All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-663: Use of a Non-reentrant Function in a Concurrent Context
Learn about CWE-663 (Use of a Non-reentrant Function in a Concurrent Context), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-664: Improper Control of a Resource Through its Lifetime
Learn about CWE-664 (Improper Control of a Resource Through its Lifetime), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-665: Improper Initialization
Learn about CWE-665 (Improper Initialization), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-666: Operation on Resource in Wrong Phase of Lifetime
Learn about CWE-666 (Operation on Resource in Wrong Phase of Lifetime), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-667: Improper Locking
Learn about CWE-667 (Improper Locking), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-668: Exposure of Resource to Wrong Sphere
Learn about CWE-668 (Exposure of Resource to Wrong Sphere), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-669: Incorrect Resource Transfer Between Spheres
Learn about CWE-669 (Incorrect Resource Transfer Between Spheres), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-67: Improper Handling of Windows Device Names
Learn about CWE-67 (Improper Handling of Windows Device Names), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-670: Always-Incorrect Control Flow Implementation
Learn about CWE-670 (Always-Incorrect Control Flow Implementation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-671: Lack of Administrator Control over Security
Learn about CWE-671 (Lack of Administrator Control over Security), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-672: Operation on a Resource after Expiration or Release
Learn about CWE-672 (Operation on a Resource after Expiration or Release), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-673: External Influence of Sphere Definition
Learn about CWE-673 (External Influence of Sphere Definition), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified