All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-703: Improper Check or Handling of Exceptional Conditions
Learn about CWE-703 (Improper Check or Handling of Exceptional Conditions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-704: Incorrect Type Conversion or Cast
Learn about CWE-704 (Incorrect Type Conversion or Cast), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-705: Incorrect Control Flow Scoping
Learn about CWE-705 (Incorrect Control Flow Scoping), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-706: Use of Incorrectly-Resolved Name or Reference
Learn about CWE-706 (Use of Incorrectly-Resolved Name or Reference), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-707: Improper Neutralization
Learn about CWE-707 (Improper Neutralization), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-708: Incorrect Ownership Assignment
Learn about CWE-708 (Incorrect Ownership Assignment), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-71: DEPRECATED: Apple '.DS_Store'
Learn about CWE-71 (DEPRECATED: Apple '.DS_Store'), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-710: Improper Adherence to Coding Standards
Learn about CWE-710 (Improper Adherence to Coding Standards), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-72: Improper Handling of Apple HFS+ Alternate Data Stream Path
Learn about CWE-72 (Improper Handling of Apple HFS+ Alternate Data Stream Path), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-73: External Control of File Name or Path
Learn about CWE-73 (External Control of File Name or Path), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-732: Incorrect Permission Assignment for Critical Resource
Learn about CWE-732 (Incorrect Permission Assignment for Critical Resource), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified