CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
434 Unrestricted Upload of File with Dangerous Type
433 Unparsed Raw Web Content Delivery
432 Dangerous Handler not Disabled During Sensitive Operations
431 Missing Handler
430 Deployment of Wrong Handler
43 Path Equivalence: 'filename....' (Multiple Trailing Dot)
428 Unquoted Search Path or Element
427 Uncontrolled Search Path Element
425 Direct Request ('Forced Browsing')
424 Failure to Protect Alternate Path
423 DEPRECATED (Duplicate): Proxied Trusted Channel
422 Unprotected Windows Messaging Channel ('Shatter')
421 Race Condition During Access to Alternate Channel
420 Unprotected Alternate Channel
42 Path Equivalence: 'filename.' (Trailing Dot)
419 Unprotected Primary Channel
416 Use After Free
415 Double Free
414 Missing Lock Check
413 Insufficient Resource Locking
412 Unrestricted Externally Accessible Lock
410 Insufficient Resource Pool
41 Improper Resolution of Path Equivalence
409 Improper Handling of Highly Compressed Data (Data Amplification)
408 Incorrect Behavior Order: Early Amplification
407 Algorithmic Complexity
406 Insufficient Control of Network Message Volume (Network Amplification)
405 Asymmetric Resource Consumption (Amplification)
404 Improper Resource Shutdown or Release
403 UNIX File Descriptor Leak
402 Transmission of Private Resources into a New Sphere ('Resource Leak')
401 Failure to Release Memory Before Removing Last Reference ('Memory Leak')
400 Uncontrolled Resource Consumption ('Resource Exhaustion')
40 Path Traversal: '\\UNC\share\name\' (Windows UNC Share)
398 Indicator of Poor Code Quality
397 Declaration of Throws for Generic Exception
396 Declaration of Catch for Generic Exception
395 Use of NullPointerException Catch to Detect NULL Pointer Dereference
394 Unexpected Status Code or Return Value
393 Return of Wrong Status Code
392 Failure to Report Error in Status Code
391 Unchecked Error Condition
390 Detection of Error Condition Without Action
39 Path Traversal: 'C:dirname'
386 Symbolic Name not Mapping to Correct Object
385 Covert Timing Channel
383 J2EE Bad Practices: Direct Use of Threads
382 J2EE Bad Practices: Use of System.exit()
38 Path Traversal: '\absolute\pathname\here'
379 Creation of Temporary File in Directory with Incorrect Permissions
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 7 8 (This Page)9 10 11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit http://cwe.mitre.org/ for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.