All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-1051: Initialization with Hard-Coded Network Resource Configuration Data
Learn about CWE-1051 (Initialization with Hard-Coded Network Resource Configuration Data), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1052: Excessive Use of Hard-Coded Literals in Initialization
Learn about CWE-1052 (Excessive Use of Hard-Coded Literals in Initialization), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1053: Missing Documentation for Design
Learn about CWE-1053 (Missing Documentation for Design), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1054: Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer
Learn about CWE-1054 (Invocation of a Control Element at an Unnecessarily Deep Horizontal Layer), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1055: Multiple Inheritance from Concrete Classes
Learn about CWE-1055 (Multiple Inheritance from Concrete Classes), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1056: Invokable Control Element with Variadic Parameters
Learn about CWE-1056 (Invokable Control Element with Variadic Parameters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1057: Data Access Operations Outside of Expected Data Manager Component
Learn about CWE-1057 (Data Access Operations Outside of Expected Data Manager Component), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1058: Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element
Learn about CWE-1058 (Invokable Control Element in Multi-Thread Context with non-Final Static Storable or Member Element), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1059: Insufficient Technical Documentation
Learn about CWE-1059 (Insufficient Technical Documentation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-106: Struts: Plug-in Framework not in Use
Learn about CWE-106 (Struts: Plug-in Framework not in Use), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1060: Excessive Number of Inefficient Server-Side Data Accesses
Learn about CWE-1060 (Excessive Number of Inefficient Server-Side Data Accesses), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-1061: Insufficient Encapsulation
Learn about CWE-1061 (Insufficient Encapsulation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified