the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
379 Creation of Temporary File in Directory with Incorrect Permissions
38 Path Traversal: '\absolute\pathname\here'
382 J2EE Bad Practices: Use of System.exit()
383 J2EE Bad Practices: Direct Use of Threads
385 Covert Timing Channel
386 Symbolic Name not Mapping to Correct Object
39 Path Traversal: 'C:dirname'
390 Detection of Error Condition Without Action
391 Unchecked Error Condition
392 Failure to Report Error in Status Code
393 Return of Wrong Status Code
394 Unexpected Status Code or Return Value
395 Use of NullPointerException Catch to Detect NULL Pointer Dereference
396 Declaration of Catch for Generic Exception
397 Declaration of Throws for Generic Exception
398 Indicator of Poor Code Quality
40 Path Traversal: '\\UNC\share\name\' (Windows UNC Share)
401 Failure to Release Memory Before Removing Last Reference ('Memory Leak')
402 Transmission of Private Resources into a New Sphere ('Resource Leak')
403 UNIX File Descriptor Leak
404 Improper Resource Shutdown or Release
405 Asymmetric Resource Consumption (Amplification)
406 Insufficient Control of Network Message Volume (Network Amplification)
407 Algorithmic Complexity
408 Incorrect Behavior Order: Early Amplification
409 Improper Handling of Highly Compressed Data (Data Amplification)
41 Improper Resolution of Path Equivalence
410 Insufficient Resource Pool
412 Unrestricted Externally Accessible Lock
413 Insufficient Resource Locking
414 Missing Lock Check
419 Unprotected Primary Channel
42 Path Equivalence: 'filename.' (Trailing Dot)
420 Unprotected Alternate Channel
421 Race Condition During Access to Alternate Channel
422 Unprotected Windows Messaging Channel ('Shatter')
423 DEPRECATED (Duplicate): Proxied Trusted Channel
424 Failure to Protect Alternate Path
425 Direct Request ('Forced Browsing')
43 Path Equivalence: 'filename....' (Multiple Trailing Dot)
430 Deployment of Wrong Handler
431 Missing Handler
432 Dangerous Handler not Disabled During Sensitive Operations
433 Unparsed Raw Web Content Delivery
435 Interaction Error
436 Interpretation Conflict
437 Incomplete Model of Endpoint Features
439 Behavioral Change in New Version or Environment
44 Path Equivalence: '' (Internal Dot)
440 Expected Behavior Violation
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 7 (This Page)8 9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.