Skip to the content
June 17, 2025
Cyber Security NewsCyber Security NewsCyber Security News
News, Advisories and much more
  • Home
  • Academy
  • Advisories
  • News
1

Microsoft Promises to Keep European Cloud Data in Europe

June 17, 2025
2

Brits Lose £106m to Romance Fraud in a Year

June 17, 2025
3

What Is Cyber Risk

June 16, 2025
4

Threat Actors Target Victims with HijackLoader and DeerStealer

June 16, 2025
5

Archetyp Market Shut Down in Europe-wide Law Enforcement Operation

June 16, 2025
6

Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus

June 16, 2025
7

Anubis Ransomware Adds File-Wiping Capability

June 16, 2025
8

Over a Third of Grafana Instances Exposed to XSS Flaw

June 16, 2025
9

WestJet Investigates Cyber-Attack Impacting Customers

June 16, 2025
Cyber Security News
Category:
Category: CWE
  • Home
  • Pin Posts
  • CWE

Category: CWE

The Most Dangerous Vulnerabilities in Apache Tomcat and How to Protect Against Them
Advisories CWE Education

The Most Dangerous Vulnerabilities in Apache Tomcat and How to Protect Against Them

Apache Tomcat is an open-source web server and servlet container that is widely used in enterprise environments to run Java web applications. However, like any...

rocco
February 19, 2023February 19, 2023
Read More
Advisories CWE Education

ZDI-CAN-18333: A Critical Zero-Day Vulnerability in Microsoft Windows

Zero-day vulnerabilities are a serious threat to cybersecurity, as they can be exploited by malicious actors to gain unauthorized access to systems. One such vulnerability...

rocco
February 19, 2023February 19, 2023
Read More
CWE

CWE-669 – Incorrect Resource Transfer Between Spheres

Description The product does not properly transfer a resource/behavior to another sphere, or improperly imports a resource/behavior from another sphere, in a manner that provides...

rocco
May 26, 2022
Read More
CWE

CWE-67 – Improper Handling of Windows Device Names

Description The software constructs pathnames from user input, but it does not handle or incorrectly handles a pathname containing a Windows device name such as...

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-670 – Always-Incorrect Control Flow Implementation

Description The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior...

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-671 – Lack of Administrator Control over Security

Description The product uses security features in a way that prevents the product's administrator from tailoring security settings to reflect the environment in which the...

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-672 – Operation on a Resource after Expiration or Release

Description The software uses, accesses, or otherwise operates on a resource after that resource has been expired, released, or revoked. Modes of Introduction: - Architecture...

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-673 – External Influence of Sphere Definition

Description The product does not prevent the definition of control spheres from external actors. Typically, a product defines its control sphere within the code itself,...

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-674 – Uncontrolled Recursion

Description The product does not properly control the amount of recursion which takes place, consuming excessive resources, such as allocated memory or the program stack....

rocco
May 26, 2022May 26, 2022
Read More
CWE

CWE-675 – Multiple Operations on Resource in Single-Operation Context

Description The product performs the same operation on a resource two or more times, when the operation should only be applied once. Modes of Introduction:...

rocco
May 26, 2022May 26, 2022
Read More

Posts pagination

1 2 … 96 Next
  • Home
  • Academy
  • Advisories
  • News
To the Top ↑ Up ↑