CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
398 Indicator of Poor Code Quality
40 Path Traversal: '\\UNC\share\name\' (Windows UNC Share)
400 Uncontrolled Resource Consumption ('Resource Exhaustion')
401 Failure to Release Memory Before Removing Last Reference ('Memory Leak')
402 Transmission of Private Resources into a New Sphere ('Resource Leak')
403 UNIX File Descriptor Leak
404 Improper Resource Shutdown or Release
405 Asymmetric Resource Consumption (Amplification)
406 Insufficient Control of Network Message Volume (Network Amplification)
407 Algorithmic Complexity
408 Incorrect Behavior Order: Early Amplification
409 Improper Handling of Highly Compressed Data (Data Amplification)
41 Improper Resolution of Path Equivalence
410 Insufficient Resource Pool
412 Unrestricted Externally Accessible Lock
413 Insufficient Resource Locking
414 Missing Lock Check
415 Double Free
419 Unprotected Primary Channel
42 Path Equivalence: 'filename.' (Trailing Dot)
420 Unprotected Alternate Channel
421 Race Condition During Access to Alternate Channel
422 Unprotected Windows Messaging Channel ('Shatter')
423 DEPRECATED (Duplicate): Proxied Trusted Channel
424 Failure to Protect Alternate Path
425 Direct Request ('Forced Browsing')
427 Uncontrolled Search Path Element
428 Unquoted Search Path or Element
43 Path Equivalence: 'filename....' (Multiple Trailing Dot)
430 Deployment of Wrong Handler
431 Missing Handler
432 Dangerous Handler not Disabled During Sensitive Operations
433 Unparsed Raw Web Content Delivery
434 Unrestricted Upload of File with Dangerous Type
435 Interaction Error
436 Interpretation Conflict
437 Incomplete Model of Endpoint Features
439 Behavioral Change in New Version or Environment
44 Path Equivalence: 'file.name' (Internal Dot)
440 Expected Behavior Violation
441 Unintended Proxy/Intermediary
443 DEPRECATED (Duplicate): HTTP response splitting
444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
446 UI Discrepancy for Security Feature
447 Unimplemented or Unsupported Feature in UI
448 Obsolete Feature in UI
449 The UI Performs the Wrong Action
45 Path Equivalence: 'file...name' (Multiple Internal Dot)
450 Multiple Interpretations of UI Input
451 UI Misrepresentation of Critical Information
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 7 (This Page)8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit http://cwe.mitre.org/ for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.