All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-210: Self-generated Error Message Containing Sensitive Information
Learn about CWE-210 (Self-generated Error Message Containing Sensitive Information), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-211: Externally-Generated Error Message Containing Sensitive Information
Learn about CWE-211 (Externally-Generated Error Message Containing Sensitive Information), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-212: Improper Removal of Sensitive Information Before Storage or Transfer
Learn about CWE-212 (Improper Removal of Sensitive Information Before Storage or Transfer), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-213: Exposure of Sensitive Information Due to Incompatible Policies
Learn about CWE-213 (Exposure of Sensitive Information Due to Incompatible Policies), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-214: Invocation of Process Using Visible Sensitive Information
Learn about CWE-214 (Invocation of Process Using Visible Sensitive Information), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-215: Insertion of Sensitive Information Into Debugging Code
Learn about CWE-215 (Insertion of Sensitive Information Into Debugging Code), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-216: DEPRECATED: Containment Errors (Container Errors)
Learn about CWE-216 (DEPRECATED: Containment Errors (Container Errors)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-217: DEPRECATED: Failure to Protect Stored Data from Modification
Learn about CWE-217 (DEPRECATED: Failure to Protect Stored Data from Modification), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-218: DEPRECATED: Failure to provide confidentiality for stored data
Learn about CWE-218 (DEPRECATED: Failure to provide confidentiality for stored data), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-219: Storage of File with Sensitive Data Under Web Root
Learn about CWE-219 (Storage of File with Sensitive Data Under Web Root), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Learn about CWE-22 (Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-220: Storage of File With Sensitive Data Under FTP Root
Learn about CWE-220 (Storage of File With Sensitive Data Under FTP Root), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified