All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-703: Improper Check or Handling of Exceptional Conditions
Learn about CWE-703 (Improper Check or Handling of Exceptional Conditions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-704: Incorrect Type Conversion or Cast
Learn about CWE-704 (Incorrect Type Conversion or Cast), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-705: Incorrect Control Flow Scoping
Learn about CWE-705 (Incorrect Control Flow Scoping), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-706: Use of Incorrectly-Resolved Name or Reference
Learn about CWE-706 (Use of Incorrectly-Resolved Name or Reference), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-707: Improper Neutralization
Learn about CWE-707 (Improper Neutralization), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-708: Incorrect Ownership Assignment
Learn about CWE-708 (Incorrect Ownership Assignment), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-71: DEPRECATED: Apple '.DS_Store'
Learn about CWE-71 (DEPRECATED: Apple '.DS_Store'), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-710: Improper Adherence to Coding Standards
Learn about CWE-710 (Improper Adherence to Coding Standards), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-72: Improper Handling of Apple HFS+ Alternate Data Stream Path
Learn about CWE-72 (Improper Handling of Apple HFS+ Alternate Data Stream Path), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-73: External Control of File Name or Path
Learn about CWE-73 (External Control of File Name or Path), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-732: Incorrect Permission Assignment for Critical Resource
Learn about CWE-732 (Incorrect Permission Assignment for Critical Resource), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-733: Compiler Optimization Removal or Modification of Security-critical Code
Learn about CWE-733 (Compiler Optimization Removal or Modification of Security-critical Code), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified