All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-773: Missing Reference to Active File Descriptor or Handle
Learn about CWE-773 (Missing Reference to Active File Descriptor or Handle), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-774: Allocation of File Descriptors or Handles Without Limits or Throttling
Learn about CWE-774 (Allocation of File Descriptors or Handles Without Limits or Throttling), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-775: Missing Release of File Descriptor or Handle after Effective Lifetime
Learn about CWE-775 (Missing Release of File Descriptor or Handle after Effective Lifetime), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-776: Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')
Learn about CWE-776 (Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-777: Regular Expression without Anchors
Learn about CWE-777 (Regular Expression without Anchors), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-778: Insufficient Logging
Learn about CWE-778 (Insufficient Logging), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-779: Logging of Excessive Data
Learn about CWE-779 (Logging of Excessive Data), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Learn about CWE-78 (Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-780: Use of RSA Algorithm without OAEP
Learn about CWE-780 (Use of RSA Algorithm without OAEP), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code
Learn about CWE-781 (Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-782: Exposed IOCTL with Insufficient Access Control
Learn about CWE-782 (Exposed IOCTL with Insufficient Access Control), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified