All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-415: Double Free
Learn about CWE-415 (Double Free), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-416: Use After Free
Learn about CWE-416 (Use After Free), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-419: Unprotected Primary Channel
Learn about CWE-419 (Unprotected Primary Channel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-42: Path Equivalence: 'filename.' (Trailing Dot)
Learn about CWE-42 (Path Equivalence: 'filename.' (Trailing Dot)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-420: Unprotected Alternate Channel
Learn about CWE-420 (Unprotected Alternate Channel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-421: Race Condition During Access to Alternate Channel
Learn about CWE-421 (Race Condition During Access to Alternate Channel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-422: Unprotected Windows Messaging Channel ('Shatter')
Learn about CWE-422 (Unprotected Windows Messaging Channel ('Shatter')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-423: DEPRECATED: Proxied Trusted Channel
Learn about CWE-423 (DEPRECATED: Proxied Trusted Channel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-424: Improper Protection of Alternate Path
Learn about CWE-424 (Improper Protection of Alternate Path), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-425: Direct Request ('Forced Browsing')
Learn about CWE-425 (Direct Request ('Forced Browsing')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-426: Untrusted Search Path
Learn about CWE-426 (Untrusted Search Path), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-427: Uncontrolled Search Path Element
Learn about CWE-427 (Uncontrolled Search Path Element), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified