All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-122: Heap-based Buffer Overflow
Learn about CWE-122 (Heap-based Buffer Overflow), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1220: Insufficient Granularity of Access Control
Learn about CWE-1220 (Insufficient Granularity of Access Control), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1221: Incorrect Register Defaults or Module Parameters
Learn about CWE-1221 (Incorrect Register Defaults or Module Parameters), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1222: Insufficient Granularity of Address Regions Protected by Register Locks
Learn about CWE-1222 (Insufficient Granularity of Address Regions Protected by Register Locks), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1223: Race Condition for Write-Once Attributes
Learn about CWE-1223 (Race Condition for Write-Once Attributes), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1224: Improper Restriction of Write-Once Bit Fields
Learn about CWE-1224 (Improper Restriction of Write-Once Bit Fields), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1229: Creation of Emergent Resource
Learn about CWE-1229 (Creation of Emergent Resource), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-123: Write-what-where Condition
Learn about CWE-123 (Write-what-where Condition), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1230: Exposure of Sensitive Information Through Metadata
Learn about CWE-1230 (Exposure of Sensitive Information Through Metadata), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1231: Improper Prevention of Lock Bit Modification
Learn about CWE-1231 (Improper Prevention of Lock Bit Modification), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1232: Improper Lock Behavior After Power State Transition
Learn about CWE-1232 (Improper Lock Behavior After Power State Transition), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified