All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-374: Passing Mutable Objects to an Untrusted Method
Learn about CWE-374 (Passing Mutable Objects to an Untrusted Method), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-375: Returning a Mutable Object to an Untrusted Caller
Learn about CWE-375 (Returning a Mutable Object to an Untrusted Caller), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-377: Insecure Temporary File
Learn about CWE-377 (Insecure Temporary File), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-378: Creation of Temporary File With Insecure Permissions
Learn about CWE-378 (Creation of Temporary File With Insecure Permissions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-379: Creation of Temporary File in Directory with Insecure Permissions
Learn about CWE-379 (Creation of Temporary File in Directory with Insecure Permissions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-38: Path Traversal: '\absolute\pathname\here'
Learn about CWE-38 (Path Traversal: '\absolute\pathname\here'), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-382: J2EE Bad Practices: Use of System.exit()
Learn about CWE-382 (J2EE Bad Practices: Use of System.exit()), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-383: J2EE Bad Practices: Direct Use of Threads
Learn about CWE-383 (J2EE Bad Practices: Direct Use of Threads), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-384: Session Fixation
Learn about CWE-384 (Session Fixation), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-385: Covert Timing Channel
Learn about CWE-385 (Covert Timing Channel), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-386: Symbolic Name not Mapping to Correct Object
Learn about CWE-386 (Symbolic Name not Mapping to Correct Object), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified