All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-104: Struts: Form Bean Does Not Extend Validation Class
Learn about CWE-104 (Struts: Form Bean Does Not Extend Validation Class), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1041: Use of Redundant Code
Learn about CWE-1041 (Use of Redundant Code), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1042: Static Member Data Element outside of a Singleton Class Element
Learn about CWE-1042 (Static Member Data Element outside of a Singleton Class Element), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1043: Data Element Aggregating an Excessively Large Number of Non-Primitive Elements
Learn about CWE-1043 (Data Element Aggregating an Excessively Large Number of Non-Primitive Elements), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1044: Architecture with Number of Horizontal Layers Outside of Expected Range
Learn about CWE-1044 (Architecture with Number of Horizontal Layers Outside of Expected Range), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1045: Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor
Learn about CWE-1045 (Parent Class with a Virtual Destructor and a Child Class without a Virtual Destructor), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1046: Creation of Immutable Text Using String Concatenation
Learn about CWE-1046 (Creation of Immutable Text Using String Concatenation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1047: Modules with Circular Dependencies
Learn about CWE-1047 (Modules with Circular Dependencies), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1048: Invokable Control Element with Large Number of Outward Calls
Learn about CWE-1048 (Invokable Control Element with Large Number of Outward Calls), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1049: Excessive Data Query Operations in a Large Data Table
Learn about CWE-1049 (Excessive Data Query Operations in a Large Data Table), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-105: Struts: Form Field Without Validator
Learn about CWE-105 (Struts: Form Field Without Validator), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1050: Excessive Platform Resource Consumption within a Loop
Learn about CWE-1050 (Excessive Platform Resource Consumption within a Loop), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified