All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-54: Path Equivalence: 'filedir\' (Trailing Backslash)
Learn about CWE-54 (Path Equivalence: 'filedir\' (Trailing Backslash)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-540: Inclusion of Sensitive Information in Source Code
Learn about CWE-540 (Inclusion of Sensitive Information in Source Code), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-541: Inclusion of Sensitive Information in an Include File
Learn about CWE-541 (Inclusion of Sensitive Information in an Include File), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-542: DEPRECATED: Information Exposure Through Cleanup Log Files
Learn about CWE-542 (DEPRECATED: Information Exposure Through Cleanup Log Files), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-543: Use of Singleton Pattern Without Synchronization in a Multithreaded Context
Learn about CWE-543 (Use of Singleton Pattern Without Synchronization in a Multithreaded Context), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-544: Missing Standardized Error Handling Mechanism
Learn about CWE-544 (Missing Standardized Error Handling Mechanism), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-545: DEPRECATED: Use of Dynamic Class Loading
Learn about CWE-545 (DEPRECATED: Use of Dynamic Class Loading), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-546: Suspicious Comment
Learn about CWE-546 (Suspicious Comment), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-547: Use of Hard-coded, Security-relevant Constants
Learn about CWE-547 (Use of Hard-coded, Security-relevant Constants), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-548: Exposure of Information Through Directory Listing
Learn about CWE-548 (Exposure of Information Through Directory Listing), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-549: Missing Password Field Masking
Learn about CWE-549 (Missing Password Field Masking), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-55: Path Equivalence: '/./' (Single Dot Directory)
Learn about CWE-55 (Path Equivalence: '/./' (Single Dot Directory)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified