All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-1422: Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution
Learn about CWE-1422 (Exposure of Sensitive Information caused by Incorrect Data Forwarding during Transient Execution), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1423: Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution
Learn about CWE-1423 (Exposure of Sensitive Information caused by Shared Microarchitectural Predictor State that Influences Transient Execution), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1426: Improper Validation of Generative AI Output
Learn about CWE-1426 (Improper Validation of Generative AI Output), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1427: Improper Neutralization of Input Used for LLM Prompting
Learn about CWE-1427 (Improper Neutralization of Input Used for LLM Prompting), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1428: Reliance on HTTP instead of HTTPS
Learn about CWE-1428 (Reliance on HTTP instead of HTTPS), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1429: Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface
Learn about CWE-1429 (Missing Security-Relevant Feedback for Unexecuted Operations in Hardware Interface), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-143: Improper Neutralization of Record Delimiters
Learn about CWE-143 (Improper Neutralization of Record Delimiters), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-1431: Driving Intermediate Cryptographic State/Results to Hardware Module Outputs
Learn about CWE-1431 (Driving Intermediate Cryptographic State/Results to Hardware Module Outputs), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-144: Improper Neutralization of Line Delimiters
Learn about CWE-144 (Improper Neutralization of Line Delimiters), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-145: Improper Neutralization of Section Delimiters
Learn about CWE-145 (Improper Neutralization of Section Delimiters), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-146: Improper Neutralization of Expression/Command Delimiters
Learn about CWE-146 (Improper Neutralization of Expression/Command Delimiters), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified