All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-1391: Use of Weak Credentials
Learn about CWE-1391 (Use of Weak Credentials), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1392: Use of Default Credentials
Learn about CWE-1392 (Use of Default Credentials), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1393: Use of Default Password
Learn about CWE-1393 (Use of Default Password), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1394: Use of Default Cryptographic Key
Learn about CWE-1394 (Use of Default Cryptographic Key), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1395: Dependency on Vulnerable Third-Party Component
Learn about CWE-1395 (Dependency on Vulnerable Third-Party Component), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-14: Compiler Removal of Code to Clear Buffers
Learn about CWE-14 (Compiler Removal of Code to Clear Buffers), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-140: Improper Neutralization of Delimiters
Learn about CWE-140 (Improper Neutralization of Delimiters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-141: Improper Neutralization of Parameter/Argument Delimiters
Learn about CWE-141 (Improper Neutralization of Parameter/Argument Delimiters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1419: Incorrect Initialization of Resource
Learn about CWE-1419 (Incorrect Initialization of Resource), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-142: Improper Neutralization of Value Delimiters
Learn about CWE-142 (Improper Neutralization of Value Delimiters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1420: Exposure of Sensitive Information during Transient Execution
Learn about CWE-1420 (Exposure of Sensitive Information during Transient Execution), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1421: Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution
Learn about CWE-1421 (Exposure of Sensitive Information in Shared Microarchitectural Structures during Transient Execution), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified