CWE-373 – DEPRECATED: State Synchronization Error
Description This entry was deprecated because it overlapped the same concepts as race condition (CWE-362) and Improper Synchronization (CWE-662). Modes of Introduction: Related...
CWE-372 – Incomplete Internal State Distinction
Description The software does not properly determine which state it is in, causing it to assume it is in state X when in fact it...
CWE-370 – Missing Check for Certificate Revocation after Initial Check
Description The software does not check the revocation status of a certificate after its initial revocation check, which can cause the software to perform privileged...
CWE-37 – Path Traversal: ‘/absolute/pathname/here’
Description A software system that accepts input in the form of a slash absolute path ('/absolute/pathname/here') without appropriate validation can allow an attacker to traverse...
CWE-369 – Divide By Zero
Description The product divides a value by zero. This weakness typically occurs when an unexpected value is provided to the product, or if an error...
CWE-368 – Context Switching Race Condition
Description A product performs a series of non-atomic actions to switch between contexts that cross privilege or other security boundaries, but a race condition allows...
CWE-367 – Time-of-check Time-of-use (TOCTOU) Race Condition
Description The software checks the state of a resource before using that resource, but the resource's state can change between the check and the use...
CWE-366 – Race Condition within a Thread
Description If two threads of execution use a resource simultaneously, there exists the possibility that resources may be used while invalid, in turn making the...
CWE-365 – DEPRECATED: Race Condition in Switch
Description This entry has been deprecated. There are no documented cases in which a switch's control expression is evaluated more than once. It is likely...
CWE-364 – Signal Handler Race Condition
Description The software uses a signal handler that introduces a race condition. Modes of Introduction: - Architecture and Design Likelihood of Exploit: Medium ...