CWE検索
Common Weakness Enumeration(CWE)データベースをID・名前・キーワードで検索・閲覧。CVE検索と対になるソフトウェアセキュリティ脆弱性パターン検索ツール
Improper Neutralization of Input During Web Page Generation
Improper Neutralization of Special Elements used in an SQL Command
Improper Neutralization of Special Elements used in an OS Command
Improper Neutralization of Special Elements used in a Command
Improper Control of Generation of Code
Improper Neutralization of Special Elements used in an LDAP Query
Improper Neutralization of Special Elements used in XML
Improper Neutralization of Special Elements used in an Expression Language Statement
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct
The product does not perform any authentication for functionality that requires a provable user identity
The product contains hard-coded credentials for authentication or cryptographic operations
Authenticating a user without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions
The product does not sufficiently expire sessions, allowing attackers to reuse old session credentials
The product does not perform an authorization check when an actor attempts to access a resource or perform an action
The product performs an authorization check when an actor attempts to access a resource but does not correctly perform the check
The product does not properly assign, modify, track, or check privileges for an actor
The system's authorization functionality does not prevent one user from gaining access to another user's data by modifying the key value
The product uses a broken or risky cryptographic algorithm or protocol
The product uses an algorithm that produces a digest that does not meet security expectations
The product uses insufficiently random numbers or values in a security context
The product generates a hash for a password but uses a scheme that does not provide sufficient computational effort
The product does not encrypt sensitive or critical information before storage or transmission
Improper Limitation of a Pathname to a Restricted Directory
The product allows the upload of dangerous file types that can be automatically processed
The product allows user input to control file names or paths used in filesystem operations
The product performs operations on a memory buffer without proper bounds checking
The program copies an input buffer to an output buffer without verifying that the size is within bounds
The product reads data past the end of the intended buffer
Referencing memory after it has been freed can cause a program to crash or execute arbitrary code
A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid but is NULL
The product performs a calculation that can produce an integer overflow or wraparound
The product exposes sensitive information to an actor that is not explicitly authorized to have access
The product generates an error message that includes sensitive information
Information written to log files can be of a sensitive nature and valuable to attackers
The product receives input but does not validate or incorrectly validates that input
The product receives input from an upstream component that specifies attributes that are to be initialized or updated in an object but does not properly control modifications of object prototype attributes
The product does not verify that a request was intentionally made by the user who submitted it
A web application accepts user-controlled input that specifies a link to an external site for redirect
The product makes a request to a user-supplied URL without sufficiently ensuring it is a safe destination
The product does not properly verify that the source of data or communication is valid
The Secure attribute for sensitive cookies is not set, which could cause the user agent to send those cookies in plaintext over HTTP
Weaknesses in this category are typically introduced during the configuration of the software
The product specifies permissions that allow more access than required
The product initializes or sets a resource with a default that is intended to be changed but is not secure
The product deserializes untrusted data without sufficiently verifying that the resulting data is valid
The product contains a code sequence that can run concurrently with other code and requires temporary exclusive access to a shared resource
The product checks the state of a resource before using it but the resource state can change between the check and use
The product does not properly control the allocation and maintenance of a limited resource, allowing resource exhaustion
The product allocates a reusable resource without imposing any limit on the size or number of resources
The product uses a regular expression with an inefficient, possibly exponential worst-case computational complexity that consumes excessive CPU cycles