All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-82: Improper Neutralization of Script in Attributes of IMG Tags in a Web Page
Learn about CWE-82 (Improper Neutralization of Script in Attributes of IMG Tags in a Web Page), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-820: Missing Synchronization
Learn about CWE-820 (Missing Synchronization), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-821: Incorrect Synchronization
Learn about CWE-821 (Incorrect Synchronization), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-822: Untrusted Pointer Dereference
Learn about CWE-822 (Untrusted Pointer Dereference), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-823: Use of Out-of-range Pointer Offset
Learn about CWE-823 (Use of Out-of-range Pointer Offset), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-824: Access of Uninitialized Pointer
Learn about CWE-824 (Access of Uninitialized Pointer), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-825: Expired Pointer Dereference
Learn about CWE-825 (Expired Pointer Dereference), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-826: Premature Release of Resource During Expected Lifetime
Learn about CWE-826 (Premature Release of Resource During Expected Lifetime), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-827: Improper Control of Document Type Definition
Learn about CWE-827 (Improper Control of Document Type Definition), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-828: Signal Handler with Functionality that is not Asynchronous-Safe
Learn about CWE-828 (Signal Handler with Functionality that is not Asynchronous-Safe), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-829: Inclusion of Functionality from Untrusted Control Sphere
Learn about CWE-829 (Inclusion of Functionality from Untrusted Control Sphere), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified