All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-221: Information Loss or Omission
Learn about CWE-221 (Information Loss or Omission), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-222: Truncation of Security-relevant Information
Learn about CWE-222 (Truncation of Security-relevant Information), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-223: Omission of Security-relevant Information
Learn about CWE-223 (Omission of Security-relevant Information), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-224: Obscured Security-relevant Information by Alternate Name
Learn about CWE-224 (Obscured Security-relevant Information by Alternate Name), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-225: DEPRECATED: General Information Management Problems
Learn about CWE-225 (DEPRECATED: General Information Management Problems), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-226: Sensitive Information in Resource Not Removed Before Reuse
Learn about CWE-226 (Sensitive Information in Resource Not Removed Before Reuse), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-228: Improper Handling of Syntactically Invalid Structure
Learn about CWE-228 (Improper Handling of Syntactically Invalid Structure), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-229: Improper Handling of Values
Learn about CWE-229 (Improper Handling of Values), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-23: Relative Path Traversal
Learn about CWE-23 (Relative Path Traversal), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-230: Improper Handling of Missing Values
Learn about CWE-230 (Improper Handling of Missing Values), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-231: Improper Handling of Extra Values
Learn about CWE-231 (Improper Handling of Extra Values), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified