All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-339: Small Seed Space in PRNG
Learn about CWE-339 (Small Seed Space in PRNG), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-34: Path Traversal: '....//'
Learn about CWE-34 (Path Traversal: '....//'), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-340: Generation of Predictable Numbers or Identifiers
Learn about CWE-340 (Generation of Predictable Numbers or Identifiers), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-341: Predictable from Observable State
Learn about CWE-341 (Predictable from Observable State), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-342: Predictable Exact Value from Previous Values
Learn about CWE-342 (Predictable Exact Value from Previous Values), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-343: Predictable Value Range from Previous Values
Learn about CWE-343 (Predictable Value Range from Previous Values), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-344: Use of Invariant Value in Dynamically Changing Context
Learn about CWE-344 (Use of Invariant Value in Dynamically Changing Context), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-345: Insufficient Verification of Data Authenticity
Learn about CWE-345 (Insufficient Verification of Data Authenticity), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-346: Origin Validation Error
Learn about CWE-346 (Origin Validation Error), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-347: Improper Verification of Cryptographic Signature
Learn about CWE-347 (Improper Verification of Cryptographic Signature), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-348: Use of Less Trusted Source
Learn about CWE-348 (Use of Less Trusted Source), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-349: Acceptance of Extraneous Untrusted Data With Trusted Data
Learn about CWE-349 (Acceptance of Extraneous Untrusted Data With Trusted Data), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified