All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-500: Public Static Field Not Marked Final
Learn about CWE-500 (Public Static Field Not Marked Final), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-501: Trust Boundary Violation
Learn about CWE-501 (Trust Boundary Violation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-502: Deserialization of Untrusted Data
Learn about CWE-502 (Deserialization of Untrusted Data), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-506: Embedded Malicious Code
Learn about CWE-506 (Embedded Malicious Code), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-507: Trojan Horse
Learn about CWE-507 (Trojan Horse), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-508: Non-Replicating Malicious Code
Learn about CWE-508 (Non-Replicating Malicious Code), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-509: Replicating Malicious Code (Virus or Worm)
Learn about CWE-509 (Replicating Malicious Code (Virus or Worm)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-51: Path Equivalence: '/multiple//internal/slash'
Learn about CWE-51 (Path Equivalence: '/multiple//internal/slash'), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-510: Trapdoor
Learn about CWE-510 (Trapdoor), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-511: Logic/Time Bomb
Learn about CWE-511 (Logic/Time Bomb), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-512: Spyware
Learn about CWE-512 (Spyware), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-514: Covert Channel
Learn about CWE-514 (Covert Channel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified