All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-1327: Binding to an Unrestricted IP Address
Learn about CWE-1327 (Binding to an Unrestricted IP Address), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1328: Security Version Number Mutable to Older Versions
Learn about CWE-1328 (Security Version Number Mutable to Older Versions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1329: Reliance on Component That is Not Updateable
Learn about CWE-1329 (Reliance on Component That is Not Updateable), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1330: Remanent Data Readable after Memory Erase
Learn about CWE-1330 (Remanent Data Readable after Memory Erase), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1331: Improper Isolation of Shared Resources in Network On Chip (NoC)
Learn about CWE-1331 (Improper Isolation of Shared Resources in Network On Chip (NoC)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1332: Improper Handling of Faults that Lead to Instruction Skips
Learn about CWE-1332 (Improper Handling of Faults that Lead to Instruction Skips), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1333: Inefficient Regular Expression Complexity
Learn about CWE-1333 (Inefficient Regular Expression Complexity), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1334: Unauthorized Error Injection Can Degrade Hardware Redundancy
Learn about CWE-1334 (Unauthorized Error Injection Can Degrade Hardware Redundancy), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1335: Incorrect Bitwise Shift of Integer
Learn about CWE-1335 (Incorrect Bitwise Shift of Integer), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine
Learn about CWE-1336 (Improper Neutralization of Special Elements Used in a Template Engine), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1338: Improper Protections Against Hardware Overheating
Learn about CWE-1338 (Improper Protections Against Hardware Overheating), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified