All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-128: Wrap-around Error
Learn about CWE-128 (Wrap-around Error), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1280: Access Control Check Implemented After Asset is Accessed
Learn about CWE-1280 (Access Control Check Implemented After Asset is Accessed), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1281: Sequence of Processor Instructions Leads to Unexpected Behavior
Learn about CWE-1281 (Sequence of Processor Instructions Leads to Unexpected Behavior), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1282: Assumed-Immutable Data is Stored in Writable Memory
Learn about CWE-1282 (Assumed-Immutable Data is Stored in Writable Memory), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1283: Mutable Attestation or Measurement Reporting Data
Learn about CWE-1283 (Mutable Attestation or Measurement Reporting Data), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1284: Improper Validation of Specified Quantity in Input
Learn about CWE-1284 (Improper Validation of Specified Quantity in Input), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1285: Improper Validation of Specified Index, Position, or Offset in Input
Learn about CWE-1285 (Improper Validation of Specified Index, Position, or Offset in Input), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1286: Improper Validation of Syntactic Correctness of Input
Learn about CWE-1286 (Improper Validation of Syntactic Correctness of Input), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1287: Improper Validation of Specified Type of Input
Learn about CWE-1287 (Improper Validation of Specified Type of Input), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1288: Improper Validation of Consistency within Input
Learn about CWE-1288 (Improper Validation of Consistency within Input), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1289: Improper Validation of Unsafe Equivalence in Input
Learn about CWE-1289 (Improper Validation of Unsafe Equivalence in Input), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-129: Improper Validation of Array Index
Learn about CWE-129 (Improper Validation of Array Index), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified