All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-233: Improper Handling of Parameters
Learn about CWE-233 (Improper Handling of Parameters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-234: Failure to Handle Missing Parameter
Learn about CWE-234 (Failure to Handle Missing Parameter), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-235: Improper Handling of Extra Parameters
Learn about CWE-235 (Improper Handling of Extra Parameters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-236: Improper Handling of Undefined Parameters
Learn about CWE-236 (Improper Handling of Undefined Parameters), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-237: Improper Handling of Structural Elements
Learn about CWE-237 (Improper Handling of Structural Elements), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-238: Improper Handling of Incomplete Structural Elements
Learn about CWE-238 (Improper Handling of Incomplete Structural Elements), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-239: Failure to Handle Incomplete Element
Learn about CWE-239 (Failure to Handle Incomplete Element), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-24: Path Traversal: '../filedir'
Learn about CWE-24 (Path Traversal: '../filedir'), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-240: Improper Handling of Inconsistent Structural Elements
Learn about CWE-240 (Improper Handling of Inconsistent Structural Elements), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-241: Improper Handling of Unexpected Data Type
Learn about CWE-241 (Improper Handling of Unexpected Data Type), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-242: Use of Inherently Dangerous Function
Learn about CWE-242 (Use of Inherently Dangerous Function), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-243: Creation of chroot Jail Without Changing Working Directory
Learn about CWE-243 (Creation of chroot Jail Without Changing Working Directory), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified