All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-35: Path Traversal: '.../...//'
Learn about CWE-35 (Path Traversal: '.../...//'), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action
Learn about CWE-350 (Reliance on Reverse DNS Resolution for a Security-Critical Action), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-351: Insufficient Type Distinction
Learn about CWE-351 (Insufficient Type Distinction), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-352: Cross-Site Request Forgery (CSRF)
Learn about CWE-352 (Cross-Site Request Forgery (CSRF)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-353: Missing Support for Integrity Check
Learn about CWE-353 (Missing Support for Integrity Check), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-354: Improper Validation of Integrity Check Value
Learn about CWE-354 (Improper Validation of Integrity Check Value), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-356: Product UI does not Warn User of Unsafe Actions
Learn about CWE-356 (Product UI does not Warn User of Unsafe Actions), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-357: Insufficient UI Warning of Dangerous Operations
Learn about CWE-357 (Insufficient UI Warning of Dangerous Operations), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-358: Improperly Implemented Security Check for Standard
Learn about CWE-358 (Improperly Implemented Security Check for Standard), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-359: Exposure of Private Personal Information to an Unauthorized Actor
Learn about CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-36: Absolute Path Traversal
Learn about CWE-36 (Absolute Path Traversal), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-360: Trust of System Event Data
Learn about CWE-360 (Trust of System Event Data), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified