All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-454: External Initialization of Trusted Variables or Data Stores
Learn about CWE-454 (External Initialization of Trusted Variables or Data Stores), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-455: Non-exit on Failed Initialization
Learn about CWE-455 (Non-exit on Failed Initialization), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-456: Missing Initialization of a Variable
Learn about CWE-456 (Missing Initialization of a Variable), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-457: Use of Uninitialized Variable
Learn about CWE-457 (Use of Uninitialized Variable), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-458: DEPRECATED: Incorrect Initialization
Learn about CWE-458 (DEPRECATED: Incorrect Initialization), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-459: Incomplete Cleanup
Learn about CWE-459 (Incomplete Cleanup), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-46: Path Equivalence: 'filename ' (Trailing Space)
Learn about CWE-46 (Path Equivalence: 'filename ' (Trailing Space)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-460: Improper Cleanup on Thrown Exception
Learn about CWE-460 (Improper Cleanup on Thrown Exception), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-462: Duplicate Key in Associative List (Alist)
Learn about CWE-462 (Duplicate Key in Associative List (Alist)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-463: Deletion of Data Structure Sentinel
Learn about CWE-463 (Deletion of Data Structure Sentinel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-464: Addition of Data Structure Sentinel
Learn about CWE-464 (Addition of Data Structure Sentinel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-466: Return of Pointer Value Outside of Expected Range
Learn about CWE-466 (Return of Pointer Value Outside of Expected Range), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified