All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-440: Expected Behavior Violation
Learn about CWE-440 (Expected Behavior Violation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-441: Unintended Proxy or Intermediary ('Confused Deputy')
Learn about CWE-441 (Unintended Proxy or Intermediary ('Confused Deputy')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-443: DEPRECATED: HTTP response splitting
Learn about CWE-443 (DEPRECATED: HTTP response splitting), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Learn about CWE-444 (Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-446: UI Discrepancy for Security Feature
Learn about CWE-446 (UI Discrepancy for Security Feature), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-447: Unimplemented or Unsupported Feature in UI
Learn about CWE-447 (Unimplemented or Unsupported Feature in UI), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-448: Obsolete Feature in UI
Learn about CWE-448 (Obsolete Feature in UI), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-449: The UI Performs the Wrong Action
Learn about CWE-449 (The UI Performs the Wrong Action), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-45: Path Equivalence: 'file...name' (Multiple Internal Dot)
Learn about CWE-45 (Path Equivalence: 'file...name' (Multiple Internal Dot)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-450: Multiple Interpretations of UI Input
Learn about CWE-450 (Multiple Interpretations of UI Input), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-451: User Interface (UI) Misrepresentation of Critical Information
Learn about CWE-451 (User Interface (UI) Misrepresentation of Critical Information), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-453: Insecure Default Variable Initialization
Learn about CWE-453 (Insecure Default Variable Initialization), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified