All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-221: Information Loss or Omission
Learn about CWE-221 (Information Loss or Omission), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-222: Truncation of Security-relevant Information
Learn about CWE-222 (Truncation of Security-relevant Information), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-223: Omission of Security-relevant Information
Learn about CWE-223 (Omission of Security-relevant Information), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-224: Obscured Security-relevant Information by Alternate Name
Learn about CWE-224 (Obscured Security-relevant Information by Alternate Name), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-225: DEPRECATED: General Information Management Problems
Learn about CWE-225 (DEPRECATED: General Information Management Problems), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-226: Sensitive Information in Resource Not Removed Before Reuse
Learn about CWE-226 (Sensitive Information in Resource Not Removed Before Reuse), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-228: Improper Handling of Syntactically Invalid Structure
Learn about CWE-228 (Improper Handling of Syntactically Invalid Structure), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-229: Improper Handling of Values
Learn about CWE-229 (Improper Handling of Values), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-23: Relative Path Traversal
Learn about CWE-23 (Relative Path Traversal), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-230: Improper Handling of Missing Values
Learn about CWE-230 (Improper Handling of Missing Values), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-231: Improper Handling of Extra Values
Learn about CWE-231 (Improper Handling of Extra Values), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-232: Improper Handling of Undefined Values
Learn about CWE-232 (Improper Handling of Undefined Values), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified