All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-467: Use of sizeof() on a Pointer Type
Learn about CWE-467 (Use of sizeof() on a Pointer Type), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-468: Incorrect Pointer Scaling
Learn about CWE-468 (Incorrect Pointer Scaling), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-469: Use of Pointer Subtraction to Determine Size
Learn about CWE-469 (Use of Pointer Subtraction to Determine Size), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-47: Path Equivalence: ' filename' (Leading Space)
Learn about CWE-47 (Path Equivalence: ' filename' (Leading Space)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')
Learn about CWE-470 (Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-471: Modification of Assumed-Immutable Data (MAID)
Learn about CWE-471 (Modification of Assumed-Immutable Data (MAID)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-472: External Control of Assumed-Immutable Web Parameter
Learn about CWE-472 (External Control of Assumed-Immutable Web Parameter), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-473: PHP External Variable Modification
Learn about CWE-473 (PHP External Variable Modification), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-474: Use of Function with Inconsistent Implementations
Learn about CWE-474 (Use of Function with Inconsistent Implementations), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-475: Undefined Behavior for Input to API
Learn about CWE-475 (Undefined Behavior for Input to API), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-476: NULL Pointer Dereference
Learn about CWE-476 (NULL Pointer Dereference), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified