All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-244: Improper Clearing of Heap Memory Before Release ('Heap Inspection')
Learn about CWE-244 (Improper Clearing of Heap Memory Before Release ('Heap Inspection')), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-245: J2EE Bad Practices: Direct Management of Connections
Learn about CWE-245 (J2EE Bad Practices: Direct Management of Connections), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-246: J2EE Bad Practices: Direct Use of Sockets
Learn about CWE-246 (J2EE Bad Practices: Direct Use of Sockets), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-247: DEPRECATED: Reliance on DNS Lookups in a Security Decision
Learn about CWE-247 (DEPRECATED: Reliance on DNS Lookups in a Security Decision), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-248: Uncaught Exception
Learn about CWE-248 (Uncaught Exception), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-249: DEPRECATED: Often Misused: Path Manipulation
Learn about CWE-249 (DEPRECATED: Often Misused: Path Manipulation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-25: Path Traversal: '/../filedir'
Learn about CWE-25 (Path Traversal: '/../filedir'), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-250: Execution with Unnecessary Privileges
Learn about CWE-250 (Execution with Unnecessary Privileges), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-252: Unchecked Return Value
Learn about CWE-252 (Unchecked Return Value), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-253: Incorrect Check of Function Return Value
Learn about CWE-253 (Incorrect Check of Function Return Value), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-256: Plaintext Storage of a Password
Learn about CWE-256 (Plaintext Storage of a Password), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-257: Storing Passwords in a Recoverable Format
Learn about CWE-257 (Storing Passwords in a Recoverable Format), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified