All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-515: Covert Storage Channel
Learn about CWE-515 (Covert Storage Channel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-516: DEPRECATED: Covert Timing Channel
Learn about CWE-516 (DEPRECATED: Covert Timing Channel), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-52: Path Equivalence: '/multiple/trailing/slash//'
Learn about CWE-52 (Path Equivalence: '/multiple/trailing/slash//'), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-520: .NET Misconfiguration: Use of Impersonation
Learn about CWE-520 (.NET Misconfiguration: Use of Impersonation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-521: Weak Password Requirements
Learn about CWE-521 (Weak Password Requirements), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-522: Insufficiently Protected Credentials
Learn about CWE-522 (Insufficiently Protected Credentials), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-523: Unprotected Transport of Credentials
Learn about CWE-523 (Unprotected Transport of Credentials), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-524: Use of Cache Containing Sensitive Information
Learn about CWE-524 (Use of Cache Containing Sensitive Information), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-525: Use of Web Browser Cache Containing Sensitive Information
Learn about CWE-525 (Use of Web Browser Cache Containing Sensitive Information), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-526: Cleartext Storage of Sensitive Information in an Environment Variable
Learn about CWE-526 (Cleartext Storage of Sensitive Information in an Environment Variable), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-527: Exposure of Version-Control Repository to an Unauthorized Control Sphere
Learn about CWE-527 (Exposure of Version-Control Repository to an Unauthorized Control Sphere), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-528: Exposure of Core Dump File to an Unauthorized Control Sphere
Learn about CWE-528 (Exposure of Core Dump File to an Unauthorized Control Sphere), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified