All CWE Vulnerabilities

Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities

CWE-550: Server-generated Error Message Containing Sensitive Information
Learn about CWE-550 (Server-generated Error Message Containing Sensitive Information), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-551: Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
Learn about CWE-551 (Incorrect Behavior Order: Authorization Before Parsing and Canonicalization), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-552: Files or Directories Accessible to External Parties
Learn about CWE-552 (Files or Directories Accessible to External Parties), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-553: Command Shell in Externally Accessible Directory
Learn about CWE-553 (Command Shell in Externally Accessible Directory), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-554: ASP.NET Misconfiguration: Not Using Input Validation Framework
Learn about CWE-554 (ASP.NET Misconfiguration: Not Using Input Validation Framework), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-555: J2EE Misconfiguration: Plaintext Password in Configuration File
Learn about CWE-555 (J2EE Misconfiguration: Plaintext Password in Configuration File), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-556: ASP.NET Misconfiguration: Use of Identity Impersonation
Learn about CWE-556 (ASP.NET Misconfiguration: Use of Identity Impersonation), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-558: Use of getlogin() in Multithreaded Application
Learn about CWE-558 (Use of getlogin() in Multithreaded Application), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-56: Path Equivalence: 'filedir*' (Wildcard)
Learn about CWE-56 (Path Equivalence: 'filedir*' (Wildcard)), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-560: Use of umask() with chmod-style Argument
Learn about CWE-560 (Use of umask() with chmod-style Argument), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-561: Dead Code
Learn about CWE-561 (Dead Code), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified

CWE-562: Return of Stack Variable Address
Learn about CWE-562 (Return of Stack Variable Address), its security impact, exploitation methods, and prevention guidelines.

Likelihood: Not specified