All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-1096: Singleton Class Instance Creation without Proper Locking or Synchronization
Learn about CWE-1096 (Singleton Class Instance Creation without Proper Locking or Synchronization), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1097: Persistent Storable Data Element without Associated Comparison Control Element
Learn about CWE-1097 (Persistent Storable Data Element without Associated Comparison Control Element), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1098: Data Element containing Pointer Item without Proper Copy Control Element
Learn about CWE-1098 (Data Element containing Pointer Item without Proper Copy Control Element), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1099: Inconsistent Naming Conventions for Identifiers
Learn about CWE-1099 (Inconsistent Naming Conventions for Identifiers), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-11: ASP.NET Misconfiguration: Creating Debug Binary
Learn about CWE-11 (ASP.NET Misconfiguration: Creating Debug Binary), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-110: Struts: Validator Without Form Field
Learn about CWE-110 (Struts: Validator Without Form Field), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1100: Insufficient Isolation of System-Dependent Functions
Learn about CWE-1100 (Insufficient Isolation of System-Dependent Functions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1101: Reliance on Runtime Component in Generated Code
Learn about CWE-1101 (Reliance on Runtime Component in Generated Code), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1102: Reliance on Machine-Dependent Data Representation
Learn about CWE-1102 (Reliance on Machine-Dependent Data Representation), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1103: Use of Platform-Dependent Third Party Components
Learn about CWE-1103 (Use of Platform-Dependent Third Party Components), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1104: Use of Unmaintained Third Party Components
Learn about CWE-1104 (Use of Unmaintained Third Party Components), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified