All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-1004: Sensitive Cookie Without 'HttpOnly' Flag
Learn about CWE-1004 (Sensitive Cookie Without 'HttpOnly' Flag), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1007: Insufficient Visual Distinction of Homoglyphs Presented to User
Learn about CWE-1007 (Insufficient Visual Distinction of Homoglyphs Presented to User), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-102: Struts: Duplicate Validation Forms
Learn about CWE-102 (Struts: Duplicate Validation Forms), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1021: Improper Restriction of Rendered UI Layers or Frames
Learn about CWE-1021 (Improper Restriction of Rendered UI Layers or Frames), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1022: Use of Web Link to Untrusted Target with window.opener Access
Learn about CWE-1022 (Use of Web Link to Untrusted Target with window.opener Access), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1023: Incomplete Comparison with Missing Factors
Learn about CWE-1023 (Incomplete Comparison with Missing Factors), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1024: Comparison of Incompatible Types
Learn about CWE-1024 (Comparison of Incompatible Types), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1025: Comparison Using Wrong Factors
Learn about CWE-1025 (Comparison Using Wrong Factors), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-103: Struts: Incomplete validate() Method Definition
Learn about CWE-103 (Struts: Incomplete validate() Method Definition), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1037: Processor Optimization Removal or Modification of Security-critical Code
Learn about CWE-1037 (Processor Optimization Removal or Modification of Security-critical Code), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1038: Insecure Automated Optimizations
Learn about CWE-1038 (Insecure Automated Optimizations), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1039: Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism
Learn about CWE-1039 (Inadequate Detection or Handling of Adversarial Input Perturbations in Automated Recognition Mechanism), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified