All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-134: Use of Externally-Controlled Format String
Learn about CWE-134 (Use of Externally-Controlled Format String), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1341: Multiple Releases of Same Resource or Handle
Learn about CWE-1341 (Multiple Releases of Same Resource or Handle), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1342: Information Exposure through Microarchitectural State after Transient Execution
Learn about CWE-1342 (Information Exposure through Microarchitectural State after Transient Execution), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-135: Incorrect Calculation of Multi-Byte String Length
Learn about CWE-135 (Incorrect Calculation of Multi-Byte String Length), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1351: Improper Handling of Hardware Behavior in Exceptionally Cold Environments
Learn about CWE-1351 (Improper Handling of Hardware Behavior in Exceptionally Cold Environments), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1357: Reliance on Insufficiently Trustworthy Component
Learn about CWE-1357 (Reliance on Insufficiently Trustworthy Component), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-138: Improper Neutralization of Special Elements
Learn about CWE-138 (Improper Neutralization of Special Elements), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1384: Improper Handling of Physical or Environmental Conditions
Learn about CWE-1384 (Improper Handling of Physical or Environmental Conditions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1385: Missing Origin Validation in WebSockets
Learn about CWE-1385 (Missing Origin Validation in WebSockets), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1386: Insecure Operation on Windows Junction / Mount Point
Learn about CWE-1386 (Insecure Operation on Windows Junction / Mount Point), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1389: Incorrect Parsing of Numbers with Different Radices
Learn about CWE-1389 (Incorrect Parsing of Numbers with Different Radices), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified