CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

CWE Definitions

Select   Select&Copy
CWE Number Name Number Of Related Vulnerabilities
419 Unprotected Primary Channel
420 Unprotected Alternate Channel
421 Race Condition During Access to Alternate Channel
422 Unprotected Windows Messaging Channel ('Shatter')
423 DEPRECATED (Duplicate): Proxied Trusted Channel
43 Path Equivalence: 'filename....' (Multiple Trailing Dot)
430 Deployment of Wrong Handler
431 Missing Handler
432 Dangerous Handler not Disabled During Sensitive Operations
433 Unparsed Raw Web Content Delivery
437 Incomplete Model of Endpoint Features
439 Behavioral Change in New Version or Environment
44 Path Equivalence: 'file.name' (Internal Dot)
443 DEPRECATED (Duplicate): HTTP response splitting
446 UI Discrepancy for Security Feature
447 Unimplemented or Unsupported Feature in UI
448 Obsolete Feature in UI
449 The UI Performs the Wrong Action
45 Path Equivalence: 'file...name' (Multiple Internal Dot)
450 Multiple Interpretations of UI Input
454 External Initialization of Trusted Variables or Data Stores
458 DEPRECATED: Incorrect Initialization
46 Path Equivalence: 'filename ' (Trailing Space)
462 Duplicate Key in Associative List (Alist)
463 Deletion of Data Structure Sentinel
464 Addition of Data Structure Sentinel
466 Return of Pointer Value Outside of Expected Range
467 Use of sizeof() on a Pointer Type
468 Incorrect Pointer Scaling
469 Use of Pointer Subtraction to Determine Size
47 Path Equivalence: ' filename (Leading Space)
473 PHP External Variable Modification
474 Use of Function with Inconsistent Implementations
477 Use of Obsolete Functions
478 Missing Default Case in Switch Statement
479 Unsafe Function Call from a Signal Handler
48 Path Equivalence: 'file name' (Internal Whitespace)
480 Use of Incorrect Operator
481 Assigning instead of Comparing
482 Comparing instead of Assigning
483 Incorrect Block Delimitation
484 Omitted Break Statement in Switch
486 Comparison of Classes by Name
487 Reliance on Package-level Scope
488 Data Leak Between Sessions
49 Path Equivalence: 'filename/' (Trailing Slash)
491 Public cloneable() Method Without Final ('Object Hijack')
492 Use of Inner Class Containing Sensitive Data
493 Critical Public Variable Without Final Modifier
495 Private Array-Typed Field Returned From A Public Method
Total number of cwe definitions : 668   Page : 1 2 3 4 5 6 7 8 9 10 (This Page)11 12 13 14
The CWE definitions are only provided as a quick reference.They are not complete and may not be up to date!
You must visit http://cwe.mitre.org/ for a complete list of CWE entries and for more details.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.