All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-122: Heap-based Buffer Overflow
Learn about CWE-122 (Heap-based Buffer Overflow), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1220: Insufficient Granularity of Access Control
Learn about CWE-1220 (Insufficient Granularity of Access Control), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1221: Incorrect Register Defaults or Module Parameters
Learn about CWE-1221 (Incorrect Register Defaults or Module Parameters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1222: Insufficient Granularity of Address Regions Protected by Register Locks
Learn about CWE-1222 (Insufficient Granularity of Address Regions Protected by Register Locks), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1223: Race Condition for Write-Once Attributes
Learn about CWE-1223 (Race Condition for Write-Once Attributes), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1224: Improper Restriction of Write-Once Bit Fields
Learn about CWE-1224 (Improper Restriction of Write-Once Bit Fields), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1229: Creation of Emergent Resource
Learn about CWE-1229 (Creation of Emergent Resource), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-123: Write-what-where Condition
Learn about CWE-123 (Write-what-where Condition), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1230: Exposure of Sensitive Information Through Metadata
Learn about CWE-1230 (Exposure of Sensitive Information Through Metadata), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1231: Improper Prevention of Lock Bit Modification
Learn about CWE-1231 (Improper Prevention of Lock Bit Modification), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1232: Improper Lock Behavior After Power State Transition
Learn about CWE-1232 (Improper Lock Behavior After Power State Transition), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1233: Security-Sensitive Hardware Controls with Missing Lock Bit Protection
Learn about CWE-1233 (Security-Sensitive Hardware Controls with Missing Lock Bit Protection), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified