CWE-505 |
DEPRECATED: Intentionally Introduced Weakness |
|
|
CWE-504 |
DEPRECATED: Motivation/Intent |
|
|
CWE-503 |
DEPRECATED: Byte/Object Code |
|
|
CWE-502 |
Deserialization of Untrusted Data |
|
|
CWE-501 |
Trust Boundary Violation |
|
|
CWE-500 |
Public Static Field Not Marked Final |
|
|
CWE-50 |
Path Equivalence: '//multiple/leading/slash' |
|
|
CWE-5 |
J2EE Misconfiguration: Data Transmission Without Encryption |
|
|
CWE-499 |
Serializable Class Containing Sensitive Data |
|
|
CWE-498 |
Cloneable Class Containing Sensitive Information |
|
|
CWE-497 |
Exposure of Sensitive System Information to an Unauthorized Control Sphere |
|
|
CWE-496 |
Public Data Assigned to Private Array-Typed Field |
|
|
CWE-495 |
Private Data Structure Returned From A Public Method |
|
|
CWE-494 |
Download of Code Without Integrity Check |
|
|
CWE-493 |
Critical Public Variable Without Final Modifier |
|
|
CWE-492 |
Use of Inner Class Containing Sensitive Data |
|
|
CWE-491 |
Public cloneable() Method Without Final ('Object Hijack') |
|
|
CWE-490 |
DEPRECATED: Mobile Code Issues |
|
|
CWE-49 |
Path Equivalence: 'filename/' (Trailing Slash) |
|
|
CWE-489 |
Active Debug Code |
|
|