All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-609: Double-Checked Locking
Learn about CWE-609 (Double-Checked Locking), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-61: UNIX Symbolic Link (Symlink) Following
Learn about CWE-61 (UNIX Symbolic Link (Symlink) Following), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-610: Externally Controlled Reference to a Resource in Another Sphere
Learn about CWE-610 (Externally Controlled Reference to a Resource in Another Sphere), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-611: Improper Restriction of XML External Entity Reference
Learn about CWE-611 (Improper Restriction of XML External Entity Reference), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-612: Improper Authorization of Index Containing Sensitive Information
Learn about CWE-612 (Improper Authorization of Index Containing Sensitive Information), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-613: Insufficient Session Expiration
Learn about CWE-613 (Insufficient Session Expiration), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-614: Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Learn about CWE-614 (Sensitive Cookie in HTTPS Session Without 'Secure' Attribute), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-615: Inclusion of Sensitive Information in Source Code Comments
Learn about CWE-615 (Inclusion of Sensitive Information in Source Code Comments), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-616: Incomplete Identification of Uploaded File Variables (PHP)
Learn about CWE-616 (Incomplete Identification of Uploaded File Variables (PHP)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-617: Reachable Assertion
Learn about CWE-617 (Reachable Assertion), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-618: Exposed Unsafe ActiveX Method
Learn about CWE-618 (Exposed Unsafe ActiveX Method), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified