All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-1096: Singleton Class Instance Creation without Proper Locking or Synchronization
Learn about CWE-1096 (Singleton Class Instance Creation without Proper Locking or Synchronization), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1097: Persistent Storable Data Element without Associated Comparison Control Element
Learn about CWE-1097 (Persistent Storable Data Element without Associated Comparison Control Element), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1098: Data Element containing Pointer Item without Proper Copy Control Element
Learn about CWE-1098 (Data Element containing Pointer Item without Proper Copy Control Element), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1099: Inconsistent Naming Conventions for Identifiers
Learn about CWE-1099 (Inconsistent Naming Conventions for Identifiers), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-11: ASP.NET Misconfiguration: Creating Debug Binary
Learn about CWE-11 (ASP.NET Misconfiguration: Creating Debug Binary), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-110: Struts: Validator Without Form Field
Learn about CWE-110 (Struts: Validator Without Form Field), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1100: Insufficient Isolation of System-Dependent Functions
Learn about CWE-1100 (Insufficient Isolation of System-Dependent Functions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1101: Reliance on Runtime Component in Generated Code
Learn about CWE-1101 (Reliance on Runtime Component in Generated Code), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1102: Reliance on Machine-Dependent Data Representation
Learn about CWE-1102 (Reliance on Machine-Dependent Data Representation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1103: Use of Platform-Dependent Third Party Components
Learn about CWE-1103 (Use of Platform-Dependent Third Party Components), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1104: Use of Unmaintained Third Party Components
Learn about CWE-1104 (Use of Unmaintained Third Party Components), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1105: Insufficient Encapsulation of Machine-Dependent Functionality
Learn about CWE-1105 (Insufficient Encapsulation of Machine-Dependent Functionality), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified