All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-515: Covert Storage Channel
Learn about CWE-515 (Covert Storage Channel), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-516: DEPRECATED: Covert Timing Channel
Learn about CWE-516 (DEPRECATED: Covert Timing Channel), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-52: Path Equivalence: '/multiple/trailing/slash//'
Learn about CWE-52 (Path Equivalence: '/multiple/trailing/slash//'), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-520: .NET Misconfiguration: Use of Impersonation
Learn about CWE-520 (.NET Misconfiguration: Use of Impersonation), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-521: Weak Password Requirements
Learn about CWE-521 (Weak Password Requirements), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-522: Insufficiently Protected Credentials
Learn about CWE-522 (Insufficiently Protected Credentials), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-523: Unprotected Transport of Credentials
Learn about CWE-523 (Unprotected Transport of Credentials), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-524: Use of Cache Containing Sensitive Information
Learn about CWE-524 (Use of Cache Containing Sensitive Information), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-525: Use of Web Browser Cache Containing Sensitive Information
Learn about CWE-525 (Use of Web Browser Cache Containing Sensitive Information), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-526: Cleartext Storage of Sensitive Information in an Environment Variable
Learn about CWE-526 (Cleartext Storage of Sensitive Information in an Environment Variable), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-527: Exposure of Version-Control Repository to an Unauthorized Control Sphere
Learn about CWE-527 (Exposure of Version-Control Repository to an Unauthorized Control Sphere), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified