Page(s) : 1 ... 23 24 25 26 27 28 29 30 31 32 [33] 34 35 36 37 38 39 40 41 | Result(s) : 810 |
CWE ID | CWE Name |
---|---|
CWE-641 | Insufficient Filtering of File and Other Resource Names for Executable Content |
CWE-642 | External Control of Critical State Data |
CWE-643 | Failure to Sanitize Data within XPath Expressions ('XPath injection') |
CWE-644 | Improper Sanitization of HTTP Headers for Scripting Syntax |
CWE-645 | Overly Restrictive Account Lockout Mechanism |
CWE-646 | Reliance on File Name or Extension of Externally-Supplied File |
CWE-647 | Use of Non-Canonical URL Paths for Authorization Decisions |
CWE-648 | Incorrect Use of Privileged APIs |
CWE-649 | Reliance on Obfuscation or Encryption of Security-Relevant Inputs without Integrity Checking |
CWE-650 | Trusting HTTP Permission Methods on the Server Side |
CWE-651 | Information Leak through WSDL File |
CWE-652 | Failure to Sanitize Data within XQuery Expressions ('XQuery Injection') |
CWE-653 | Insufficient Compartmentalization |
CWE-654 | Reliance on a Single Factor in a Security Decision |
CWE-655 | Insufficient Psychological Acceptability |
CWE-656 | Reliance on Security through Obscurity |
CWE-657 | Violation of Secure Design Principles |
CWE-658 | Weaknesses in Software Written in C |
CWE-659 | Weaknesses in Software Written in C++ |
CWE-660 | Weaknesses in Software Written in Java |
Page(s) : 1 ... 23 24 25 26 27 28 29 30 31 32 [33] 34 35 36 37 38 39 40 41 | Result(s) : 810 |