All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-35: Path Traversal: '.../...//'
Learn about CWE-35 (Path Traversal: '.../...//'), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-350: Reliance on Reverse DNS Resolution for a Security-Critical Action
Learn about CWE-350 (Reliance on Reverse DNS Resolution for a Security-Critical Action), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-351: Insufficient Type Distinction
Learn about CWE-351 (Insufficient Type Distinction), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-352: Cross-Site Request Forgery (CSRF)
Learn about CWE-352 (Cross-Site Request Forgery (CSRF)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-353: Missing Support for Integrity Check
Learn about CWE-353 (Missing Support for Integrity Check), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-354: Improper Validation of Integrity Check Value
Learn about CWE-354 (Improper Validation of Integrity Check Value), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-356: Product UI does not Warn User of Unsafe Actions
Learn about CWE-356 (Product UI does not Warn User of Unsafe Actions), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-357: Insufficient UI Warning of Dangerous Operations
Learn about CWE-357 (Insufficient UI Warning of Dangerous Operations), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-358: Improperly Implemented Security Check for Standard
Learn about CWE-358 (Improperly Implemented Security Check for Standard), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-359: Exposure of Private Personal Information to an Unauthorized Actor
Learn about CWE-359 (Exposure of Private Personal Information to an Unauthorized Actor), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-36: Absolute Path Traversal
Learn about CWE-36 (Absolute Path Traversal), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified