the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
356 Product UI does not Warn User of Unsafe Actions
357 Insufficient UI Warning of Dangerous Operations
359 Privacy Violation
36 Absolute Path Traversal
360 Trust of System Event Data
363 Race Condition Enabling Link Following
364 Signal Handler Race Condition
365 Race Condition in Switch
366 Race Condition within a Thread
367 Time-of-check Time-of-use (TOCTOU) Race Condition
368 Context Switching Race Condition
37 Path Traversal: '/absolute/pathname/here'
370 Missing Check for Certificate Revocation after Initial Check
372 Incomplete Internal State Distinction
373 State Synchronization Error
374 Mutable Objects Passed by Reference
375 Passing Mutable Objects to an Untrusted Method
377 Insecure Temporary File
378 Creation of Temporary File With Insecure Permissions
379 Creation of Temporary File in Directory with Incorrect Permissions
38 Path Traversal: '\absolute\pathname\here'
382 J2EE Bad Practices: Use of System.exit()
383 J2EE Bad Practices: Direct Use of Threads
385 Covert Timing Channel
386 Symbolic Name not Mapping to Correct Object
39 Path Traversal: 'C:dirname'
390 Detection of Error Condition Without Action
391 Unchecked Error Condition
392 Failure to Report Error in Status Code
393 Return of Wrong Status Code
394 Unexpected Status Code or Return Value
395 Use of NullPointerException Catch to Detect NULL Pointer Dereference
396 Declaration of Catch for Generic Exception
397 Declaration of Throws for Generic Exception
398 Indicator of Poor Code Quality
40 Path Traversal: '\\UNC\share\name\' (Windows UNC Share)
401 Failure to Release Memory Before Removing Last Reference ('Memory Leak')
402 Transmission of Private Resources into a New Sphere ('Resource Leak')
403 UNIX File Descriptor Leak
405 Asymmetric Resource Consumption (Amplification)
406 Insufficient Control of Network Message Volume (Network Amplification)
408 Incorrect Behavior Order: Early Amplification
409 Improper Handling of Highly Compressed Data (Data Amplification)
41 Improper Resolution of Path Equivalence
410 Insufficient Resource Pool
412 Unrestricted Externally Accessible Lock
413 Insufficient Resource Locking
414 Missing Lock Check
419 Unprotected Primary Channel
42 Path Equivalence: 'filename.' (Trailing Dot)
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 7 (This Page)8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.