All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-762: Mismatched Memory Management Routines
Learn about CWE-762 (Mismatched Memory Management Routines), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-763: Release of Invalid Pointer or Reference
Learn about CWE-763 (Release of Invalid Pointer or Reference), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-764: Multiple Locks of a Critical Resource
Learn about CWE-764 (Multiple Locks of a Critical Resource), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-765: Multiple Unlocks of a Critical Resource
Learn about CWE-765 (Multiple Unlocks of a Critical Resource), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-766: Critical Data Element Declared Public
Learn about CWE-766 (Critical Data Element Declared Public), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-767: Access to Critical Private Variable via Public Method
Learn about CWE-767 (Access to Critical Private Variable via Public Method), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-768: Incorrect Short Circuit Evaluation
Learn about CWE-768 (Incorrect Short Circuit Evaluation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-769: DEPRECATED: Uncontrolled File Descriptor Consumption
Learn about CWE-769 (DEPRECATED: Uncontrolled File Descriptor Consumption), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
Learn about CWE-77 (Improper Neutralization of Special Elements used in a Command ('Command Injection')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-770: Allocation of Resources Without Limits or Throttling
Learn about CWE-770 (Allocation of Resources Without Limits or Throttling), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-771: Missing Reference to Active Allocated Resource
Learn about CWE-771 (Missing Reference to Active Allocated Resource), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-772: Missing Release of Resource after Effective Lifetime
Learn about CWE-772 (Missing Release of Resource after Effective Lifetime), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified