All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-762: Mismatched Memory Management Routines
Learn about CWE-762 (Mismatched Memory Management Routines), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-763: Release of Invalid Pointer or Reference
Learn about CWE-763 (Release of Invalid Pointer or Reference), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-764: Multiple Locks of a Critical Resource
Learn about CWE-764 (Multiple Locks of a Critical Resource), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-765: Multiple Unlocks of a Critical Resource
Learn about CWE-765 (Multiple Unlocks of a Critical Resource), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-766: Critical Data Element Declared Public
Learn about CWE-766 (Critical Data Element Declared Public), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-767: Access to Critical Private Variable via Public Method
Learn about CWE-767 (Access to Critical Private Variable via Public Method), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-768: Incorrect Short Circuit Evaluation
Learn about CWE-768 (Incorrect Short Circuit Evaluation), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-769: DEPRECATED: Uncontrolled File Descriptor Consumption
Learn about CWE-769 (DEPRECATED: Uncontrolled File Descriptor Consumption), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
Learn about CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-770: Allocation of Resources Without Limits or Throttling
Learn about CWE-770 (Allocation of Resources Without Limits or Throttling), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-771: Missing Reference to Active Allocated Resource
Learn about CWE-771 (Missing Reference to Active Allocated Resource), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified