All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-689: Permission Race Condition During Resource Copy
Learn about CWE-689 (Permission Race Condition During Resource Copy), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-69: Improper Handling of Windows ::DATA Alternate Data Stream
Learn about CWE-69 (Improper Handling of Windows ::DATA Alternate Data Stream), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-690: Unchecked Return Value to NULL Pointer Dereference
Learn about CWE-690 (Unchecked Return Value to NULL Pointer Dereference), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-691: Insufficient Control Flow Management
Learn about CWE-691 (Insufficient Control Flow Management), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-692: Incomplete Denylist to Cross-Site Scripting
Learn about CWE-692 (Incomplete Denylist to Cross-Site Scripting), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-693: Protection Mechanism Failure
Learn about CWE-693 (Protection Mechanism Failure), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-694: Use of Multiple Resources with Duplicate Identifier
Learn about CWE-694 (Use of Multiple Resources with Duplicate Identifier), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-695: Use of Low-Level Functionality
Learn about CWE-695 (Use of Low-Level Functionality), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-696: Incorrect Behavior Order
Learn about CWE-696 (Incorrect Behavior Order), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-697: Incorrect Comparison
Learn about CWE-697 (Incorrect Comparison), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-698: Execution After Redirect (EAR)
Learn about CWE-698 (Execution After Redirect (EAR)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-7: J2EE Misconfiguration: Missing Custom Error Page
Learn about CWE-7 (J2EE Misconfiguration: Missing Custom Error Page), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified