MITRE Common Weakness Enumeration

CWE catalog

Software weakness types referenced by NVD CVE records. Includes the MITRE Top 25 most dangerous weaknesses and other commonly seen entries.

CWE-787Top 25

Out-of-bounds Write

The product writes data past the end, or before the beginning, of the intended buffer.

CWE-79Top 25

Cross-site Scripting (XSS)

Improper neutralization of input during web page generation lets attackers inject client-side scripts.

CWE-89Top 25

SQL Injection

User-controlled input is concatenated into SQL queries, allowing attackers to alter query semantics.

CWE-416Top 25

Use After Free

Referencing memory after it has been freed can lead to crashes, data corruption, or arbitrary code execution.

CWE-78Top 25

OS Command Injection

User input is incorporated into a command passed to a shell or OS, enabling command execution.

CWE-20Top 25

Improper Input Validation

Input is not validated or is incorrectly validated, leading to unexpected control or data flow.

CWE-125Top 25

Out-of-bounds Read

The product reads data past the end, or before the beginning, of the intended buffer.

CWE-22Top 25

Path Traversal

User input is used to construct a pathname that resolves outside the intended directory.

CWE-352Top 25

Cross-Site Request Forgery (CSRF)

The product does not verify that requests came from the user, allowing forged actions.

CWE-434Top 25

Unrestricted Upload of File with Dangerous Type

Files of dangerous types are uploaded without proper validation, leading to remote execution.

CWE-862Top 25

Missing Authorization

Sensitive functionality lacks authorization checks, letting unauthenticated users perform privileged actions.

CWE-476Top 25

NULL Pointer Dereference

A pointer expected to be valid is NULL when dereferenced, typically causing a crash.

CWE-287Top 25

Improper Authentication

The product does not properly verify the identity of an actor, enabling impersonation.

CWE-190Top 25

Integer Overflow or Wraparound

Arithmetic operations produce a value outside the valid range, leading to incorrect logic.

CWE-502Top 25

Deserialization of Untrusted Data

Untrusted serialized data is deserialized, often leading to remote code execution.

CWE-77Top 25

Command Injection

User input is included in a constructed command, allowing attackers to modify the command.

CWE-119Top 25

Improper Restriction of Operations within the Bounds of a Memory Buffer

Operations on a buffer can read or write outside its bounds.

CWE-798Top 25

Use of Hard-coded Credentials

Hard-coded credentials embedded in code create a backdoor for attackers.

CWE-918Top 25

Server-Side Request Forgery (SSRF)

A server fetches a URL on behalf of a user, allowing access to internal resources.

CWE-306Top 25

Missing Authentication for Critical Function

Critical functions are exposed without requiring authentication.

CWE-362Top 25

Race Condition

Concurrent code paths can interleave in ways that produce incorrect or insecure behavior.

CWE-269Top 25

Improper Privilege Management

Privileges are assigned or maintained incorrectly, enabling privilege escalation.

CWE-94Top 25

Improper Control of Generation of Code (Code Injection)

User-controlled input is interpreted as code, allowing arbitrary code execution.

CWE-863Top 25

Incorrect Authorization

Authorization is performed but does not correctly enforce the intended policy.

CWE-276Top 25

Incorrect Default Permissions

Default file or resource permissions are too permissive, exposing data or capabilities.

CWE-200

Exposure of Sensitive Information

Sensitive information is exposed to an actor not explicitly authorized.

CWE-400

Uncontrolled Resource Consumption (DoS)

The product does not properly restrict resource use, enabling denial of service.

CWE-601

Open Redirect

User input is used to construct a redirect URL, enabling phishing.

CWE-611

XML External Entity (XXE)

An XML parser is configured to resolve external entities, exposing files or SSRF.

CWE-732

Incorrect Permission Assignment for Critical Resource

A critical resource has permissions that allow unintended access.

CWE-377

Insecure Temporary File

A temporary file is created in a way that allows attackers to predict or hijack it.

CWE-311

Missing Encryption of Sensitive Data

Sensitive data is not encrypted at rest or in transit.

CWE-295

Improper Certificate Validation

Certificates are not validated, enabling MITM attacks.

CWE-330

Use of Insufficiently Random Values

Predictable random values are used in security contexts.

CWE-426

Untrusted Search Path

Resources are loaded from a path that an attacker can control.

Feedback

How was this page?

Spotted something off, or have an idea? Let us know.

0/1000