All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-773: Missing Reference to Active File Descriptor or Handle
Learn about CWE-773 (Missing Reference to Active File Descriptor or Handle), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-774: Allocation of File Descriptors or Handles Without Limits or Throttling
Learn about CWE-774 (Allocation of File Descriptors or Handles Without Limits or Throttling), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-775: Missing Release of File Descriptor or Handle after Effective Lifetime
Learn about CWE-775 (Missing Release of File Descriptor or Handle after Effective Lifetime), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
Learn about CWE-776 (Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-777: Regular Expression without Anchors
Learn about CWE-777 (Regular Expression without Anchors), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-778: Insufficient Logging
Learn about CWE-778 (Insufficient Logging), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-779: Logging of Excessive Data
Learn about CWE-779 (Logging of Excessive Data), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Learn about CWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-780: Use of RSA Algorithm without OAEP
Learn about CWE-780 (Use of RSA Algorithm without OAEP), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code
Learn about CWE-781 (Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-782: Exposed IOCTL with Insufficient Access Control
Learn about CWE-782 (Exposed IOCTL with Insufficient Access Control), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-783: Operator Precedence Logic Error
Learn about CWE-783 (Operator Precedence Logic Error), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified