All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-415: Double Free
Learn about CWE-415 (Double Free), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-416: Use After Free
Learn about CWE-416 (Use After Free), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-419: Unprotected Primary Channel
Learn about CWE-419 (Unprotected Primary Channel), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-42: Path Equivalence: 'filename.' (Trailing Dot)
Learn about CWE-42 (Path Equivalence: 'filename.' (Trailing Dot)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-420: Unprotected Alternate Channel
Learn about CWE-420 (Unprotected Alternate Channel), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-421: Race Condition During Access to Alternate Channel
Learn about CWE-421 (Race Condition During Access to Alternate Channel), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-422: Unprotected Windows Messaging Channel ('Shatter')
Learn about CWE-422 (Unprotected Windows Messaging Channel ('Shatter')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-423: DEPRECATED: Proxied Trusted Channel
Learn about CWE-423 (DEPRECATED: Proxied Trusted Channel), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-424: Improper Protection of Alternate Path
Learn about CWE-424 (Improper Protection of Alternate Path), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-425: Direct Request ('Forced Browsing')
Learn about CWE-425 (Direct Request ('Forced Browsing')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-426: Untrusted Search Path
Learn about CWE-426 (Untrusted Search Path), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified