All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')
Learn about CWE-113 (Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-114: Process Control
Learn about CWE-114 (Process Control), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-115: Misinterpretation of Input
Learn about CWE-115 (Misinterpretation of Input), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-116: Improper Encoding or Escaping of Output
Learn about CWE-116 (Improper Encoding or Escaping of Output), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1164: Irrelevant Code
Learn about CWE-1164 (Irrelevant Code), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-117: Improper Output Neutralization for Logs
Learn about CWE-117 (Improper Output Neutralization for Logs), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1173: Improper Use of Validation Framework
Learn about CWE-1173 (Improper Use of Validation Framework), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1174: ASP.NET Misconfiguration: Improper Model Validation
Learn about CWE-1174 (ASP.NET Misconfiguration: Improper Model Validation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1176: Inefficient CPU Computation
Learn about CWE-1176 (Inefficient CPU Computation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1177: Use of Prohibited Code
Learn about CWE-1177 (Use of Prohibited Code), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-118: Incorrect Access of Indexable Resource ('Range Error')
Learn about CWE-118 (Incorrect Access of Indexable Resource ('Range Error')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1187: DEPRECATED: Use of Uninitialized Resource
Learn about CWE-1187 (DEPRECATED: Use of Uninitialized Resource), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified