All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-1422: Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution
Learn about CWE-1422 (Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1423: Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution
Learn about CWE-1423 (Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1426: Improper Validation of Generative AI Output
Learn about CWE-1426 (Improper Validation of Generative AI Output), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1427: Improper Neutralization of Input Used for LLM Prompting
Learn about CWE-1427 (Improper Neutralization of Input Used for LLM Prompting), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1428: Reliance on HTTP instead of HTTPS
Learn about CWE-1428 (Reliance on HTTP instead of HTTPS), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1429: Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
Learn about CWE-1429 (Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-143: Improper Neutralization of Record Delimiters
Learn about CWE-143 (Improper Neutralization of Record Delimiters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1431: Driving Intermediate Cryptographic State/Results to Hardware Module Outputs
Learn about CWE-1431 (Driving Intermediate Cryptographic State/Results to Hardware Module Outputs), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-144: Improper Neutralization of Line Delimiters
Learn about CWE-144 (Improper Neutralization of Line Delimiters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-145: Improper Neutralization of Section Delimiters
Learn about CWE-145 (Improper Neutralization of Section Delimiters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-146: Improper Neutralization of Expression/Command Delimiters
Learn about CWE-146 (Improper Neutralization of Expression/Command Delimiters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-147: Improper Neutralization of Input Terminators
Learn about CWE-147 (Improper Neutralization of Input Terminators), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified