of data accesses/queries that are s...

Base CWE-1074

Class with Excessively Deep Inheritance

A class has an inheritance level that is too high, i.e., it has a large number of parent classes.

Base CWE-1075

Unconditional Control Flow Transfer outside of Switch Block

The product performs unconditional control transfer (such as a "goto") in code outside of a branching structure suc...

Class CWE-1076

Insufficient Adherence to Expected Conventions

The product's architecture, source code, design, documentation, or other artifact does not follow required conventi...

Variant CWE-1077

Floating Point Comparison with Incorrect Operator

The code performs a comparison such as an equality test between two float (floating point) values, but i...

Class CWE-1078

Inappropriate Source Code Style or Formatting

The source code does not follow desired style or formatting for indentation, white space, comments, etc.

Base CWE-1079

Parent Class without Virtual Destructor Method

A parent class contains one or more child classes, but the parent class does not have a virtual destructor method.

Base CWE-1080

Source Code File with Excessive Number of Lines of Code

A source code file has too many lines of code.

Base CWE-1082

Class Instance Self Destruction Control Element

The code contains a class instance that calls the method or function to delete or destroy itself.

Base CWE-1083

Data Access from Outside Expected Data Manager Component

The product is intended to manage data access through a particular data manager component such as a relational or non-SQ...

Base CWE-1084

Invokable Control Element with Excessive File or Data Access Operations

A function or method contains too many operations that utilize a data manager or file resource.

Base CWE-1085

Invokable Control Element with Excessive Volume of Commented-out Code

A function, method, procedure, etc. contains an excessive amount of code that has been commented out within its bod...

Base CWE-1086

Class with Excessive Number of Child Classes

A class contains an unnecessarily large number of children.

Base CWE-1087

Class with Virtual Method without a Virtual Destructor

A class contains a virtual method, but the method does not have an associated virtual destructor.

Base CWE-1088

Synchronous Access of Remote Resource without Timeout

The code has a synchronous call to a remote resource, but there is no timeout for the call, or the timeout is set to inf...

2 CVEs
Base CWE-1089

Large Data Table with Excessive Number of Indices

The product uses a large data table that contains an excessively large number of indices.

Base CWE-1090

Method Containing Access of a Member Element from Another Class

A method for a class performs an operation that directly accesses a member element from another class.

Base CWE-1091

Use of Object without Invoking Destructor Method

The product contains a method that accesses an object but does not later invoke the element's associated finalize/d...

Base CWE-1092

Use of Same Invokable Control Element in Multiple Architectural Layers

The product uses the same control element across multiple architectural layers.

Class CWE-1093

Excessively Complex Data Representation

The product uses an unnecessarily complex internal representation for its data structures or interrelationships between ...

Base CWE-1094

Excessive Index Range Scan for a Data Resource

The product contains an index range scan for a large data table, but the scan can cover a large number of rows.

Base CWE-1095

Loop Condition Value Update within the Loop

The product uses a loop with a control flow condition based on a value that is updated within the body of the loop.

Variant CWE-1096

Singleton Class Instance Creation without Proper Locking or Synchronization

The product implements a Singleton design pattern but does not use appropriate locking or other synchronization mechanis...

Base CWE-1097

Persistent Storable Data Element without Associated Comparison Control Element

The product uses a storable data element that does not have all of the associated functions or methods that are nec...

Base CWE-1098

Data Element containing Pointer Item without Proper Copy Control Element

The code contains a data element with a pointer that does not have an associated copy or constructor method.

Base CWE-1099

Inconsistent Naming Conventions for Identifiers

The product's code, documentation, or other artifacts do not consistently use the same naming conventions for varia...

Base CWE-1100

Insufficient Isolation of System-Dependent Functions

The product or code does not isolate system-dependent functionality into separate standalone modules.

Base CWE-1101

Reliance on Runtime Component in Generated Code

The product uses automatically-generated code that cannot be executed without a specific runtime support component.

Base CWE-1102

Reliance on Machine-Dependent Data Representation

The code uses a data representation that relies on low-level data representation or constructs that may vary across...

1 CVEs
Base CWE-1103

Use of Platform-Dependent Third Party Components

The product relies on third-party components that do not provide equivalent functionality across all desirable ...

Base CWE-1104

Use of Unmaintained Third Party Components

The product relies on third-party components that are not actively supported or maintained by the original develope...

2 CVEs
Base CWE-1105

Insufficient Encapsulation of Machine-Dependent Functionality

The product or code uses machine-dependent functionality, but it does not sufficiently encapsulate or isolate this ...

Base CWE-1106

Insufficient Use of Symbolic Constants

The source code uses literal constants that may need to change or evolve over time, instead of using symbolic const...

Base CWE-1107

Insufficient Isolation of Symbolic Constant Definitions

The source code uses symbolic constants, but it does not sufficiently place the definitions of these constants into...

Base CWE-1108

Excessive Reliance on Global Variables

The code is structured in a way that relies too much on using or setting global variables throughout various points...

Base CWE-1109

Use of Same Variable for Multiple Purposes

The code contains a callable, block, or other code element in which the same variable is used to control more than ...

1 CVEs
Base CWE-1110

Incomplete Design Documentation

The product's design documentation does not adequately describe control flow, data flow, system initialization, rel...

Base CWE-1111

Incomplete I/O Documentation

The product's documentation does not adequately define inputs, outputs, or system/software interfaces.

Base CWE-1112

Incomplete Documentation of Program Execution

The document does not fully define all mechanisms that are used to control or influence how product-specific progra...

Base CWE-1113

Inappropriate Comment Style

The source code uses comment styles or formats that are inconsistent or do not follow expected standards for the ...

Base CWE-1114

Inappropriate Whitespace Style

The source code contains whitespace that is inconsistent across the code or does not follow expected standards for ...

1 CVEs
Base CWE-1115

Source Code Element without Standard Prologue

The source code contains elements such as source files that do not consistently provide a prologue or header that ...

Base CWE-1116

Inaccurate Source Code Comments

The source code contains comments that do not accurately describe or explain aspects of the portion of the code wit...

1 mitigations
Base CWE-1117

Callable with Insufficient Behavioral Summary

The code contains a function or method whose signature and/or associated inline documentation does not sufficiently...

Base CWE-1118

Insufficient Documentation of Error Handling Techniques

The documentation does not sufficiently describe the techniques that are used for error handling, exception process...

Base CWE-1119

Excessive Use of Unconditional Branching

The code uses too many unconditional branches (such as "goto").

Class CWE-1120

Excessive Code Complexity

The code is too complex, as calculated using a well-defined, quantitative measure.

Base CWE-1121

Excessive McCabe Cyclomatic Complexity

The code contains McCabe cyclomatic complexity that exceeds a desirable maximum.

Base CWE-1122

Excessive Halstead Complexity

The code is structured in a way that a Halstead complexity measure exceeds a desirable maximum.

Base CWE-1123

Excessive Use of Self-Modifying Code

The product uses too much self-modifying code.

Base CWE-1124

Excessively Deep Nesting

The code contains a callable or other code grouping in which the nesting / branching is too deep.

Base CWE-1125

Excessive Attack Surface

The product has an attack surface whose quantitative measurement exceeds a desirable maximum.

Base CWE-1126

Declaration of Variable with Unnecessarily Wide Scope

The source code declares a variable in one scope, but the variable is only used within a narrower scope.

Base CWE-1127

Compilation with Insufficient Warnings or Errors

The code is compiled without sufficient warnings enabled, which may prevent the detection of subtle bugs or quality...

Class CWE-1164

Irrelevant Code

The product contains code that is not essential for execution, i.e. makes no state changes and has no side effects...

1 CVEs
Base CWE-1173

Improper Use of Validation Framework

The product does not use, or incorrectly uses, an input validation framework that is provided by the source language or ...

1 mitigations
Variant CWE-1174

ASP.NET Misconfiguration: Improper Model Validation

The ASP.NET application does not use, or incorrectly uses, the model validation framework.

Class CWE-1176

Inefficient CPU Computation

The product performs CPU computations using algorithms that are not as efficient as they could be for the ...

1 CVEs
Class CWE-1177

Use of Prohibited Code

The product uses a function, library, or third party component that has been explicitly prohibited, whether by the...

2 CVEs 1 mitigations
Base CWE-1188

Initialization of a Resource with an Insecure Default

The product initializes or sets a resource with a default that is intended to be changed by the product's installer, adm...

2 CVEs
Base CWE-1189

Improper Isolation of Shared Resources on System-on-a-Chip (SoC)

The System-On-a-Chip (SoC) does not properly isolate shared resources between trusted and untrusted agents.

2 CVEs 1 mitigations
Base CWE-1190

DMA Device Enabled Too Early in Boot Phase

The product enables a Direct Memory Access (DMA) capable device before the security configuration settings are establish...

1 mitigations
Base CWE-1191

On-Chip Debug and Test Interface With Improper Access Control

The chip does not implement or does not correctly perform access control to check whether users are authorized to access...

1 CVEs 1 mitigations
Base CWE-1192

Improper Identifier for IP Block used in System-On-Chip (SOC)

The System-on-Chip (SoC) does not have unique, immutable identifiers for each of its components.

1 mitigations
Base CWE-1193

Power-On of Untrusted Execution Core Before Enabling Fabric Access Control

The product enables components that contain untrusted firmware before memory and fabric access controls have been enable...

1 mitigations
Base CWE-1204

Generation of Weak Initialization Vector (IV)

The product uses a cryptographic primitive that uses an Initialization Vector (IV), but the product does not generate...

11 CVEs 1 mitigations
Base CWE-1209

Failure to Disable Reserved Bits

The reserved bits in a hardware design are not disabled prior to production. Typically, reserved bits are used for futur...

2 mitigations
Base CWE-1220

Insufficient Granularity of Access Control

The product implements access controls via a policy or other feature with the intention to disable or restrict accesses ...

2 CVEs 1 mitigations
Base CWE-1221

Incorrect Register Defaults or Module Parameters

Hardware description language code incorrectly defines register defaults or hardware Intellectual Property (IP) paramete...

2 mitigations
Variant CWE-1222

Insufficient Granularity of Address Regions Protected by Register Locks

The product defines a large address region protected from modification by the same register lock control bit. This resul...

1 mitigations
Base CWE-1223

Race Condition for Write-Once Attributes

A write-once register in hardware design is programmable by an untrusted software component earlier than the trusted sof...

1 mitigations
Base CWE-1224

Improper Restriction of Write-Once Bit Fields

The hardware design control register "sticky bits" or write-once bit fields are improperly implemented, such that they c...

1 mitigations
Class CWE-1229

Creation of Emergent Resource

The product manages resources or behaves in a way that indirectly creates a new, distinct resource that can be used by a...

Base CWE-1230

Exposure of Sensitive Information Through Metadata

The product prevents direct access to a resource containing sensitive information, but it does not sufficiently limit ac...

Base CWE-1231

Improper Prevention of Lock Bit Modification

The product uses a trusted lock bit for restricting access to registers, address regions, or other resources, but the pr...

1 CVEs 1 mitigations
Base CWE-1232

Improper Lock Behavior After Power State Transition

Register lock bit protection disables changes to system configuration once the bit is set. Some of the protected registe...

1 mitigations
Base CWE-1233

Security-Sensitive Hardware Controls with Missing Lock Bit Protection

The product uses a register lock bit protection mechanism, but it does not ensure that the lock bit prevents modificatio...

2 CVEs 1 mitigations
Base CWE-1234

Hardware Internal or Debug Modes Allow Override of Locks

System configuration protection may be bypassed during debug mode.

1 mitigations
Base CWE-1235

Incorrect Use of Autoboxing and Unboxing for Performance Critical Operations

The code uses boxed primitives, which may introduce inefficiencies into performance-critical operations.

1 mitigations
Base CWE-1236

Improper Neutralization of Formula Elements in a CSV File

The product saves user-provided information into a Comma-Separated Value (CSV) file, but it does not neutralize or incor...

3 CVEs 3 mitigations
Variant CWE-1239

Improper Zeroization of Hardware Register

The hardware product does not properly clear sensitive information from built-in registers when the user of the hardware...

1 mitigations
Base CWE-1240

Use of a Cryptographic Primitive with a Risky Implementation

To fulfill the need for a cryptographic primitive, the product implements a cryptographic algorithm using a non-standard...

12 CVEs 11 mitigations
Base CWE-1241

Use of Predictable Algorithm in Random Number Generator

The device uses an algorithm that is predictable and generates a pseudo-random number.

1 CVEs 2 mitigations
Base CWE-1242

Inclusion of Undocumented Features or Chicken Bits

The device includes chicken bits or undocumented features that can create entry points for unauthorized actors.

1 mitigations
Base CWE-1243

Sensitive Non-Volatile Information Not Protected During Debug

Access to security-sensitive information stored in fuses is not limited during debug.

1 mitigations
Base CWE-1244

Internal Asset Exposed to Unsafe Debug Access Level or State

The product uses physical debug or test interfaces with support for multiple access levels, but it assig...

1 CVEs 3 mitigations
Base CWE-1245

Improper Finite State Machines (FSMs) in Hardware Logic

Faulty finite state machines (FSMs) in the hardware logic allow an attacker to put the system in an undefined state, to ...

1 mitigations
Base CWE-1246

Improper Write Handling in Limited-write Non-Volatile Memories

The product does not implement or incorrectly implements wear leveling operations in limited-write non-volatile memories...

1 mitigations
Base CWE-1247

Improper Protection Against Voltage and Clock Glitches

The device does not contain or contains incorrectly implemented circuitry or sensors to detect and mitigate voltage and ...

2 CVEs 1 mitigations
Base CWE-1248

Semiconductor Defects in Hardware Logic with Security-Sensitive Implications

The security-sensitive hardware module contains semiconductor defects.

2 mitigations
Base CWE-1249

Application-Level Admin Tool with Inconsistent View of Underlying Operating System

The product provides an application for administrators to manage parts of the underlying operating system, but the appli...

1 mitigations
Base CWE-1250

Improper Preservation of Consistency Between Independent Representations of Shared State

The product has or supports multiple distributed components or sub-systems that are each required to keep their own loca...

Base CWE-1251

Mirrored Regions with Different Values

The product's architecture mirrors regions without ensuring that their contents always stay in sync.

1 mitigations
Base CWE-1252

CPU Hardware Not Configured to Support Exclusivity of Write and Execute Operations

The CPU is not configured to provide hardware support for exclusivity of write and execute operations on memory. This al...

2 mitigations
Base CWE-1253

Incorrect Selection of Fuse Values

The logic level used to set a system to a secure state relies on a fuse being unblown.

1 mitigations
Base CWE-1254

Incorrect Comparison Logic Granularity

The product's comparison logic is performed over a series of steps rather than across the entire string in one operation...

3 CVEs 1 mitigations
Variant CWE-1255

Comparison Logic is Vulnerable to Power Side-Channel Attacks

A device's real time power consumption may be monitored during security token evaluation and the information gleaned may...

1 CVEs 5 mitigations
Base CWE-1256

Improper Restriction of Software Interfaces to Hardware Features

The product provides software-controllable device functionality for capabilities such as power and clock managemen...

5 CVEs 1 mitigations
Base CWE-1257

Improper Access Control Applied to Mirrored or Aliased Memory Regions

Aliased or mirrored memory regions in hardware designs may have inconsistent read/write permissions enforced by the hard...

2 mitigations
Base CWE-1258

Exposure of Sensitive System Information Due to Uncleared Debug Information

The hardware does not fully clear security-sensitive values, such as keys and intermediate values in cryptographic opera...

2 CVEs 1 mitigations
Base CWE-1259

Improper Restriction of Security Token Assignment

The System-On-A-Chip (SoC) implements a Security Token mechanism to differentiate what actions are allowed or disallowed...

1 mitigations
Base CWE-1260

Improper Handling of Overlap Between Protected Memory Ranges

The product allows address regions to overlap, which can result in the bypassing of intended memory protection.

2 CVEs 2 mitigations
Base CWE-1261

Improper Handling of Single Event Upsets

The hardware logic does not effectively handle when single-event upsets (SEUs) occur.

2 mitigations
Base CWE-1262

Improper Access Control for Register Interface

The product uses memory-mapped I/O registers that act as an interface to hardware functionality from software, but there...

4 CVEs 2 mitigations
Class CWE-1263

Improper Physical Access Control

The product is designed with access restricted to certain information, but it does not sufficiently protect against an u...

3 mitigations
Base CWE-1264

Hardware Logic with Insecure De-Synchronization between Control and Data Channels

The hardware logic for error handling and security checks can incorrectly forward data before the security check is comp...

1 CVEs 1 mitigations
Base CWE-1265

Unintended Reentrant Invocation of Non-reentrant Code Via Nested Calls

The product invokes code that is believed to be reentrant, but the code performs a call that unintentionally produces a ...

2 CVEs 2 mitigations
Base CWE-1266

Improper Scrubbing of Sensitive Data from Decommissioned Device

The product does not properly provide a capability for the product administrator to remove sensitive data at the time th...

3 mitigations
Base CWE-1267

Policy Uses Obsolete Encoding

The product uses an obsolete encoding mechanism to implement access controls.

1 mitigations
Base CWE-1268

Policy Privileges are not Assigned Consistently Between Control and Data Agents

The product's hardware-enforced access control for a particular resource improperly accounts for privilege discrepancies...

1 mitigations
Base CWE-1269

Product Released in Non-Release Configuration

The product released to market is released in pre-production or manufacturing configuration.

2 CVEs 3 mitigations
Base CWE-1270

Generation of Incorrect Security Tokens

The product implements a Security Token mechanism to differentiate what actions are allowed or disallowed when a transac...

1 mitigations
Base CWE-1271

Uninitialized Value on Reset for Registers Holding Security Settings

Security-critical logic is not set to a known value on reset.

2 mitigations
Base CWE-1272

Sensitive Information Uncleared Before Debug/Power State Transition

The product performs a power or debug state transition, but it does not clear sensitive information that should no longe...

1 CVEs 1 mitigations
Base CWE-1273

Device Unlock Credential Sharing

The credentials necessary for unlocking a device are shared across multiple parties and may expose sensitive information...

2 mitigations
Base CWE-1274

Improper Access Control for Volatile Memory Containing Boot Code

The product conducts a secure-boot process that transfers bootloader code from Non-Volatile Memory (NVM) into Volatile M...

1 CVEs 2 mitigations
Variant CWE-1275

Sensitive Cookie with Improper SameSite Attribute

The SameSite attribute for sensitive cookies is not set, or an insecure value is used.

1 CVEs 1 mitigations
Base CWE-1276

Hardware Child Block Incorrectly Connected to Parent System

Signals between a hardware IP and the parent system design are incorrectly connected causing security risks.

1 mitigations
Base CWE-1277

Firmware Not Updateable

The product does not provide its users with the ability to update or patch its firmware to address any vulnerabili...

2 CVEs 3 mitigations
Base CWE-1278

Missing Protection Against Hardware Reverse Engineering Using Integrated Circuit (IC) Imaging Techniques

Information stored in hardware may be recovered by an attacker with the capability to capture and analyze images of the ...

1 mitigations
Base CWE-1279

Cryptographic Operations are run Before Supporting Units are Ready

Performing cryptographic operations without ensuring that the supporting inputs are ready to supply valid data may compr...

2 mitigations
Base CWE-1280

Access Control Check Implemented After Asset is Accessed

A product's hardware-based access control check occurs after the asset has been accessed.

1 mitigations
Base CWE-1281

Sequence of Processor Instructions Leads to Unexpected Behavior

Specific combinations of processor instructions lead to undesirable behavior such as locking the processor until a hard ...

2 CVEs 2 mitigations
Base CWE-1282

Assumed-Immutable Data is Stored in Writable Memory

Immutable data, such as a first-stage bootloader, device identifiers, and "write-once" configuration settings are stored...

1 mitigations
Base CWE-1283

Mutable Attestation or Measurement Reporting Data

The register contents used for attestation or measurement reporting data to verify boot flow are modifiable by an advers...

1 mitigations
Base CWE-1284

Improper Validation of Specified Quantity in Input

The product receives input that is expected to specify a quantity (such as size or length), but it does not validate or ...

5 CVEs 1 mitigations
Base CWE-1285

Improper Validation of Specified Index, Position, or Offset in Input

The product receives input that is expected to specify an index, position, or offset into an indexable resource such as ...

2 CVEs 1 mitigations
Base CWE-1286

Improper Validation of Syntactic Correctness of Input

The product receives input that is expected to be well-formed - i.e., to comply with a certain syntax - but it does not ...

2 CVEs 1 mitigations
Base CWE-1287

Improper Validation of Specified Type of Input

The product receives input that is expected to be of a certain type, but it does not validate or incorrectly validates t...

2 CVEs 1 mitigations
Base CWE-1288

Improper Validation of Consistency within Input

The product receives a complex input with multiple elements or fields that must be consistent with each other, but it do...

3 CVEs 1 mitigations
Base CWE-1289

Improper Validation of Unsafe Equivalence in Input

The product receives an input value that is used as a resource identifier or other type of reference, but it does not va...

5 CVEs 1 mitigations
Base CWE-1290

Incorrect Decoding of Security Identifiers

The product implements a decoding mechanism to decode certain bus-transaction signals to security identifiers. If the de...

2 mitigations
Base CWE-1291

Public Key Re-Use for Signing both Debug and Production Code

The same public key is used for signing both debug and production code.

1 mitigations
Base CWE-1292

Incorrect Conversion of Security Identifiers

The product implements a conversion mechanism to map certain bus-transaction signals to security identifiers. However, i...

2 mitigations
Base CWE-1293

Missing Source Correlation of Multiple Independent Data

The product relies on one source of data, preventing the ability to detect if an adversary has compromised a data source...

2 mitigations
Class CWE-1294

Insecure Security Identifier Mechanism

The System-on-Chip (SoC) implements a Security Identifier mechanism to differentiate what actions are allowed or disallo...

2 mitigations
Base CWE-1295

Debug Messages Revealing Unnecessary Information

The product fails to adequately prevent the revealing of unnecessary and potentially sensitive system information within...

4 CVEs 1 mitigations
Base CWE-1296

Incorrect Chaining or Granularity of Debug Components

The product's debug components contain incorrect chaining or granularity of debug components.

2 CVEs 1 mitigations
Base CWE-1297

Unprotected Confidential Information on Device is Accessible by OSAT Vendors

The product does not adequately protect confidential information on the device from being accessed by Outsourced Semicon...

1 mitigations
Base CWE-1298

Hardware Logic Contains Race Conditions

A race condition in the hardware logic results in undermining security guarantees of the system.

2 mitigations
Base CWE-1299

Missing Protection Mechanism for Alternate Hardware Interface

The lack of protections on alternate paths to access control-protected assets (such as unprotected shado...

5 CVEs 3 mitigations
Base CWE-1300

Improper Protection of Physical Side Channels

The device does not contain sufficient protection mechanisms to prevent physical side channels from exposing sensitive...

7 CVEs 2 mitigations
Base CWE-1301

Insufficient or Incomplete Data Removal within Hardware Component

The product's data removal process does not completely delete all data and potentially sensitive information within hard...

1 CVEs 2 mitigations
Base CWE-1302

Missing Source Identifier in Entity Transactions on a System-On-Chip (SOC)

The product implements a security identifier mechanism to differentiate what actions are allowed or disallowed when a tr...

2 mitigations
Base CWE-1303

Non-Transparent Sharing of Microarchitectural Resources

Hardware structures shared across execution contexts (e.g., caches and branch predictors) can violate the expected archi...

2 mitigations
Base CWE-1304

Improperly Preserved Integrity of Hardware Configuration State During a Power Save/Restore Operation

The product performs a power save/restore operation, but it does not ensure that the integrity of ...

3 mitigations
Base CWE-1310

Missing Ability to Patch ROM Code

Missing an ability to patch ROM code may leave a System or System-on-Chip (SoC) in a vulnerable state.

2 mitigations
Base CWE-1311

Improper Translation of Security Attributes by Fabric Bridge

The bridge incorrectly translates security attributes from either trusted to untrusted or from untrusted to trusted when...

2 mitigations
Base CWE-1312

Missing Protection for Mirrored Regions in On-Chip Fabric Firewall

The firewall in an on-chip fabric protects the main addressed region, but it does not protect any mirrored memory or mem...

2 mitigations
Base CWE-1313

Hardware Allows Activation of Test or Debug Logic at Runtime

During runtime, the hardware allows for test or debug logic (feature) to be activated, which allows for changing the sta...

2 CVEs 3 mitigations
Base CWE-1314

Missing Write Protection for Parametric Data Values

The device does not write-protect the parametric data values for sensors that scale the sensor value, allowing untrusted...

1 CVEs 1 mitigations
Base CWE-1315

Improper Setting of Bus Controlling Capability in Fabric End-point

The bus controller enables bits in the fabric end-point to allow responder devices to control transactions on the fabric...

3 mitigations
Base CWE-1316

Fabric-Address Map Allows Programming of Unwarranted Overlaps of Protected and Unprotected Ranges

The address map of the on-chip fabric has protected and unprotected regions overlapping, allowing an attacker to bypass ...

1 CVEs 3 mitigations
Base CWE-1317

Improper Access Control in Fabric Bridge

The product uses a fabric bridge for transactions between two Intellectual Property (IP) blocks, but the bridge does not...

1 CVEs 2 mitigations
Base CWE-1318

Missing Support for Security Features in On-chip Fabrics or Buses

On-chip fabrics or buses either do not support or are not configured to support privilege separation or other security f...

1 mitigations
Base CWE-1319

Improper Protection against Electromagnetic Fault Injection (EM-FI)

The device is susceptible to electromagnetic fault injection attacks, causing device internal information to be compromi...

1 CVEs 1 mitigations
Base CWE-1320

Improper Protection for Outbound Error Messages and Alert Signals

Untrusted agents can disable alerts about signal conditions exceeding limits or the response mechanism that handles such...

1 mitigations
Variant CWE-1321

Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

The product receives input from an upstream component that specifies attributes that are to be initialized or updated in...

4 CVEs 5 mitigations
Base CWE-1322

Use of Blocking Code in Single-threaded, Non-blocking Context

The product uses a non-blocking model that relies on a single threaded process for features such as scalability, but ...

2 mitigations
Base CWE-1323

Improper Management of Sensitive Trace Data

Trace data collected from several sources on the System-on-Chip (SoC) is stored in unprotected locations...

1 mitigations
Base CWE-1325

Improperly Controlled Sequential Memory Allocation

The product manages a group of objects or resources and performs a separate memory allocation for each object, but it do...

3 CVEs 2 mitigations
Base CWE-1326

Missing Immutable Root of Trust in Hardware

A missing immutable root of trust in the hardware results in the ability to bypass secure boot or execute untrusted or a...

2 mitigations
Base CWE-1327

Binding to an Unrestricted IP Address

The product assigns the address 0.0.0.0 for a database server, a cloud service/instance, or any computing resource that ...

2 CVEs 2 mitigations
Base CWE-1328

Security Version Number Mutable to Older Versions

Security-version number in hardware is mutable, resulting in the ability to downgrade (roll-back) the boot firmware to v...

2 mitigations
Base CWE-1329

Reliance on Component That is Not Updateable

The product contains a component that cannot be updated or patched in order to remove vulnerabilities or significant bug...

2 CVEs 4 mitigations
Variant CWE-1330

Remanent Data Readable after Memory Erase

Confidential information stored in memory circuits is readable or recoverable after being cleared or erased.

1 CVEs 1 mitigations
Base CWE-1331

Improper Isolation of Shared Resources in Network On Chip (NoC)

The Network On Chip (NoC) does not isolate or incorrectly isolates its on-chip-fabric and internal resources such that t...

1 CVEs 1 mitigations
Base CWE-1332

Improper Handling of Faults that Lead to Instruction Skips

The device is missing or incorrectly implements circuitry or sensors that detect and mitigate the skipping of security-c...

1 CVEs 6 mitigations
Base CWE-1333

Inefficient Regular Expression Complexity

The product uses a regular expression with a worst-case computational complexity that is inefficient and possibly expone...

8 CVEs 4 mitigations
Base CWE-1334

Unauthorized Error Injection Can Degrade Hardware Redundancy

An unauthorized agent can inject errors into a redundant block to deprive the system of redundancy or put the system in ...

3 mitigations
Base CWE-1335

Incorrect Bitwise Shift of Integer

An integer value is specified to be shifted by a negative amount or an amount greater than or equal to the number of bit...

9 CVEs 1 mitigations
Base CWE-1336

Improper Neutralization of Special Elements Used in a Template Engine

The product uses a template engine to insert or process externally-influenced input, but it does not neutralize or incor...

10 CVEs 2 mitigations
Base CWE-1338

Improper Protections Against Hardware Overheating

A hardware device is missing or has inadequate protection features to prevent overheating.

2 mitigations
Base CWE-1339

Insufficient Precision or Accuracy of a Real Number

The product processes a real number with an implementation in which the number's representation does not preserve requir...

5 CVEs 1 mitigations
Base CWE-1341

Multiple Releases of Same Resource or Handle

The product attempts to close or release a resource or handle more than once, without any successful open between the cl...

3 CVEs 3 mitigations
Base CWE-1342

Information Exposure through Microarchitectural State after Transient Execution

The processor does not properly clear microarchitectural state after incorrect microcode assists or speculative executio...

1 CVEs 2 mitigations
Base CWE-1351

Improper Handling of Hardware Behavior in Exceptionally Cold Environments

A hardware device, or the firmware running on it, is missing or has incorrect protection features to mai...

1 mitigations
Class CWE-1357

Reliance on Insufficiently Trustworthy Component

The product is built from multiple separate components, but it uses a component that is not sufficiently trusted to meet...

1 CVEs 3 mitigations
Class CWE-1384

Improper Handling of Physical or Environmental Conditions

The product does not properly handle unexpected physical or environmental conditions that occur naturally or are artific...

1 CVEs 3 mitigations
Variant CWE-1385

Missing Origin Validation in WebSockets

The product uses a WebSocket, but it does not properly verify that the source of data or communication is valid.

5 CVEs 7 mitigations
Base CWE-1386

Insecure Operation on Windows Junction / Mount Point

The product opens a file or directory, but it does not properly prevent the name from being associated with a junction o...

4 CVEs 1 mitigations
Base CWE-1389

Incorrect Parsing of Numbers with Different Radices

The product parses numeric input assuming base 10 (decimal) values, but it does not account for inputs that use a differ...

7 CVEs 3 mitigations
Class CWE-1390

Weak Authentication

The product uses an authentication mechanism to restrict access to specific users or identities, but the mechanism does ...

7 CVEs
Class CWE-1391

Use of Weak Credentials

The product uses weak credentials (such as a default key or hard-coded password) that can be calculated, derived, reused...

15 CVEs 1 mitigations
Base CWE-1392

Use of Default Credentials

The product uses default credentials (such as passwords or cryptographic keys) for potentially critical functionality.

5 CVEs 3 mitigations
Base CWE-1393

Use of Default Password

The product uses default passwords for potentially critical functionality.

8 CVEs 4 mitigations
Base CWE-1394

Use of Default Cryptographic Key

The product uses a default cryptographic key for potentially critical functionality.

3 CVEs 3 mitigations
Class CWE-1395

Dependency on Vulnerable Third-Party Component

The product has a dependency on a third-party component that contains one or more known vulnerabilities.

1 CVEs 5 mitigations
Class CWE-1419

Incorrect Initialization of Resource

The product attempts to initialize a resource but does not correctly do so, which might leave the resource in an unexpec...

5 CVEs 4 mitigations
Base CWE-1420

Exposure of Sensitive Information during Transient Execution

A processor event or prediction may allow incorrect operations (or correct operations with incorrect data) to execute tr...

3 CVEs 11 mitigations
Base CWE-1421

Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution

A processor event may allow transient operations to access architecturally restricted data (for example, in another a...

3 CVEs 13 mitigations
Base CWE-1422

Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution

A processor event or prediction may allow incorrect or stale data to be forwarded to transient operations, potential...

2 CVEs 10 mitigations
Base CWE-1423

Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution

Shared microarchitectural predictor state may allow code to influence transient execution across a hardware boundary...

3 CVEs 11 mitigations
Base CWE-1426

Improper Validation of Generative AI Output

The product invokes a generative AI/ML component whose behaviors and outputs cannot be directly controlled, but th...

1 CVEs 4 mitigations
Base CWE-1427

Improper Neutralization of Input Used for LLM Prompting

The product uses externally-provided data to build prompts provided to large language models (LLMs), but the way these p...

4 CVEs 6 mitigations
Base CWE-1428

Reliance on HTTP instead of HTTPS

The product provides or relies on use of HTTP communications when HTTPS is available.

4 mitigations
Base CWE-1429

Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface

The product has a hardware interface that silently discards operations in situations for which feedback would be secu...

1 CVEs 2 mitigations
Base CWE-1431

Driving Intermediate Cryptographic State/Results to Hardware Module Outputs

The product uses a hardware module implementing a cryptographic algorithm that writes sensitive information about th...

2 mitigations
Base CWE-1434

Insecure Setting of Generative AI/ML Model Inference Parameters

The product has a component that relies on a generative AI/ML model configured with inference parameters that prod...

3 mitigations