All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-339: Small Seed Space in PRNG
Learn about CWE-339 (Small Seed Space in PRNG), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-34: Path Traversal: '....//'
Learn about CWE-34 (Path Traversal: '....//'), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-340: Generation of Predictable Numbers or Identifiers
Learn about CWE-340 (Generation of Predictable Numbers or Identifiers), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-341: Predictable from Observable State
Learn about CWE-341 (Predictable from Observable State), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-342: Predictable Exact Value from Previous Values
Learn about CWE-342 (Predictable Exact Value from Previous Values), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-343: Predictable Value Range from Previous Values
Learn about CWE-343 (Predictable Value Range from Previous Values), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-344: Use of Invariant Value in Dynamically Changing Context
Learn about CWE-344 (Use of Invariant Value in Dynamically Changing Context), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-345: Insufficient Verification of Data Authenticity
Learn about CWE-345 (Insufficient Verification of Data Authenticity), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-346: Origin Validation Error
Learn about CWE-346 (Origin Validation Error), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-347: Improper Verification of Cryptographic Signature
Learn about CWE-347 (Improper Verification of Cryptographic Signature), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-348: Use of Less Trusted Source
Learn about CWE-348 (Use of Less Trusted Source), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified