All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-173: Improper Handling of Alternate Encoding
Learn about CWE-173 (Improper Handling of Alternate Encoding), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-174: Double Decoding of the Same Data
Learn about CWE-174 (Double Decoding of the Same Data), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-175: Improper Handling of Mixed Encoding
Learn about CWE-175 (Improper Handling of Mixed Encoding), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-176: Improper Handling of Unicode Encoding
Learn about CWE-176 (Improper Handling of Unicode Encoding), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-177: Improper Handling of URL Encoding (Hex Encoding)
Learn about CWE-177 (Improper Handling of URL Encoding (Hex Encoding)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-178: Improper Handling of Case Sensitivity
Learn about CWE-178 (Improper Handling of Case Sensitivity), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-179: Incorrect Behavior Order: Early Validation
Learn about CWE-179 (Incorrect Behavior Order: Early Validation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-180: Incorrect Behavior Order: Validate Before Canonicalize
Learn about CWE-180 (Incorrect Behavior Order: Validate Before Canonicalize), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-181: Incorrect Behavior Order: Validate Before Filter
Learn about CWE-181 (Incorrect Behavior Order: Validate Before Filter), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-182: Collapse of Data into Unsafe Value
Learn about CWE-182 (Collapse of Data into Unsafe Value), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-183: Permissive List of Allowed Inputs
Learn about CWE-183 (Permissive List of Allowed Inputs), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-184: Incomplete List of Disallowed Inputs
Learn about CWE-184 (Incomplete List of Disallowed Inputs), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified