All CWE Vulnerabilities
Browse our comprehensive database of Common Weakness Enumeration (CWE) vulnerabilities
CWE-550: Server-generated Error Message Containing Sensitive Information
Learn about CWE-550 (Server-generated Error Message Containing Sensitive Information), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-551: Incorrect Behavior Order: Authorization Before Parsing and Canonicalization
Learn about CWE-551 (Incorrect Behavior Order: Authorization Before Parsing and Canonicalization), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-552: Files or Directories Accessible to External Parties
Learn about CWE-552 (Files or Directories Accessible to External Parties), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-553: Command Shell in Externally Accessible Directory
Learn about CWE-553 (Command Shell in Externally Accessible Directory), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-554: ASP.NET Misconfiguration: Not Using Input Validation Framework
Learn about CWE-554 (ASP.NET Misconfiguration: Not Using Input Validation Framework), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-555: J2EE Misconfiguration: Plaintext Password in Configuration File
Learn about CWE-555 (J2EE Misconfiguration: Plaintext Password in Configuration File), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-556: ASP.NET Misconfiguration: Use of Identity Impersonation
Learn about CWE-556 (ASP.NET Misconfiguration: Use of Identity Impersonation), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-558: Use of getlogin() in Multithreaded Application
Learn about CWE-558 (Use of getlogin() in Multithreaded Application), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-56: Path Equivalence: 'filedir*' (Wildcard)
Learn about CWE-56 (Path Equivalence: 'filedir*' (Wildcard)), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-560: Use of umask() with chmod-style Argument
Learn about CWE-560 (Use of umask() with chmod-style Argument), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified
CWE-561: Dead Code
Learn about CWE-561 (Dead Code), its security impact, exploitation methods, and prevention guidelines.
Likelihood: Not specified