All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-1106: Insufficient Use of Symbolic Constants
Learn about CWE-1106 (Insufficient Use of Symbolic Constants), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1107: Insufficient Isolation of Symbolic Constant Definitions
Learn about CWE-1107 (Insufficient Isolation of Symbolic Constant Definitions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1108: Excessive Reliance on Global Variables
Learn about CWE-1108 (Excessive Reliance on Global Variables), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1109: Use of Same Variable for Multiple Purposes
Learn about CWE-1109 (Use of Same Variable for Multiple Purposes), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-111: Direct Use of Unsafe JNI
Learn about CWE-111 (Direct Use of Unsafe JNI), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1110: Incomplete Design Documentation
Learn about CWE-1110 (Incomplete Design Documentation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1111: Incomplete I/O Documentation
Learn about CWE-1111 (Incomplete I/O Documentation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1112: Incomplete Documentation of Program Execution
Learn about CWE-1112 (Incomplete Documentation of Program Execution), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1113: Inappropriate Comment Style
Learn about CWE-1113 (Inappropriate Comment Style), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1114: Inappropriate Whitespace Style
Learn about CWE-1114 (Inappropriate Whitespace Style), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1115: Source Code Element without Standard Prologue
Learn about CWE-1115 (Source Code Element without Standard Prologue), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1116: Inaccurate Comments
Learn about CWE-1116 (Inaccurate Comments), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified